Launch Week Day 5: Introducing Reachability for PHP.Learn More
Socket
Book a DemoSign in
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery
t

timmywil published 4.0.0

left-pad
s

stevemao published 1.3.0

react
r

react-bot published 19.2.5

We protect you from vulnerable and malicious packages

hacker-bob-cc

1.1.6

by vmihalis

Live on npm

Blocked by Socket

This code is high-risk automation that bypasses multiple CAPTCHA providers by using an external solving service and programmatically injecting solver tokens into the page. It also harvests and exports sensitive authentication/session data (cookies and token-bearing localStorage/sessionStorage entries) and even constructs an Authorization Bearer header from extracted tokens. While it does not appear to implement classic system-level malware behaviors in the shown fragment, its functional behavior aligns strongly with account-abuse/fraud tooling and creates significant data leakage risk through output/logging. Treat as a serious supply-chain security concern and restrict/avoid deployment unless its use is strictly controlled for legitimate, authorized testing with strong secret-handling and log-sanitization.

torc

0.24.1

Live on cargo

Blocked by Socket

This fragment is a high-impact destructive SQL statement that would delete a specific table if executed. With no surrounding migration/admin context shown, it should be treated as suspicious/dangerous for a software package dependency supply chain. Confirm whether it is only used in controlled, authenticated migration tooling; otherwise, it represents a serious risk of data loss and potential sabotage.

apple-app-store-server-library-poc

100.2.1

by cketol

Live on npm

Blocked by Socket

The preinstall script gathers local system information (hostname, user, arch, memory, directory listing and uptime) and exfiltrates it to an external HTTPS webhook during npm install. This is high-risk behavior (data exfiltration/telemetry) and should be treated as malicious; do not install or run this package on systems with sensitive data.

@planu/cli

2.5.0

by planudev

Live on npm

Blocked by Socket

This fragment is dominated by deliberate runtime string deobfuscation (percent/bitwise reconstruction via decodeURIComponent) plus an anti-analysis/self-alignment loop, strongly indicating concealment of operational strings for later behavior. The excerpt does not reveal explicit malware actions (no network/FS/exec primitives shown), so definitive malicious activity cannot be proven from this fragment alone; nonetheless, the structure is consistent with malicious staging or backdoor/dropper code and warrants full-file review, deobfuscation, and controlled execution/sandboxing.

oc-piloci

0.2.3

Live on pypi

Blocked by Socket

High-confidence malicious supply-chain/backdoor indicator: _generate_token_setup() constructs a runtime-executed python3 -c stop hook that reads a local file specified by the CLAUDE_SESSION_TRANSCRIPT environment variable and POSTs the transcript to {base_url}/api/sessions/analyze with an Authorization Bearer token. route_create_token() returns this MCP/hook setup to clients (especially for project-scoped tokens), enabling distribution and later execution by an external hook runner. This is consistent with data exfiltration and covert implant behavior rather than legitimate functionality.

apple-app-store-server-library-poc

100.2.0

by cketol

Live on npm

Blocked by Socket

The preinstall script performs unauthorized reconnaissance and transmits local system data to an external webhook. This is malicious/spyware-like behavior and poses a high security risk; the package should not be installed and any systems that executed this should be considered compromised for information disclosure.

ghbomber

1.0.4

by ghostsenderserver

Live on npm

Blocked by Socket

This code fragment is highly consistent with an automated username/account discovery tool targeting Microsoft/Office365/ADFS federation behavior. It probes remote identity endpoints with {Username}, interprets response signals (IfExistsResult and FederationRedirectUrl) to identify valid/interesting accounts or tenants, and appends categorized results to local files using environment-controlled paths. The heavy obfuscation and one-shot batch execution further increase the risk.

lftools-uv

0.1.9

Live on pypi

Blocked by Socket

This module contains a high-risk supply-chain pattern: it downloads a commit-msg Git hook from a remote endpoint and installs it as an executable script under .git/hooks/commit-msg without integrity/authenticity checks. That enables remote-controlled code execution during git commit (and then pushes automated changes back to Gerrit), which can be used for workflow sabotage/backdooring if the hook source or configuration is compromised. Additional secondary risks include credential embedding in clone URLs, unconstrained file/symlink writes, and potential sensitive-data leakage through debug logging of rendered configuration/credential-mapping content.

neoagent

2.3.1-beta.12

by neo_original_

Live on npm

Blocked by Socket

This module implements macOS interval-based screen capture and OCR, then persistently stores the extracted screen text and frontmost application name in a database for up to 7 days. While it does not demonstrate obfuscation or direct command injection, the behavior is highly privacy-invasive and consistent with spyware/screen-logger functionality. Use should be gated behind explicit user consent, strict authorization/scoping, clear transparency, and strong data minimization/redaction controls.

deepfish-ai

1.0.26

by roman_123

Live on npm

Blocked by Socket

The provided module is extremely high risk because it enables arbitrary command execution on the host (`spawnSync` with `shell:true`) and arbitrary in-process JavaScript execution (`new Function` with injected untrusted code), augmented by permissive local module loading and return/log-based leakage of executed output. Unless the surrounding system strictly constrains and authenticates who can call these tools (and runs in a strong sandbox), this represents a likely agent backdoor/sabotage capability rather than a safe utility.

@scramble-cloud/lurus-code-cli

1.1.3

by scramble-cloud

Live on npm

Blocked by Socket

This module is highly obfuscated and implements an agent-style sandbox/policy engine for command/path safety, alongside a persistent encrypted “vault key/state” mechanism stored under user-scoped directories. While the visible fragment does not show direct exfiltration or an obvious payload, the cryptographic persistence and broad mediation of shell-execution surfaces are high-suspicion supply-chain patterns. Treat as a security-critical dependency requiring manual review and dynamic analysis of the omitted execution/spawn and any networking components.

@design-canvas/toolbox

0.2.5

by unthink

Live on npm

Blocked by Socket

This module is high-risk because it accepts an HTTP POST body containing an arbitrary `command`, embeds it verbatim into a generated executable bash script within the project, and then registers that script in VSCode and Claude hook configuration files for later execution. If the route is accessible without strong authentication/authorization and strict command validation, it provides an attacker with persistent arbitrary code execution (backdoor-like behavior) and can also disclose configured hook commands via GET.

@flarehr/apollo-benefits

0.4.6585

by flare.build

Live on npm

Blocked by Socket

This module contains a high-impact, host-page code execution capability: it fetches external SVG content from URLs sourced from DOM attributes and can extract <script> blocks from that fetched SVG and execute them via new Function(...)(window). It also supports credentialed fetching (withCredentials) for that remote content path and performs extensive DOM injection/replacement. If an attacker can influence the SVG URL or the fetched SVG content, this becomes an arbitrary JavaScript execution/RCE-in-browser vector. Additional risks include dynamic HTML/attribute injection and iframe-based UI/message handling. Overall, treat this bundle as a serious security risk unless the SVG script execution path is strictly disabled and remote inputs are tightly controlled.

azure-jobs

0.1.25

Live on pypi

Blocked by Socket

Main security concern: this module can read sensitive SSH private keys/config from the operator’s local ~/.ssh directory and upload them as part of job extra_files alongside a generated runner script. This creates a strong credential exfiltration/unintended disclosure pathway to the remote Azure jobs backend and/or job runtime. Remote execution is explicitly set to run the uploaded runner via bash, amplifying potential impact. Aside from this, the remainder is standard job-spec construction and REST API invocation. Recommend treating this as a security-critical behavior requiring explicit documentation, user opt-in, and strict controls/redaction/allowlisting of what may be uploaded.

apple-app-store-server-library-poc

133.7.1

by cketol

Live on npm

Blocked by Socket

The preinstall script actively collects sensitive environment and system information (env, routing, user, uptime, hostname, platform) and posts it to an external webhook. This is unauthorized telemetry/data exfiltration and is malicious or at minimum grossly privacy-invasive. Installing this package would leak host-specific details to a third party and could be leveraged for follow-on attacks.

azure-jobs

0.1.27

Live on pypi

Blocked by Socket

Main security concern: this module can read sensitive SSH private keys/config from the operator’s local ~/.ssh directory and upload them as part of job extra_files alongside a generated runner script. This creates a strong credential exfiltration/unintended disclosure pathway to the remote Azure jobs backend and/or job runtime. Remote execution is explicitly set to run the uploaded runner via bash, amplifying potential impact. Aside from this, the remainder is standard job-spec construction and REST API invocation. Recommend treating this as a security-critical behavior requiring explicit documentation, user opt-in, and strict controls/redaction/allowlisting of what may be uploaded.

@lifeaitools/clauth

1.5.65

by lifeaiuser

Live on npm

Blocked by Socket

This code is a Windows Scheduled Task persistence installer/manager that stages a bundled PowerShell script into AppData and then registers a logon-triggered task to execute it invisibly with ExecutionPolicy Bypass and RunLevel Highest, with restart behavior. While the wrapper itself shows no explicit data theft/exfiltration, the persistence + stealth + policy-bypass combination is a substantial supply-chain malware red flag; the definitive risk depends on the actual behavior of the copied watchdog.ps1 (not present in this snippet).

oh-my-customcode

0.124.0

by sangyi-baek

Live on npm

Blocked by Socket

Primary finding: this module performs high-risk supply-chain behavior by downloading and executing a remote shell script (`curl ... | sh`) to install an external CLI tool during install/update. That creates a strong RCE risk that should be treated as a security alert. Secondary concerns include broad workspace write/restore behavior and potential JSON prototype-pollution robustness issues in deepMerge(), depending on attacker control over preserved JSON inputs.

plumber-agent

1.0.17

Live on pypi

Blocked by Socket

This module is extremely dangerous by design because it executes Python code read verbatim from an external JSON command file using exec() with full process privileges. It also writes logs and response files that may leak sensitive data (captured stdout and full tracebacks) and deletes the command queue file afterward. Additional risk arises from unrestricted file path handling via CLI arguments. Unless the command_file and file paths are strongly access-controlled and the environment is tightly sandboxed, this constitutes a file-based RCE/control-channel pattern suitable for malware or sabotage. Confidence is reduced only because the provided snippet appears truncated at the end, preventing verification of any behavior after the fragment.

xlabrouter

1.0.24

by xlabglobal

Live on npm

Blocked by Socket

This code performs targeted credential/token harvesting from Cursor IDE’s local SQLite state database (including accessToken and machineId) and exfiltrates the results by returning them in a network-facing Next.js GET JSON response. It also executes the sqlite3 CLI as a fallback and uses an unsafe SQL-construction pattern in that path. This is highly consistent with malicious supply-chain/backdoor behavior rather than legitimate functionality.

abstra

3.30.23

Live on pypi

Blocked by Socket

This module contains an explicit remote code execution capability: it executes JavaScript received from the backend over WebSocket via eval(code) and sends the evaluation result back to the server. Even with an output-serialization check, arbitrary code can still perform side effects in the browser context. Additional risks include passing server-provided redirect targets to onRedirect and transmitting widget 'secret' fields back to the backend. Treat this package/module as extremely dangerous unless the WebSocket endpoint and message integrity are fully trusted and strongly constrained (e.g., impossible for an attacker to influence execute-js messages).

lucterios

2.7.8.26041809

Live on pypi

Blocked by Socket

Overall security posture of this excerpt is concerning due to a direct arbitrary-code execution sink (new Function over component-provided JavaScript) and multiple HTML injection/HTML-ingestion sinks (Vue innerHTML and Quill dangerouslyPasteHTML). If any of the relevant configuration/data (especially component.javascript or HTML-bearing message/help content) can be influenced by an attacker via remote configuration, stored content, or compromised backend/admin workflows, the code can function as an in-browser backdoor and XSS-capable payload runner. Axios-like networking and cookie/header logic appear functionally standard, but they increase impact by enabling malicious scripts to make authenticated requests and propagate tokens once code execution/XSS is achieved.

unclaw

0.0.40

by GitHub Actions

Live on npm

Blocked by Socket

This module is primarily a macOS privileged execution helper. It accepts arbitrary shell content, writes it into a temporary executable script, and runs it with administrator privileges via `osascript`. While no network exfiltration or direct persistence creation is shown in this fragment, the presence of a generic admin-execution primitive plus launchd-related constants represents a serious security concern. The overall risk depends heavily on whether `script` is strictly controlled and not influenced by untrusted input.

vauban

0.4.26

Live on pypi

Blocked by Socket

This module is a data library that contains explicit malicious instruction payloads (hardcoded attacker domains and commands) and provides functions to load and persist payload libraries. The code itself does not perform exfiltration or network activity, but it creates a high-risk supply of instruction strings that will enable exfiltration or remote fetching if consumed by any component that executes or forwards payload.text. There is also an unsafe file-loading path with no validation and a runtime bug in extend_library (returns undefined 'resul'). Recommended actions: treat this module as untrusted when used with any executor/agent; remove or neutralize builtin malicious payloads before deploying, add strict validation and sanitization of loaded payloads, fail-safe consumers so payload.text is not executed, and fix the extend_library return bug. If this library is present in a dependency tree for systems that run assistants or automated agents, consider removing or sandboxing it and auditing all consumers of Payload objects.

azure-jobs

0.1.26

Live on pypi

Blocked by Socket

Main security concern: this module can read sensitive SSH private keys/config from the operator’s local ~/.ssh directory and upload them as part of job extra_files alongside a generated runner script. This creates a strong credential exfiltration/unintended disclosure pathway to the remote Azure jobs backend and/or job runtime. Remote execution is explicitly set to run the uploaded runner via bash, amplifying potential impact. Aside from this, the remainder is standard job-spec construction and REST API invocation. Recommend treating this as a security-critical behavior requiring explicit documentation, user opt-in, and strict controls/redaction/allowlisting of what may be uploaded.

hacker-bob-cc

1.1.6

by vmihalis

Live on npm

Blocked by Socket

This code is high-risk automation that bypasses multiple CAPTCHA providers by using an external solving service and programmatically injecting solver tokens into the page. It also harvests and exports sensitive authentication/session data (cookies and token-bearing localStorage/sessionStorage entries) and even constructs an Authorization Bearer header from extracted tokens. While it does not appear to implement classic system-level malware behaviors in the shown fragment, its functional behavior aligns strongly with account-abuse/fraud tooling and creates significant data leakage risk through output/logging. Treat as a serious supply-chain security concern and restrict/avoid deployment unless its use is strictly controlled for legitimate, authorized testing with strong secret-handling and log-sanitization.

torc

0.24.1

Live on cargo

Blocked by Socket

This fragment is a high-impact destructive SQL statement that would delete a specific table if executed. With no surrounding migration/admin context shown, it should be treated as suspicious/dangerous for a software package dependency supply chain. Confirm whether it is only used in controlled, authenticated migration tooling; otherwise, it represents a serious risk of data loss and potential sabotage.

apple-app-store-server-library-poc

100.2.1

by cketol

Live on npm

Blocked by Socket

The preinstall script gathers local system information (hostname, user, arch, memory, directory listing and uptime) and exfiltrates it to an external HTTPS webhook during npm install. This is high-risk behavior (data exfiltration/telemetry) and should be treated as malicious; do not install or run this package on systems with sensitive data.

@planu/cli

2.5.0

by planudev

Live on npm

Blocked by Socket

This fragment is dominated by deliberate runtime string deobfuscation (percent/bitwise reconstruction via decodeURIComponent) plus an anti-analysis/self-alignment loop, strongly indicating concealment of operational strings for later behavior. The excerpt does not reveal explicit malware actions (no network/FS/exec primitives shown), so definitive malicious activity cannot be proven from this fragment alone; nonetheless, the structure is consistent with malicious staging or backdoor/dropper code and warrants full-file review, deobfuscation, and controlled execution/sandboxing.

oc-piloci

0.2.3

Live on pypi

Blocked by Socket

High-confidence malicious supply-chain/backdoor indicator: _generate_token_setup() constructs a runtime-executed python3 -c stop hook that reads a local file specified by the CLAUDE_SESSION_TRANSCRIPT environment variable and POSTs the transcript to {base_url}/api/sessions/analyze with an Authorization Bearer token. route_create_token() returns this MCP/hook setup to clients (especially for project-scoped tokens), enabling distribution and later execution by an external hook runner. This is consistent with data exfiltration and covert implant behavior rather than legitimate functionality.

apple-app-store-server-library-poc

100.2.0

by cketol

Live on npm

Blocked by Socket

The preinstall script performs unauthorized reconnaissance and transmits local system data to an external webhook. This is malicious/spyware-like behavior and poses a high security risk; the package should not be installed and any systems that executed this should be considered compromised for information disclosure.

ghbomber

1.0.4

by ghostsenderserver

Live on npm

Blocked by Socket

This code fragment is highly consistent with an automated username/account discovery tool targeting Microsoft/Office365/ADFS federation behavior. It probes remote identity endpoints with {Username}, interprets response signals (IfExistsResult and FederationRedirectUrl) to identify valid/interesting accounts or tenants, and appends categorized results to local files using environment-controlled paths. The heavy obfuscation and one-shot batch execution further increase the risk.

lftools-uv

0.1.9

Live on pypi

Blocked by Socket

This module contains a high-risk supply-chain pattern: it downloads a commit-msg Git hook from a remote endpoint and installs it as an executable script under .git/hooks/commit-msg without integrity/authenticity checks. That enables remote-controlled code execution during git commit (and then pushes automated changes back to Gerrit), which can be used for workflow sabotage/backdooring if the hook source or configuration is compromised. Additional secondary risks include credential embedding in clone URLs, unconstrained file/symlink writes, and potential sensitive-data leakage through debug logging of rendered configuration/credential-mapping content.

neoagent

2.3.1-beta.12

by neo_original_

Live on npm

Blocked by Socket

This module implements macOS interval-based screen capture and OCR, then persistently stores the extracted screen text and frontmost application name in a database for up to 7 days. While it does not demonstrate obfuscation or direct command injection, the behavior is highly privacy-invasive and consistent with spyware/screen-logger functionality. Use should be gated behind explicit user consent, strict authorization/scoping, clear transparency, and strong data minimization/redaction controls.

deepfish-ai

1.0.26

by roman_123

Live on npm

Blocked by Socket

The provided module is extremely high risk because it enables arbitrary command execution on the host (`spawnSync` with `shell:true`) and arbitrary in-process JavaScript execution (`new Function` with injected untrusted code), augmented by permissive local module loading and return/log-based leakage of executed output. Unless the surrounding system strictly constrains and authenticates who can call these tools (and runs in a strong sandbox), this represents a likely agent backdoor/sabotage capability rather than a safe utility.

@scramble-cloud/lurus-code-cli

1.1.3

by scramble-cloud

Live on npm

Blocked by Socket

This module is highly obfuscated and implements an agent-style sandbox/policy engine for command/path safety, alongside a persistent encrypted “vault key/state” mechanism stored under user-scoped directories. While the visible fragment does not show direct exfiltration or an obvious payload, the cryptographic persistence and broad mediation of shell-execution surfaces are high-suspicion supply-chain patterns. Treat as a security-critical dependency requiring manual review and dynamic analysis of the omitted execution/spawn and any networking components.

@design-canvas/toolbox

0.2.5

by unthink

Live on npm

Blocked by Socket

This module is high-risk because it accepts an HTTP POST body containing an arbitrary `command`, embeds it verbatim into a generated executable bash script within the project, and then registers that script in VSCode and Claude hook configuration files for later execution. If the route is accessible without strong authentication/authorization and strict command validation, it provides an attacker with persistent arbitrary code execution (backdoor-like behavior) and can also disclose configured hook commands via GET.

@flarehr/apollo-benefits

0.4.6585

by flare.build

Live on npm

Blocked by Socket

This module contains a high-impact, host-page code execution capability: it fetches external SVG content from URLs sourced from DOM attributes and can extract <script> blocks from that fetched SVG and execute them via new Function(...)(window). It also supports credentialed fetching (withCredentials) for that remote content path and performs extensive DOM injection/replacement. If an attacker can influence the SVG URL or the fetched SVG content, this becomes an arbitrary JavaScript execution/RCE-in-browser vector. Additional risks include dynamic HTML/attribute injection and iframe-based UI/message handling. Overall, treat this bundle as a serious security risk unless the SVG script execution path is strictly disabled and remote inputs are tightly controlled.

azure-jobs

0.1.25

Live on pypi

Blocked by Socket

Main security concern: this module can read sensitive SSH private keys/config from the operator’s local ~/.ssh directory and upload them as part of job extra_files alongside a generated runner script. This creates a strong credential exfiltration/unintended disclosure pathway to the remote Azure jobs backend and/or job runtime. Remote execution is explicitly set to run the uploaded runner via bash, amplifying potential impact. Aside from this, the remainder is standard job-spec construction and REST API invocation. Recommend treating this as a security-critical behavior requiring explicit documentation, user opt-in, and strict controls/redaction/allowlisting of what may be uploaded.

apple-app-store-server-library-poc

133.7.1

by cketol

Live on npm

Blocked by Socket

The preinstall script actively collects sensitive environment and system information (env, routing, user, uptime, hostname, platform) and posts it to an external webhook. This is unauthorized telemetry/data exfiltration and is malicious or at minimum grossly privacy-invasive. Installing this package would leak host-specific details to a third party and could be leveraged for follow-on attacks.

azure-jobs

0.1.27

Live on pypi

Blocked by Socket

Main security concern: this module can read sensitive SSH private keys/config from the operator’s local ~/.ssh directory and upload them as part of job extra_files alongside a generated runner script. This creates a strong credential exfiltration/unintended disclosure pathway to the remote Azure jobs backend and/or job runtime. Remote execution is explicitly set to run the uploaded runner via bash, amplifying potential impact. Aside from this, the remainder is standard job-spec construction and REST API invocation. Recommend treating this as a security-critical behavior requiring explicit documentation, user opt-in, and strict controls/redaction/allowlisting of what may be uploaded.

@lifeaitools/clauth

1.5.65

by lifeaiuser

Live on npm

Blocked by Socket

This code is a Windows Scheduled Task persistence installer/manager that stages a bundled PowerShell script into AppData and then registers a logon-triggered task to execute it invisibly with ExecutionPolicy Bypass and RunLevel Highest, with restart behavior. While the wrapper itself shows no explicit data theft/exfiltration, the persistence + stealth + policy-bypass combination is a substantial supply-chain malware red flag; the definitive risk depends on the actual behavior of the copied watchdog.ps1 (not present in this snippet).

oh-my-customcode

0.124.0

by sangyi-baek

Live on npm

Blocked by Socket

Primary finding: this module performs high-risk supply-chain behavior by downloading and executing a remote shell script (`curl ... | sh`) to install an external CLI tool during install/update. That creates a strong RCE risk that should be treated as a security alert. Secondary concerns include broad workspace write/restore behavior and potential JSON prototype-pollution robustness issues in deepMerge(), depending on attacker control over preserved JSON inputs.

plumber-agent

1.0.17

Live on pypi

Blocked by Socket

This module is extremely dangerous by design because it executes Python code read verbatim from an external JSON command file using exec() with full process privileges. It also writes logs and response files that may leak sensitive data (captured stdout and full tracebacks) and deletes the command queue file afterward. Additional risk arises from unrestricted file path handling via CLI arguments. Unless the command_file and file paths are strongly access-controlled and the environment is tightly sandboxed, this constitutes a file-based RCE/control-channel pattern suitable for malware or sabotage. Confidence is reduced only because the provided snippet appears truncated at the end, preventing verification of any behavior after the fragment.

xlabrouter

1.0.24

by xlabglobal

Live on npm

Blocked by Socket

This code performs targeted credential/token harvesting from Cursor IDE’s local SQLite state database (including accessToken and machineId) and exfiltrates the results by returning them in a network-facing Next.js GET JSON response. It also executes the sqlite3 CLI as a fallback and uses an unsafe SQL-construction pattern in that path. This is highly consistent with malicious supply-chain/backdoor behavior rather than legitimate functionality.

abstra

3.30.23

Live on pypi

Blocked by Socket

This module contains an explicit remote code execution capability: it executes JavaScript received from the backend over WebSocket via eval(code) and sends the evaluation result back to the server. Even with an output-serialization check, arbitrary code can still perform side effects in the browser context. Additional risks include passing server-provided redirect targets to onRedirect and transmitting widget 'secret' fields back to the backend. Treat this package/module as extremely dangerous unless the WebSocket endpoint and message integrity are fully trusted and strongly constrained (e.g., impossible for an attacker to influence execute-js messages).

lucterios

2.7.8.26041809

Live on pypi

Blocked by Socket

Overall security posture of this excerpt is concerning due to a direct arbitrary-code execution sink (new Function over component-provided JavaScript) and multiple HTML injection/HTML-ingestion sinks (Vue innerHTML and Quill dangerouslyPasteHTML). If any of the relevant configuration/data (especially component.javascript or HTML-bearing message/help content) can be influenced by an attacker via remote configuration, stored content, or compromised backend/admin workflows, the code can function as an in-browser backdoor and XSS-capable payload runner. Axios-like networking and cookie/header logic appear functionally standard, but they increase impact by enabling malicious scripts to make authenticated requests and propagate tokens once code execution/XSS is achieved.

unclaw

0.0.40

by GitHub Actions

Live on npm

Blocked by Socket

This module is primarily a macOS privileged execution helper. It accepts arbitrary shell content, writes it into a temporary executable script, and runs it with administrator privileges via `osascript`. While no network exfiltration or direct persistence creation is shown in this fragment, the presence of a generic admin-execution primitive plus launchd-related constants represents a serious security concern. The overall risk depends heavily on whether `script` is strictly controlled and not influenced by untrusted input.

vauban

0.4.26

Live on pypi

Blocked by Socket

This module is a data library that contains explicit malicious instruction payloads (hardcoded attacker domains and commands) and provides functions to load and persist payload libraries. The code itself does not perform exfiltration or network activity, but it creates a high-risk supply of instruction strings that will enable exfiltration or remote fetching if consumed by any component that executes or forwards payload.text. There is also an unsafe file-loading path with no validation and a runtime bug in extend_library (returns undefined 'resul'). Recommended actions: treat this module as untrusted when used with any executor/agent; remove or neutralize builtin malicious payloads before deploying, add strict validation and sanitization of loaded payloads, fail-safe consumers so payload.text is not executed, and fix the extend_library return bug. If this library is present in a dependency tree for systems that run assistants or automated agents, consider removing or sandboxing it and auditing all consumers of Payload objects.

azure-jobs

0.1.26

Live on pypi

Blocked by Socket

Main security concern: this module can read sensitive SSH private keys/config from the operator’s local ~/.ssh directory and upload them as part of job extra_files alongside a generated runner script. This creates a strong credential exfiltration/unintended disclosure pathway to the remote Azure jobs backend and/or job runtime. Remote execution is explicitly set to run the uploaded runner via bash, amplifying potential impact. Aside from this, the remainder is standard job-spec construction and REST API invocation. Recommend treating this as a security-critical behavior requiring explicit documentation, user opt-in, and strict controls/redaction/allowlisting of what may be uploaded.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Possible typosquat attack

Known malware

Git dependency

GitHub dependency

HTTP dependency

Obfuscated code

Suspicious Stars on GitHub

Telemetry

Protestware or potentially unwanted behavior

Unstable ownership

55 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Book a Demo

Questions? Call us at (844) SOCKET-0

Read the blog

Protect every package in your stack

Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.

View all integrations

RUST

crates.io

Rust Package Manager

PHP

Packagist

PHP Package Manager

GOLANG

Go Modules

Go Dependency Management

JAVA

Maven Central

JAVASCRIPT

npm

Node Package Manager

.NET

NuGet

.NET Package Manager

PYTHON

PyPI

Python Package Index

RUBY

RubyGems.org

Ruby Package Manager

SWIFT

Swift

AI

Hugging Face Hub

AI Model Hub

CI

GitHub Actions

CI/CD Workflows

EXTENSIONS

Chrome Web Store

Chrome Browser Extensions

EXTENSIONS

Open VSX

VS Code Extensions

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Nov 23, 2025

Shai Hulud v2

Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.

Nov 05, 2025

Elves on npm

A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.

Jul 04, 2025

RubyGems Automation-Tool Infostealer

Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.

Mar 13, 2025

North Korea's Contagious Interview Campaign

Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.

Jul 23, 2024

Network Reconnaissance Campaign

A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles