Launch Week Day 5: Introducing Reachability for PHP.Learn More
Socket
Book a DemoSign in
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery
t

timmywil published 4.0.0

left-pad
s

stevemao published 1.3.0

react
r

react-bot published 19.2.5

We protect you from vulnerable and malicious packages

@energysolutions/mylib

99999999.999999.999999

by zoeovpz

Live on npm

Blocked by Socket

The code exhibits behaviors typical of malware, such as unauthorized data collection and transmission to an external server. The use of a Discord webhook for data exfiltration is particularly concerning. The provided reports are placeholders and do not offer any analysis, necessitating a reevaluation based on the code's behavior.

njongto_duo

0.0.73

by zon

Live on rubygems

Blocked by Socket

`njongto_duo` pitches itself as a Windows-only autoposter for Naver stock-discussion rooms (종목토론방) and Kakao OpenTalk channels, targeting grey-hat promoters who want to flood finance forums with ticker hype. When executed it opens a Korean-language Glimmer-DSL-LibUI dialog that asks for the operator’s Naver ID and password. The instant those credentials are submitted (before any posting begins) the script silently bundles the plaintext ID, password, and the host’s MAC address, then exfiltrates the package via HTTP POST to http://appspace[.]kr/bbs/login_check.php, an endpoint controlled by the zon threat actor. The MAC address doubles as a hardware fingerprint, letting the threat actor correlate victims across multiple installations and campaigns. Although the gem does run its promised stock-forum spam routine, this covert exfiltration turns `njongto_duo` into an infostealer: users hoping to amplify market chatter instead surrender their own sensitive credentials to the threat actor behind the wider “zon” malware cluster.

ai-dispatch

8.27.2

Live on cargo

Blocked by Socket

Significant supply-chain and runtime risk due to load_hooks() forcibly marking all hooks as trusted, combined with shell-based command execution and payload piping. If hooks.toml or CLI specs are compromised, attackers can execute arbitrary commands with access to task payloads. Improve by removing unconditional trust elevation, implementing provenance-based trust (e.g., digital signatures or origin checks), and replacing shell invocation with safer, explicit process execution with strict argument validation. Consider isolating hook execution and minimizing payload exposure to hooks.

@link-assistant/hive-mind

1.54.7

by GitHub Actions

Live on npm

Blocked by Socket

This module contains a critical supply-chain remote code execution mechanism: at load time it fetches JavaScript from a public CDN (unpkg) and executes it via eval to populate globalThis.use, with no integrity/pinning. This is high-confidence malicious/sabotage/backdoor behavior risk. The remaining code is largely model mapping/validation and optional metadata fetching, but it is overshadowed by the eval(fetch(...)) bootstrap.

create-wcd

0.6.6

by muryoh

Live on npm

Blocked by Socket

This code fragment contains multiple independently high-risk behaviors: (1) a Windows/WSL execution path that launches PowerShell with ExecutionPolicy Bypass and EncodedCommand (encoded payload execution), (2) a TCP port-probing helper using repeated net.createConnection attempts, and (3) a Firebase auth UI that serializes the OAuth/Firebase credential and places it into window.location.search as base64 in a URL query parameter. These patterns strongly suggest malicious launcher/exfiltration intent rather than benign utility functionality. Additional parts of the bundle appear to be unrelated helper libraries, but they do not explain away the credential-in-URL and encoded PowerShell execution.

omniroute

3.3.5

by diegosouza.pw

Live on npm

Blocked by Socket

This module contains a high-impact cloud synchronization mechanism that can exfiltrate apiKeys and provider credential material to an environment-controlled external endpoint using a stable machine identifier derived from OS fingerprinting. It also appears to propagate provider secret fields from the cloud back into local storage, creating a remote configuration/secret injection path. Although request validation and cookie parsing look normal, the secret-bearing sync behavior and system identifier collection are strong security red flags and require review, allowlisting of destinations, and minimization/authorization controls.

cl-lite

1.0.1077

by michael_tian

Live on npm

Blocked by Socket

This SQLite database file contains embedded explicit adult content and torrent distribution infrastructure instead of legitimate data. The file includes extensive HTML fragments with pornographic video metadata, download links to torrent files, and suspicious redirect URLs. Key malicious domains identified include rmdown[.]com, redircdn[.]com, 97p[.]org, qpic[.]ws, imgbox[.]com, and various other image hosting services. The content contains hash values for torrent files, BitTorrent magnet links, and obfuscated download URLs using multiple redirect layers to mask the true destinations. This represents a supply chain attack where adult content distribution infrastructure has been embedded within what appears to be a standard database file, potentially exposing users to inappropriate content and malicious download sites when accessed.

mcs-landings-blocks

5.9872.0

Removed from npm

Blocked by Socket

The script is designed to send critical system information and environment variables to an external server, which is highly suspicious and indicative of malicious behavior.

Live on npm for 44 minutes before removal. Socket users were protected even while the package was live.

harnessos

0.1.5

Live on pypi

Blocked by Socket

This fragment implements a surveillance/privacy-invasive behavior: upon receiving 'action' runtime messages, it activates the sender tab, posts arbitrary action data to a local HTTP endpoint, captures the currently visible tab as a PNG, base64-encodes it, and posts the screenshot to another local endpoint. While using localhost limits remote exposure, the absence of sender trust checks, user-consent gating, authentication, and payload validation means it could be readily abused by other extension components or a compromised message source. Review is strongly recommended before use.

@topolabs/inpage-providers-hub

2.3.2

by huanxiangspace

Live on npm

Blocked by Socket

This module contains malicious code designed to hijack cryptocurrency transactions on HyperLiquid-based decentralized applications. It activates only on specific sites and employs aggressive runtime patching: it pollutes the global `Object.prototype` to intercept `useContext` calls and overrides `Object.keys`. These hooks inspect in-memory objects for order-related structures (checking for specific fields like `hyperliquid.order_type` or order arrays). When a matching order object is found, the code silently mutates it to inject a `builder` field containing a hardcoded address and fee rate. This behavior effectively diverts trading fees or affiliate rewards to the malicious actor.

ailever

0.2.361

Live on pypi

Blocked by Socket

The code exhibits a dangerous remote code execution pattern: it downloads and immediately runs a remote Python payload without integrity checks, sandboxing, or input validation. This creates a severe supply-chain and runtime security risk. Recommended mitigations include removing dynamic downloads, validating payloads with cryptographic hashes or signatures, using safe subprocess invocations with argument lists, and implementing strict input sanitization. If remote functionality must remain, switch to a trusted-internal mechanism (e.g., plugin architecture with signed components, offline verification) and add robust error handling and logging.

fray

3.5.13

Live on pypi

Blocked by Socket

This file is a high-risk catalog of HTML dangling-markup payloads explicitly designed to bypass CSP/script restrictions and exfiltrate page content to an attacker-controlled domain. Treat entries as malicious input: do not render or store them where they could reach HTML rendering contexts without strict sanitization and CSP. Remediation: remove or quarantine the catalog if not required for legitimate testing, sanitize/escape user input, enforce strict CSP and origin restrictions for resource/form targets, and audit any places that reflect user-supplied HTML.

lifetime-agent

1.73.3

by ds-soave

Removed from npm

Blocked by Socket

The code is highly suspicious as it exfiltrates all environment variables to an external server, which could include sensitive information such as API keys, database credentials, etc. This behavior is indicative of malicious intent.

Live on npm for 1 day, 11 hours and 28 minutes before removal. Socket users were protected even while the package was live.

cl-lite

1.0.1136

by michael_tian

Live on npm

Blocked by Socket

This SQLite database file contains embedded explicit adult content and torrent distribution infrastructure instead of legitimate data. The file includes extensive HTML fragments with pornographic video metadata, download links to torrent files, and suspicious redirect URLs. Key malicious domains identified include rmdown[.]com, redircdn[.]com, 97p[.]org, qpic[.]ws, imgbox[.]com, and various other image hosting services. The content contains hash values for torrent files, BitTorrent magnet links, and obfuscated download URLs using multiple redirect layers to mask the true destinations. This represents a supply chain attack where adult content distribution infrastructure has been embedded within what appears to be a standard database file, potentially exposing users to inappropriate content and malicious download sites when accessed.

cnatool

1.3.4

by robertolsmonteiro

Live on npm

Blocked by Socket

High-risk and strongly suspicious: this code fragment implements a dual-environment script compiler/interpreter that converts external/untrusted content into JavaScript and executes it directly (core.eval, vm.Script.runInThisContext, and browser <script> injection). It also includes a filesystem-to-eval function and can load remote script sources over the network, with helper utilities that can support persistence and data packaging. Treat as an arbitrary code execution engine/backdoor-like behavior unless tightly sandboxed and provenance-verified.

myconfusedfunctionpoctestpackage

1.0.6

by bigibson4228

Removed from npm

Blocked by Socket

This script pings a remote endpoint and then sends the collected output to a remote server via curl (e.g., https://1c6c-34-168-173-48[.]ngrok-free[.]app), potentially exfiltrating network and system data without authorization. This behavior poses a security risk and suggests malicious activity.

Live on npm for 9 days, 8 hours and 58 minutes before removal. Socket users were protected even while the package was live.

wc-grid-table

1.2.8

by ropp90

Live on npm

Blocked by Socket

This module contains a high-impact client-side arbitrary code execution primitive. It deserializes function-like strings from attacker-controlled sources (URL query parameters and the options HTML attribute) and turns them into executable JavaScript via new Function. It also persists function source back into the URL, enabling repeatable exploitation via crafted links. This is a strong indicator of malicious capability or, at minimum, an extremely dangerous design that should not be used with untrusted input.

lazyllm

0.7.6a0

Live on pypi

Blocked by Socket

The code contains insecure patterns that enable remote code execution: it unpickles data directly from HTTP responses (both streaming and full responses) after base64 decoding. This is the primary dangerous behavior. Combined with dynamic URL sourcing from Redis and transmission of pickled runtime data in headers, the module can be abused by a malicious or compromised remote server to execute arbitrary code and exfiltrate data. There is no clear sign the author intended malicious behavior, but the insecure deserialization makes the package dangerous to use against untrusted servers or in environments where Redis or endpoints may be controlled by attackers. Recommend not using this code as-is in untrusted settings; replace pickle-based network deserialization with a safe format or verify/cryptographically sign serialized payloads.

github.com/An0nUD4Y/Evilginx2-Phishlets

v0.0.0-20230209183941-e000f77b4d12

Live on go

Blocked by Socket

This code is a highly malicious phishing/reverse-proxy configuration targeting real blockchain.com/blockchain.info login flows. It harvests user credentials and uses injected JavaScript to automate backup/recovery UI actions, scrape the resulting recovery phrase from the DOM, and exfiltrate it via POST to an attacker endpoint ('/backupwords'). It also rewrites navigation to keep victims on the capture flow and redirects after exfiltration to reduce detection. Immediate remediation is warranted; the artifact should not be used.

buildkite-test-collector-jest-example

99.99.10

by iamrjarpan

Live on npm

Blocked by Socket

The snippet collects sensitive runtime and environment data (including the entire process.env) and exfiltrates it via two network channels (DNS and HTTP) to an attacker-controlled domain. The behavior is consistent with covert data exfiltration / supply-chain backdoor. This should be classified as malicious: remove the package, investigate exposures, rotate secrets, and block related network egress.

github.com/yaklang/yaklang

v1.2.8-0.20231012060649-9c4f7cbcda52

Live on go

Blocked by Socket

WebLogic CORBA/IIOP exploitation framework containing hardcoded exploit payloads for binding/rebinding remote objects and executing remote constructor payloads. The code implements multi-stage attacks including backdoor installation capabilities through serialized Java bytecode injection. Contains embedded hex-encoded payloads targeting WebLogic internal classes (weblogic[.]corba[.]cos[.]naming[.]NamingContextAny) and CORBA naming contexts. Functionality includes remote command execution through getServerLocation method calls and JNDI manipulation attacks. While this is legitimate penetration testing code within a security framework, the presence of ready-to-use exploit payloads and backdoor installation mechanisms represents unusual patterns that security tools should flag for review.

powerinfer-server

0.1.4

Removed from pypi

Blocked by Socket

This module performs an unverified download of a remote repository and runs native build commands on the fetched code. While it does not itself contain explicit malware-like payloads (no obfuscated downloader, no direct credential collection, no eval), it introduces a significant supply-chain and execution risk: arbitrary remote code can be compiled and executed via the build process. Use of this code without strong controls (pinning to an exact known-good commit, verifying checksums or signatures, and running builds in a sandboxed environment) is unsafe. The observed bug (returning 'Non') should be fixed.

Live on pypi for 5 hours and 22 minutes before removal. Socket users were protected even while the package was live.

lavavu

1.9.5

Live on pypi

Blocked by Socket

This code implements an unauthenticated HTTP control surface for a viewer object that accepts arbitrary commands from request paths and bodies, dynamically looks up and calls attributes on internal objects, loads JSON from requests and triggers callbacks, and serves local files. These behaviors make it high risk for supply-chain or runtime compromise: untrusted clients can invoke methods and mutate state which could lead to data exfiltration, filesystem access, or other damaging actions depending on the viewer's API. It should not be exposed to untrusted networks or used without strict authentication/authorization and input validation.

@energysolutions/mylib

99999999.999999.999999

by zoeovpz

Live on npm

Blocked by Socket

The code exhibits behaviors typical of malware, such as unauthorized data collection and transmission to an external server. The use of a Discord webhook for data exfiltration is particularly concerning. The provided reports are placeholders and do not offer any analysis, necessitating a reevaluation based on the code's behavior.

njongto_duo

0.0.73

by zon

Live on rubygems

Blocked by Socket

`njongto_duo` pitches itself as a Windows-only autoposter for Naver stock-discussion rooms (종목토론방) and Kakao OpenTalk channels, targeting grey-hat promoters who want to flood finance forums with ticker hype. When executed it opens a Korean-language Glimmer-DSL-LibUI dialog that asks for the operator’s Naver ID and password. The instant those credentials are submitted (before any posting begins) the script silently bundles the plaintext ID, password, and the host’s MAC address, then exfiltrates the package via HTTP POST to http://appspace[.]kr/bbs/login_check.php, an endpoint controlled by the zon threat actor. The MAC address doubles as a hardware fingerprint, letting the threat actor correlate victims across multiple installations and campaigns. Although the gem does run its promised stock-forum spam routine, this covert exfiltration turns `njongto_duo` into an infostealer: users hoping to amplify market chatter instead surrender their own sensitive credentials to the threat actor behind the wider “zon” malware cluster.

ai-dispatch

8.27.2

Live on cargo

Blocked by Socket

Significant supply-chain and runtime risk due to load_hooks() forcibly marking all hooks as trusted, combined with shell-based command execution and payload piping. If hooks.toml or CLI specs are compromised, attackers can execute arbitrary commands with access to task payloads. Improve by removing unconditional trust elevation, implementing provenance-based trust (e.g., digital signatures or origin checks), and replacing shell invocation with safer, explicit process execution with strict argument validation. Consider isolating hook execution and minimizing payload exposure to hooks.

@link-assistant/hive-mind

1.54.7

by GitHub Actions

Live on npm

Blocked by Socket

This module contains a critical supply-chain remote code execution mechanism: at load time it fetches JavaScript from a public CDN (unpkg) and executes it via eval to populate globalThis.use, with no integrity/pinning. This is high-confidence malicious/sabotage/backdoor behavior risk. The remaining code is largely model mapping/validation and optional metadata fetching, but it is overshadowed by the eval(fetch(...)) bootstrap.

create-wcd

0.6.6

by muryoh

Live on npm

Blocked by Socket

This code fragment contains multiple independently high-risk behaviors: (1) a Windows/WSL execution path that launches PowerShell with ExecutionPolicy Bypass and EncodedCommand (encoded payload execution), (2) a TCP port-probing helper using repeated net.createConnection attempts, and (3) a Firebase auth UI that serializes the OAuth/Firebase credential and places it into window.location.search as base64 in a URL query parameter. These patterns strongly suggest malicious launcher/exfiltration intent rather than benign utility functionality. Additional parts of the bundle appear to be unrelated helper libraries, but they do not explain away the credential-in-URL and encoded PowerShell execution.

omniroute

3.3.5

by diegosouza.pw

Live on npm

Blocked by Socket

This module contains a high-impact cloud synchronization mechanism that can exfiltrate apiKeys and provider credential material to an environment-controlled external endpoint using a stable machine identifier derived from OS fingerprinting. It also appears to propagate provider secret fields from the cloud back into local storage, creating a remote configuration/secret injection path. Although request validation and cookie parsing look normal, the secret-bearing sync behavior and system identifier collection are strong security red flags and require review, allowlisting of destinations, and minimization/authorization controls.

cl-lite

1.0.1077

by michael_tian

Live on npm

Blocked by Socket

This SQLite database file contains embedded explicit adult content and torrent distribution infrastructure instead of legitimate data. The file includes extensive HTML fragments with pornographic video metadata, download links to torrent files, and suspicious redirect URLs. Key malicious domains identified include rmdown[.]com, redircdn[.]com, 97p[.]org, qpic[.]ws, imgbox[.]com, and various other image hosting services. The content contains hash values for torrent files, BitTorrent magnet links, and obfuscated download URLs using multiple redirect layers to mask the true destinations. This represents a supply chain attack where adult content distribution infrastructure has been embedded within what appears to be a standard database file, potentially exposing users to inappropriate content and malicious download sites when accessed.

mcs-landings-blocks

5.9872.0

Removed from npm

Blocked by Socket

The script is designed to send critical system information and environment variables to an external server, which is highly suspicious and indicative of malicious behavior.

Live on npm for 44 minutes before removal. Socket users were protected even while the package was live.

harnessos

0.1.5

Live on pypi

Blocked by Socket

This fragment implements a surveillance/privacy-invasive behavior: upon receiving 'action' runtime messages, it activates the sender tab, posts arbitrary action data to a local HTTP endpoint, captures the currently visible tab as a PNG, base64-encodes it, and posts the screenshot to another local endpoint. While using localhost limits remote exposure, the absence of sender trust checks, user-consent gating, authentication, and payload validation means it could be readily abused by other extension components or a compromised message source. Review is strongly recommended before use.

@topolabs/inpage-providers-hub

2.3.2

by huanxiangspace

Live on npm

Blocked by Socket

This module contains malicious code designed to hijack cryptocurrency transactions on HyperLiquid-based decentralized applications. It activates only on specific sites and employs aggressive runtime patching: it pollutes the global `Object.prototype` to intercept `useContext` calls and overrides `Object.keys`. These hooks inspect in-memory objects for order-related structures (checking for specific fields like `hyperliquid.order_type` or order arrays). When a matching order object is found, the code silently mutates it to inject a `builder` field containing a hardcoded address and fee rate. This behavior effectively diverts trading fees or affiliate rewards to the malicious actor.

ailever

0.2.361

Live on pypi

Blocked by Socket

The code exhibits a dangerous remote code execution pattern: it downloads and immediately runs a remote Python payload without integrity checks, sandboxing, or input validation. This creates a severe supply-chain and runtime security risk. Recommended mitigations include removing dynamic downloads, validating payloads with cryptographic hashes or signatures, using safe subprocess invocations with argument lists, and implementing strict input sanitization. If remote functionality must remain, switch to a trusted-internal mechanism (e.g., plugin architecture with signed components, offline verification) and add robust error handling and logging.

fray

3.5.13

Live on pypi

Blocked by Socket

This file is a high-risk catalog of HTML dangling-markup payloads explicitly designed to bypass CSP/script restrictions and exfiltrate page content to an attacker-controlled domain. Treat entries as malicious input: do not render or store them where they could reach HTML rendering contexts without strict sanitization and CSP. Remediation: remove or quarantine the catalog if not required for legitimate testing, sanitize/escape user input, enforce strict CSP and origin restrictions for resource/form targets, and audit any places that reflect user-supplied HTML.

lifetime-agent

1.73.3

by ds-soave

Removed from npm

Blocked by Socket

The code is highly suspicious as it exfiltrates all environment variables to an external server, which could include sensitive information such as API keys, database credentials, etc. This behavior is indicative of malicious intent.

Live on npm for 1 day, 11 hours and 28 minutes before removal. Socket users were protected even while the package was live.

cl-lite

1.0.1136

by michael_tian

Live on npm

Blocked by Socket

This SQLite database file contains embedded explicit adult content and torrent distribution infrastructure instead of legitimate data. The file includes extensive HTML fragments with pornographic video metadata, download links to torrent files, and suspicious redirect URLs. Key malicious domains identified include rmdown[.]com, redircdn[.]com, 97p[.]org, qpic[.]ws, imgbox[.]com, and various other image hosting services. The content contains hash values for torrent files, BitTorrent magnet links, and obfuscated download URLs using multiple redirect layers to mask the true destinations. This represents a supply chain attack where adult content distribution infrastructure has been embedded within what appears to be a standard database file, potentially exposing users to inappropriate content and malicious download sites when accessed.

cnatool

1.3.4

by robertolsmonteiro

Live on npm

Blocked by Socket

High-risk and strongly suspicious: this code fragment implements a dual-environment script compiler/interpreter that converts external/untrusted content into JavaScript and executes it directly (core.eval, vm.Script.runInThisContext, and browser <script> injection). It also includes a filesystem-to-eval function and can load remote script sources over the network, with helper utilities that can support persistence and data packaging. Treat as an arbitrary code execution engine/backdoor-like behavior unless tightly sandboxed and provenance-verified.

myconfusedfunctionpoctestpackage

1.0.6

by bigibson4228

Removed from npm

Blocked by Socket

This script pings a remote endpoint and then sends the collected output to a remote server via curl (e.g., https://1c6c-34-168-173-48[.]ngrok-free[.]app), potentially exfiltrating network and system data without authorization. This behavior poses a security risk and suggests malicious activity.

Live on npm for 9 days, 8 hours and 58 minutes before removal. Socket users were protected even while the package was live.

wc-grid-table

1.2.8

by ropp90

Live on npm

Blocked by Socket

This module contains a high-impact client-side arbitrary code execution primitive. It deserializes function-like strings from attacker-controlled sources (URL query parameters and the options HTML attribute) and turns them into executable JavaScript via new Function. It also persists function source back into the URL, enabling repeatable exploitation via crafted links. This is a strong indicator of malicious capability or, at minimum, an extremely dangerous design that should not be used with untrusted input.

lazyllm

0.7.6a0

Live on pypi

Blocked by Socket

The code contains insecure patterns that enable remote code execution: it unpickles data directly from HTTP responses (both streaming and full responses) after base64 decoding. This is the primary dangerous behavior. Combined with dynamic URL sourcing from Redis and transmission of pickled runtime data in headers, the module can be abused by a malicious or compromised remote server to execute arbitrary code and exfiltrate data. There is no clear sign the author intended malicious behavior, but the insecure deserialization makes the package dangerous to use against untrusted servers or in environments where Redis or endpoints may be controlled by attackers. Recommend not using this code as-is in untrusted settings; replace pickle-based network deserialization with a safe format or verify/cryptographically sign serialized payloads.

github.com/An0nUD4Y/Evilginx2-Phishlets

v0.0.0-20230209183941-e000f77b4d12

Live on go

Blocked by Socket

This code is a highly malicious phishing/reverse-proxy configuration targeting real blockchain.com/blockchain.info login flows. It harvests user credentials and uses injected JavaScript to automate backup/recovery UI actions, scrape the resulting recovery phrase from the DOM, and exfiltrate it via POST to an attacker endpoint ('/backupwords'). It also rewrites navigation to keep victims on the capture flow and redirects after exfiltration to reduce detection. Immediate remediation is warranted; the artifact should not be used.

buildkite-test-collector-jest-example

99.99.10

by iamrjarpan

Live on npm

Blocked by Socket

The snippet collects sensitive runtime and environment data (including the entire process.env) and exfiltrates it via two network channels (DNS and HTTP) to an attacker-controlled domain. The behavior is consistent with covert data exfiltration / supply-chain backdoor. This should be classified as malicious: remove the package, investigate exposures, rotate secrets, and block related network egress.

github.com/yaklang/yaklang

v1.2.8-0.20231012060649-9c4f7cbcda52

Live on go

Blocked by Socket

WebLogic CORBA/IIOP exploitation framework containing hardcoded exploit payloads for binding/rebinding remote objects and executing remote constructor payloads. The code implements multi-stage attacks including backdoor installation capabilities through serialized Java bytecode injection. Contains embedded hex-encoded payloads targeting WebLogic internal classes (weblogic[.]corba[.]cos[.]naming[.]NamingContextAny) and CORBA naming contexts. Functionality includes remote command execution through getServerLocation method calls and JNDI manipulation attacks. While this is legitimate penetration testing code within a security framework, the presence of ready-to-use exploit payloads and backdoor installation mechanisms represents unusual patterns that security tools should flag for review.

powerinfer-server

0.1.4

Removed from pypi

Blocked by Socket

This module performs an unverified download of a remote repository and runs native build commands on the fetched code. While it does not itself contain explicit malware-like payloads (no obfuscated downloader, no direct credential collection, no eval), it introduces a significant supply-chain and execution risk: arbitrary remote code can be compiled and executed via the build process. Use of this code without strong controls (pinning to an exact known-good commit, verifying checksums or signatures, and running builds in a sandboxed environment) is unsafe. The observed bug (returning 'Non') should be fixed.

Live on pypi for 5 hours and 22 minutes before removal. Socket users were protected even while the package was live.

lavavu

1.9.5

Live on pypi

Blocked by Socket

This code implements an unauthenticated HTTP control surface for a viewer object that accepts arbitrary commands from request paths and bodies, dynamically looks up and calls attributes on internal objects, loads JSON from requests and triggers callbacks, and serves local files. These behaviors make it high risk for supply-chain or runtime compromise: untrusted clients can invoke methods and mutate state which could lead to data exfiltration, filesystem access, or other damaging actions depending on the viewer's API. It should not be exposed to untrusted networks or used without strict authentication/authorization and input validation.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Possible typosquat attack

Known malware

Git dependency

GitHub dependency

HTTP dependency

Obfuscated code

Suspicious Stars on GitHub

Telemetry

Protestware or potentially unwanted behavior

Unstable ownership

55 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Book a Demo

Questions? Call us at (844) SOCKET-0

Read the blog

Protect every package in your stack

Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.

View all integrations

RUST

crates.io

Rust Package Manager

PHP

Packagist

PHP Package Manager

GOLANG

Go Modules

Go Dependency Management

JAVA

Maven Central

JAVASCRIPT

npm

Node Package Manager

.NET

NuGet

.NET Package Manager

PYTHON

PyPI

Python Package Index

RUBY

RubyGems.org

Ruby Package Manager

SWIFT

Swift

AI

Hugging Face Hub

AI Model Hub

CI

GitHub Actions

CI/CD Workflows

EXTENSIONS

Chrome Web Store

Chrome Browser Extensions

EXTENSIONS

Open VSX

VS Code Extensions

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Nov 23, 2025

Shai Hulud v2

Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.

Nov 05, 2025

Elves on npm

A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.

Jul 04, 2025

RubyGems Automation-Tool Infostealer

Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.

Mar 13, 2025

North Korea's Contagious Interview Campaign

Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.

Jul 23, 2024

Network Reconnaissance Campaign

A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles