Launch Week Day 5: Introducing Reachability for PHP.Learn More
Socket
Book a DemoSign in
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery
t

timmywil published 4.0.0

left-pad
s

stevemao published 1.3.0

react
r

react-bot published 19.2.5

We protect you from vulnerable and malicious packages

tempo-x402-node

2.1.2

Live on cargo

Blocked by Socket

Report 2 provides the strongest and most actionable assessment due to highlighting the admin_exec remote command execution risk and related supply-chain implications. The primary risk is high: an attacker with admin token could execute arbitrary commands, potentially compromising data, state, and build environments. Secondary risks arise from other admin tools and data-exposure paths. The recommended path is to eliminate or heavily constrain the admin_exec surface, strengthen authentication and auditing, sandbox privileged operations, and minimize data exposure from endpoints. If kept, implement strict whitelisting, output redaction, and robust monitoring to reduce risk.

viturka-nn

0.1.9

Live on pypi

Blocked by Socket

This module is both buggy and dangerous. It uploads sensitive model weights and an API key to a hard-coded third-party endpoint and performs deserialization of remote-provided data via torch.load, creating a straightforward remote code execution and data-exfiltration vector. Do not use this code as-is; treat the endpoint and response as untrusted and redesign according to secure transfer and validation principles.

mtxai

0.0.157

Live on pypi

Blocked by Socket

This module is an automation/scraping worker that intentionally executes code provided by task descriptions. That design requires trusting the task source. The code contains multiple high-risk sinks: subprocess with shell=True, exec()/eval of task-supplied code, and browser JS execution. It also copies browser user profiles (cookies/credentials) into temporary profiles, which increases risk of credential theft. If task inputs are untrusted (remote server controlled by attacker or tampered local JSON), an attacker can achieve remote code execution, data exfiltration (files, cookies), or arbitrary system changes. Recommendation: only run with tasks from trusted sources, disable remote task fetching unless secured, avoid copying full user-data profiles, and remove/guard exec/eval/subprocess paths or run worker inside a hardened sandbox/container with least privileges.

opux

99.9.9

by ravysena66

Removed from npm

Blocked by Socket

The code likely represents a telemetry or tracking functionality with malicious intent due to the nature of the data being collected and the suspicious hostname. The level of detail and types of information sent pose a serious privacy risk.

Live on npm for 11 hours and 13 minutes before removal. Socket users were protected even while the package was live.

354766/inference-sh/skills/data-visualization/

8d16b1a837a07b7f66b4e74fb8718086a0974758

Live on socket

Blocked by Socket

[Skill Scanner] Pipe-to-shell or eval pattern detected (AITech 9.1.4) [CI013]

bigdl-orca-spark2

2.5.0b20240317

Live on pypi

Blocked by Socket

The code contains potential security risks such as hard-coded file paths, subprocess.Popen usage, and the handling of untrusted data through PyArrow Plasma. It is essential to review and address these security concerns before using this code in a production environment.

aspidites

0.26.2

Live on pypi

Blocked by Socket

The code implements a high-risk dynamic evaluation pattern by evaluating tokens within the caller’s scope. This creates a strong possibility of arbitrary code execution and data leakage if tokens originate from untrusted inputs. Hardening should include removing eval, replacing with safe resolvers, sandboxing, or strict token whitelisting and restricting scope access. This pattern is unsuitable for trusted libraries exposes in open-source supply chains without significant safeguards.

@iflow-ai/iflow-cli

0.2.22-beta.3

by zjhwork2025

Live on npm

Blocked by Socket

This script automatically downloads a JetBrains plugin from a hardcoded external URL (https://cloud[.]iflow[.]cn/iflow-cli/iflow-idea-0[.]0[.]2[.]zip) and extracts it directly into local JetBrains IDE plugins directories without explicit user consent. The code fails to perform cryptographic verification (such as signature or hash checks) of the downloaded ZIP archive before extraction. Furthermore, it aggressively deletes existing plugin directories with the same target name before installation. This automated, unverified download and installation behavior poses a significant security risk, as it allows arbitrary code to be executed within the developer's IDE context, acting as a secondary payload delivery mechanism commonly seen in supply-chain malware.

lab-c

0.1.0

by imbooo

Live on npm

Blocked by Socket

This file implements a remote compile-and-execute service that accepts arbitrary C source from connected clients, compiles it with gcc, executes the resulting binary as the Node process user, and forwards program output back to the client. In its current form it provides remote code execution and easy data exfiltration with no authentication, sandboxing, resource limits, or isolation. Treat this module as high risk: do not run on production or internet-accessible hosts. If intended for safe use, add strong authentication, per-connection isolation, strict resource/lifetime limits, OS-level sandboxing (containers or seccomp), UID mapping, and avoid executing untrusted code as a privileged or long-lived process.

ailever

0.2.721

Live on pypi

Blocked by Socket

The fragment contains a high-risk pattern: it downloads a Python script from a remote source and immediately executes it without integrity verification or sandboxing. This creates a critical supply-chain and remote-code-execution risk, as the remote payload could perform any action on the host, including data exfiltration, credential access, or system compromise. Even though defaults use placeholders, the mechanism itself is unsafe and should be disallowed or hardened (e.g., verify hashes, use signed modules, avoid executing remote code).

@kernel.chat/kbot

3.73.2

by isaacsight

Live on npm

Blocked by Socket

This package is a high-risk installer that patches an AbletonOSC integration to persistently add an OSC endpoint `/live/exec` performing unsandboxed Python `eval`/`exec` on attacker-controlled input. That is effectively a remote code execution backdoor within the Ableton runtime if OSC messages are reachable or spoofable. It also introduces supply-chain risk by cloning and installing an unpinned, unauthenticated repository without integrity checks.

nyc-config

4.4.0

by jpdtestjpd

Removed from npm

Blocked by Socket

This package runs index.js automatically during npm install. That behavior is potentially dangerous because index.js could perform network calls, exfiltrate data, install backdoors, add git hooks, or perform destructive operations. Combined with networking libraries in dependencies, there is a notable risk. You should inspect the contents of index.js (and any files it requires) and verify the package's provenance before installing in sensitive environments.

Live on npm for 2 hours and 6 minutes before removal. Socket users were protected even while the package was live.

procustodibus-agent

1.10.0

Live on pypi

Blocked by Socket

This script is a deliberate disruptive tool that randomly toggles WireGuard interfaces on the host on a repeating schedule. It does not exfiltrate data or attempt stealthy persistence, but its behavior constitutes operational sabotage (intermittent denial-of-service for VPN/network interfaces). If found unexpectedly in a system or dependency, treat it as malicious and remove or quarantine; do not run on production hosts. If intentionally used for testing, restrict execution to isolated environments and review privileges and scheduling.

dhemrdhs92006

1.250722.11131

by ongtrieuhau861.001

Removed from npm

Blocked by Socket

This file implements an unattended update mechanism that fetches and installs .tgz archives from unverified remote sources—both the npm registry (registry[.]npmjs[.]org) and a configurable Firebase-style database URL—by downloading, extracting them into the application directory and then restarting PM2-managed processes. Because there is no cryptographic signature or checksum validation beyond a simple version check, a compromised registry account or database endpoint could deliver arbitrary code to every host running this updater. Additionally, on startup the script gathers extensive system and package metadata—including public IP (via api[.]ipify[.]org), local IP addresses, hostname, OS/platform, Node.js version, CPU/memory statistics, load averages, working directory and package.json fields—and posts it to a configurable Discord webhook endpoint (discordapp[.]com). This behavior poses both a supply-chain risk and a telemetry/privacy exposure risk, as sensitive host information is sent to an external service without explicit user consent or granular control.

Live on npm for 3 hours and 7 minutes before removal. Socket users were protected even while the package was live.

@coryrowe/openclaw-zh

2026.2.13-nightly.202602150333

by cnrowe

Live on npm

Blocked by Socket

The mcporter CLI’s documented capabilities (arbitrary HTTP calls, --stdio process execution, and local credential storage) align with its stated purpose but present a moderate attack surface: misuse can lead to credential leakage or arbitrary code execution if inputs are untrusted or the environment is hostile. The fragment contains no explicit malicious code, obfuscation, or hard-coded attacker infrastructure. Recommended actions: review implementation for secure storage of tokens, minimize or sanitize construction of command strings, consider allowlisting target domains or prompting before sending credentials to unknown endpoints, and audit generated outputs for sensitive data leakage. Treat as functional but moderately risky in adversarial contexts.

@aiyiran/myclaw

1.0.218

by aiyiran

Live on npm

Blocked by Socket

This module is a high-risk supply-chain configuration/credential injection tool. It embeds a hardcoded API key and writes it into the target project configuration while overriding provider/model defaults (and deleting any existing mapping for the same model key). Although the snippet does not itself perform network exfiltration, it implants credentials and redirects how the host application will authenticate and call an external API endpoint, creating significant likelihood of unauthorized usage and potential data exposure depending on downstream request behavior.

github.com/sagernet/sing-box

v1.2.1-0.20230324023316-265e8cb3355d

Live on go

Blocked by Socket

This script performs an unconditional forced recursive delete of /var/lib/sing-bo. It is high-risk: if executed with sufficient privileges it will irreversibly remove files and may cause application or system disruption. The file itself contains no obfuscation or credential theft but is effectively a destructive payload in the supply chain and should be treated as suspicious. Do not execute it on systems where /var/lib or subpaths are important; if present in a package, block or remove it until its purpose is verified and safer controls are implemented.

exp10it

2.5.70

Live on pypi

Blocked by Socket

This file is offensive/exploit tooling: it performs automated reconnaissance, crafts and sends SQLi and PHP eval payloads against Joomla sites, extracts credentials/session data, and attempts to install a PHP webshell for persistence. Those behaviors constitute malicious activity (unauthorized access, credential theft, backdoor installation). Treat this code as malicious/exploitative; do not include it in trusted dependencies or run it on networks you do not own/authorize. The snippet contains some syntactic errors suggesting a truncated copy, but intent and many operational parts are explicit.

carbonorm/carbonphp

16.0.0

Live on composer

Blocked by Socket

Strong concerns about backdoor-like capabilities and broad data/command surfaces inherent in the migration tool. The selfHidingFile HALT_COMPILER payload represents a covert data-serving mechanism that can be triggered via license-protected HTTP requests, constituting a serious supply chain and runtime risk. Recommend removing or thoroughly sanitizing the hidden payload, eliminating HALT-based constructs, replacing license-guarded backdoors with robust authentication, and enforcing strict validation of all remote inputs. If used, isolate the component, implement code reviews, and ensure remote content sources are trusted and auditable.

@pentestleg/core

10.1.2

by pentestleg-test

Live on npm

Blocked by Socket

This code performs explicit, unconditional data exfiltration: it reads /etc/passwd and sends it, along with the current username and hostname, to a hardcoded external domain using a shell-invoked curl command. This is malicious/backdoor behavior. Do not run this code. Treat the containing package as compromised: remove it, investigate the source of the code, and assume potential exposure of host identity and any data contained in /etc/passwd. Rotate any credentials that may have been exposed and audit systems where the package was installed.

ailever

0.2.423

Live on pypi

Blocked by Socket

The code exhibits a dangerous remote code execution pattern: it downloads and immediately runs a remote Python payload without integrity checks, sandboxing, or input validation. This creates a severe supply-chain and runtime security risk. Recommended mitigations include removing dynamic downloads, validating payloads with cryptographic hashes or signatures, using safe subprocess invocations with argument lists, and implementing strict input sanitization. If remote functionality must remain, switch to a trusted-internal mechanism (e.g., plugin architecture with signed components, offline verification) and add robust error handling and logging.

github.com/rclone/rclone

v1.65.1-0.20240107112609-fbdf71ab6456

Live on go

Blocked by Socket

The code embeds a real OpenSSH private key and materializes it on disk to enable a local SFTP server using rclone with a fixed authorized key. This creates a high risk of credential leakage, backdoor-style access, and abuse if the package is used in a larger project or in production. Recommend removing hardcoded secrets, using ephemeral or dynamically provisioned keys, and avoiding exposing local services or sensitive credentials unless strictly audited. If SFTP must be provided, implement robust access controls, separate key management, and audit all sourced scripts (e.g., rclone-serve.bash).

numasec

4.1.0

Live on pypi

Blocked by Socket

The provided fragment is a highly weaponized client-side exploitation and malware-like C2 playbook. It contains explicit session/cookie theft, keylogging/credential harvesting, phishing UI injection, stored-XSS admin takeover with persistence/cover-tracks, data exfiltration, and a BEeF-equivalent command loop that executes attacker-provided JavaScript via eval(cmd.code). If distributed as an OSS dependency or packaging content, it represents an extreme supply-chain and runtime security threat.

yrodevgit/codetazer

v8.2.5

Live on composer

Blocked by Socket

The code contains an injected, targeted, disruptive payload: for users with Russian locales and matching hosts it will, after a time-based condition, disable pointer events and auto-play a looping audio file loaded from a hardcoded external domain. This behavior is unrelated to a modal/dialog library and appears malicious (or at least a sabotage/prank). Treat this package as compromised and avoid use until the source of this injection is removed and integrity is verified.

tempo-x402-node

2.1.2

Live on cargo

Blocked by Socket

Report 2 provides the strongest and most actionable assessment due to highlighting the admin_exec remote command execution risk and related supply-chain implications. The primary risk is high: an attacker with admin token could execute arbitrary commands, potentially compromising data, state, and build environments. Secondary risks arise from other admin tools and data-exposure paths. The recommended path is to eliminate or heavily constrain the admin_exec surface, strengthen authentication and auditing, sandbox privileged operations, and minimize data exposure from endpoints. If kept, implement strict whitelisting, output redaction, and robust monitoring to reduce risk.

viturka-nn

0.1.9

Live on pypi

Blocked by Socket

This module is both buggy and dangerous. It uploads sensitive model weights and an API key to a hard-coded third-party endpoint and performs deserialization of remote-provided data via torch.load, creating a straightforward remote code execution and data-exfiltration vector. Do not use this code as-is; treat the endpoint and response as untrusted and redesign according to secure transfer and validation principles.

mtxai

0.0.157

Live on pypi

Blocked by Socket

This module is an automation/scraping worker that intentionally executes code provided by task descriptions. That design requires trusting the task source. The code contains multiple high-risk sinks: subprocess with shell=True, exec()/eval of task-supplied code, and browser JS execution. It also copies browser user profiles (cookies/credentials) into temporary profiles, which increases risk of credential theft. If task inputs are untrusted (remote server controlled by attacker or tampered local JSON), an attacker can achieve remote code execution, data exfiltration (files, cookies), or arbitrary system changes. Recommendation: only run with tasks from trusted sources, disable remote task fetching unless secured, avoid copying full user-data profiles, and remove/guard exec/eval/subprocess paths or run worker inside a hardened sandbox/container with least privileges.

opux

99.9.9

by ravysena66

Removed from npm

Blocked by Socket

The code likely represents a telemetry or tracking functionality with malicious intent due to the nature of the data being collected and the suspicious hostname. The level of detail and types of information sent pose a serious privacy risk.

Live on npm for 11 hours and 13 minutes before removal. Socket users were protected even while the package was live.

354766/inference-sh/skills/data-visualization/

8d16b1a837a07b7f66b4e74fb8718086a0974758

Live on socket

Blocked by Socket

[Skill Scanner] Pipe-to-shell or eval pattern detected (AITech 9.1.4) [CI013]

bigdl-orca-spark2

2.5.0b20240317

Live on pypi

Blocked by Socket

The code contains potential security risks such as hard-coded file paths, subprocess.Popen usage, and the handling of untrusted data through PyArrow Plasma. It is essential to review and address these security concerns before using this code in a production environment.

aspidites

0.26.2

Live on pypi

Blocked by Socket

The code implements a high-risk dynamic evaluation pattern by evaluating tokens within the caller’s scope. This creates a strong possibility of arbitrary code execution and data leakage if tokens originate from untrusted inputs. Hardening should include removing eval, replacing with safe resolvers, sandboxing, or strict token whitelisting and restricting scope access. This pattern is unsuitable for trusted libraries exposes in open-source supply chains without significant safeguards.

@iflow-ai/iflow-cli

0.2.22-beta.3

by zjhwork2025

Live on npm

Blocked by Socket

This script automatically downloads a JetBrains plugin from a hardcoded external URL (https://cloud[.]iflow[.]cn/iflow-cli/iflow-idea-0[.]0[.]2[.]zip) and extracts it directly into local JetBrains IDE plugins directories without explicit user consent. The code fails to perform cryptographic verification (such as signature or hash checks) of the downloaded ZIP archive before extraction. Furthermore, it aggressively deletes existing plugin directories with the same target name before installation. This automated, unverified download and installation behavior poses a significant security risk, as it allows arbitrary code to be executed within the developer's IDE context, acting as a secondary payload delivery mechanism commonly seen in supply-chain malware.

lab-c

0.1.0

by imbooo

Live on npm

Blocked by Socket

This file implements a remote compile-and-execute service that accepts arbitrary C source from connected clients, compiles it with gcc, executes the resulting binary as the Node process user, and forwards program output back to the client. In its current form it provides remote code execution and easy data exfiltration with no authentication, sandboxing, resource limits, or isolation. Treat this module as high risk: do not run on production or internet-accessible hosts. If intended for safe use, add strong authentication, per-connection isolation, strict resource/lifetime limits, OS-level sandboxing (containers or seccomp), UID mapping, and avoid executing untrusted code as a privileged or long-lived process.

ailever

0.2.721

Live on pypi

Blocked by Socket

The fragment contains a high-risk pattern: it downloads a Python script from a remote source and immediately executes it without integrity verification or sandboxing. This creates a critical supply-chain and remote-code-execution risk, as the remote payload could perform any action on the host, including data exfiltration, credential access, or system compromise. Even though defaults use placeholders, the mechanism itself is unsafe and should be disallowed or hardened (e.g., verify hashes, use signed modules, avoid executing remote code).

@kernel.chat/kbot

3.73.2

by isaacsight

Live on npm

Blocked by Socket

This package is a high-risk installer that patches an AbletonOSC integration to persistently add an OSC endpoint `/live/exec` performing unsandboxed Python `eval`/`exec` on attacker-controlled input. That is effectively a remote code execution backdoor within the Ableton runtime if OSC messages are reachable or spoofable. It also introduces supply-chain risk by cloning and installing an unpinned, unauthenticated repository without integrity checks.

nyc-config

4.4.0

by jpdtestjpd

Removed from npm

Blocked by Socket

This package runs index.js automatically during npm install. That behavior is potentially dangerous because index.js could perform network calls, exfiltrate data, install backdoors, add git hooks, or perform destructive operations. Combined with networking libraries in dependencies, there is a notable risk. You should inspect the contents of index.js (and any files it requires) and verify the package's provenance before installing in sensitive environments.

Live on npm for 2 hours and 6 minutes before removal. Socket users were protected even while the package was live.

procustodibus-agent

1.10.0

Live on pypi

Blocked by Socket

This script is a deliberate disruptive tool that randomly toggles WireGuard interfaces on the host on a repeating schedule. It does not exfiltrate data or attempt stealthy persistence, but its behavior constitutes operational sabotage (intermittent denial-of-service for VPN/network interfaces). If found unexpectedly in a system or dependency, treat it as malicious and remove or quarantine; do not run on production hosts. If intentionally used for testing, restrict execution to isolated environments and review privileges and scheduling.

dhemrdhs92006

1.250722.11131

by ongtrieuhau861.001

Removed from npm

Blocked by Socket

This file implements an unattended update mechanism that fetches and installs .tgz archives from unverified remote sources—both the npm registry (registry[.]npmjs[.]org) and a configurable Firebase-style database URL—by downloading, extracting them into the application directory and then restarting PM2-managed processes. Because there is no cryptographic signature or checksum validation beyond a simple version check, a compromised registry account or database endpoint could deliver arbitrary code to every host running this updater. Additionally, on startup the script gathers extensive system and package metadata—including public IP (via api[.]ipify[.]org), local IP addresses, hostname, OS/platform, Node.js version, CPU/memory statistics, load averages, working directory and package.json fields—and posts it to a configurable Discord webhook endpoint (discordapp[.]com). This behavior poses both a supply-chain risk and a telemetry/privacy exposure risk, as sensitive host information is sent to an external service without explicit user consent or granular control.

Live on npm for 3 hours and 7 minutes before removal. Socket users were protected even while the package was live.

@coryrowe/openclaw-zh

2026.2.13-nightly.202602150333

by cnrowe

Live on npm

Blocked by Socket

The mcporter CLI’s documented capabilities (arbitrary HTTP calls, --stdio process execution, and local credential storage) align with its stated purpose but present a moderate attack surface: misuse can lead to credential leakage or arbitrary code execution if inputs are untrusted or the environment is hostile. The fragment contains no explicit malicious code, obfuscation, or hard-coded attacker infrastructure. Recommended actions: review implementation for secure storage of tokens, minimize or sanitize construction of command strings, consider allowlisting target domains or prompting before sending credentials to unknown endpoints, and audit generated outputs for sensitive data leakage. Treat as functional but moderately risky in adversarial contexts.

@aiyiran/myclaw

1.0.218

by aiyiran

Live on npm

Blocked by Socket

This module is a high-risk supply-chain configuration/credential injection tool. It embeds a hardcoded API key and writes it into the target project configuration while overriding provider/model defaults (and deleting any existing mapping for the same model key). Although the snippet does not itself perform network exfiltration, it implants credentials and redirects how the host application will authenticate and call an external API endpoint, creating significant likelihood of unauthorized usage and potential data exposure depending on downstream request behavior.

github.com/sagernet/sing-box

v1.2.1-0.20230324023316-265e8cb3355d

Live on go

Blocked by Socket

This script performs an unconditional forced recursive delete of /var/lib/sing-bo. It is high-risk: if executed with sufficient privileges it will irreversibly remove files and may cause application or system disruption. The file itself contains no obfuscation or credential theft but is effectively a destructive payload in the supply chain and should be treated as suspicious. Do not execute it on systems where /var/lib or subpaths are important; if present in a package, block or remove it until its purpose is verified and safer controls are implemented.

exp10it

2.5.70

Live on pypi

Blocked by Socket

This file is offensive/exploit tooling: it performs automated reconnaissance, crafts and sends SQLi and PHP eval payloads against Joomla sites, extracts credentials/session data, and attempts to install a PHP webshell for persistence. Those behaviors constitute malicious activity (unauthorized access, credential theft, backdoor installation). Treat this code as malicious/exploitative; do not include it in trusted dependencies or run it on networks you do not own/authorize. The snippet contains some syntactic errors suggesting a truncated copy, but intent and many operational parts are explicit.

carbonorm/carbonphp

16.0.0

Live on composer

Blocked by Socket

Strong concerns about backdoor-like capabilities and broad data/command surfaces inherent in the migration tool. The selfHidingFile HALT_COMPILER payload represents a covert data-serving mechanism that can be triggered via license-protected HTTP requests, constituting a serious supply chain and runtime risk. Recommend removing or thoroughly sanitizing the hidden payload, eliminating HALT-based constructs, replacing license-guarded backdoors with robust authentication, and enforcing strict validation of all remote inputs. If used, isolate the component, implement code reviews, and ensure remote content sources are trusted and auditable.

@pentestleg/core

10.1.2

by pentestleg-test

Live on npm

Blocked by Socket

This code performs explicit, unconditional data exfiltration: it reads /etc/passwd and sends it, along with the current username and hostname, to a hardcoded external domain using a shell-invoked curl command. This is malicious/backdoor behavior. Do not run this code. Treat the containing package as compromised: remove it, investigate the source of the code, and assume potential exposure of host identity and any data contained in /etc/passwd. Rotate any credentials that may have been exposed and audit systems where the package was installed.

ailever

0.2.423

Live on pypi

Blocked by Socket

The code exhibits a dangerous remote code execution pattern: it downloads and immediately runs a remote Python payload without integrity checks, sandboxing, or input validation. This creates a severe supply-chain and runtime security risk. Recommended mitigations include removing dynamic downloads, validating payloads with cryptographic hashes or signatures, using safe subprocess invocations with argument lists, and implementing strict input sanitization. If remote functionality must remain, switch to a trusted-internal mechanism (e.g., plugin architecture with signed components, offline verification) and add robust error handling and logging.

github.com/rclone/rclone

v1.65.1-0.20240107112609-fbdf71ab6456

Live on go

Blocked by Socket

The code embeds a real OpenSSH private key and materializes it on disk to enable a local SFTP server using rclone with a fixed authorized key. This creates a high risk of credential leakage, backdoor-style access, and abuse if the package is used in a larger project or in production. Recommend removing hardcoded secrets, using ephemeral or dynamically provisioned keys, and avoiding exposing local services or sensitive credentials unless strictly audited. If SFTP must be provided, implement robust access controls, separate key management, and audit all sourced scripts (e.g., rclone-serve.bash).

numasec

4.1.0

Live on pypi

Blocked by Socket

The provided fragment is a highly weaponized client-side exploitation and malware-like C2 playbook. It contains explicit session/cookie theft, keylogging/credential harvesting, phishing UI injection, stored-XSS admin takeover with persistence/cover-tracks, data exfiltration, and a BEeF-equivalent command loop that executes attacker-provided JavaScript via eval(cmd.code). If distributed as an OSS dependency or packaging content, it represents an extreme supply-chain and runtime security threat.

yrodevgit/codetazer

v8.2.5

Live on composer

Blocked by Socket

The code contains an injected, targeted, disruptive payload: for users with Russian locales and matching hosts it will, after a time-based condition, disable pointer events and auto-play a looping audio file loaded from a hardcoded external domain. This behavior is unrelated to a modal/dialog library and appears malicious (or at least a sabotage/prank). Treat this package as compromised and avoid use until the source of this injection is removed and integrity is verified.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Possible typosquat attack

Known malware

Git dependency

GitHub dependency

HTTP dependency

Obfuscated code

Suspicious Stars on GitHub

Telemetry

Protestware or potentially unwanted behavior

Unstable ownership

55 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Book a Demo

Questions? Call us at (844) SOCKET-0

Read the blog

Protect every package in your stack

Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.

View all integrations

RUST

crates.io

Rust Package Manager

PHP

Packagist

PHP Package Manager

GOLANG

Go Modules

Go Dependency Management

JAVA

Maven Central

JAVASCRIPT

npm

Node Package Manager

.NET

NuGet

.NET Package Manager

PYTHON

PyPI

Python Package Index

RUBY

RubyGems.org

Ruby Package Manager

SWIFT

Swift

AI

Hugging Face Hub

AI Model Hub

CI

GitHub Actions

CI/CD Workflows

EXTENSIONS

Chrome Web Store

Chrome Browser Extensions

EXTENSIONS

Open VSX

VS Code Extensions

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Nov 23, 2025

Shai Hulud v2

Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.

Nov 05, 2025

Elves on npm

A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.

Jul 04, 2025

RubyGems Automation-Tool Infostealer

Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.

Mar 13, 2025

North Korea's Contagious Interview Campaign

Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.

Jul 23, 2024

Network Reconnaissance Campaign

A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles