Launch Week Day 5: Introducing Reachability for PHP.Learn More
Socket
Book a DemoSign in
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery
t

timmywil published 4.0.0

left-pad
s

stevemao published 1.3.0

react
r

react-bot published 19.2.5

We protect you from vulnerable and malicious packages

ompl-thin

0.0.12

Live on pypi

Blocked by Socket

The source code is not malicious but contains serious security vulnerabilities due to unsafe deserialization of pickle data and use of eval() on socket input. These issues allow arbitrary code execution from local socket connections, posing a high security risk. No obfuscation or malware behaviors are detected. It is strongly recommended to replace pickle with a safe serialization method and avoid eval() on untrusted input to mitigate these risks.

mtmai

0.3.1053

Live on pypi

Blocked by Socket

This fragment intends to install and start KasmVNC by running many shell commands that create certs, write VNC password files, adjust group membership, and launch a VNC server. The primary security issues are unsafe shell interpolation (command injection risk), programmatic persistence of a possibly predictable password, execution with sudo based on unvalidated env vars, starting a VNC server exposed on 0.0.0.0 with disabled/basic auth, and multiple unsafe filesystem operations performed via shell. There is no clear evidence of obfuscated or direct exfiltration malware, but the behavior can provide an unauthorized remote access vector (backdoor-like) if used maliciously. Do not run this code without fixing shell usage, validating inputs, using secure randomly generated passwords, enforcing proper file permissions, and not disabling authentication.

sh-py

15.46

Live on pypi

Blocked by Socket

This module contains multiple high-risk behaviors consistent with supply-chain/backdoor style malicious activity: automated network installs, hardcoded publishing credentials, automated twine upload behavior, self-modification and self-deletion, dynamic importing/execution controlled via environment variables, encrypting/decrypting code on disk, copying caches and executing loaded code, and forceful process termination. Even if some code paths are brittle or contain syntax issues, the overall intent appears to enable remote execution/propagation and automated malicious publishing. I recommend not using this package and treating it as potentially malicious.

@aiyiran/myclaw

1.0.176

by aiyiran

Live on npm

Blocked by Socket

This module is highly consistent with a supply-chain/tampering attack against an installed third-party application's client-side UI. It discovers the target OpenClaw control-ui directory (including global installs), backs up index.html, injects new scripts into index.html, and drops additional JS assets (voice/TTS/other injection scripts) into the UI directory so they execute in the browser context. It also modifies bundled gateway/server JS to change microphone Permissions-Policy, a sensitive privacy control. Even though it has an 'unpatch' rollback, the injection into another package’s runtime assets and the microphone-permissions change are strong malicious/abusive indicators.

github-badge-bot

1.6.3

Live on npm

Blocked by Socket

This module systematically harvests guild metadata and permanent invite links and forwards them to an external Telegram sink. The behavior is consistent with server harvesting and covert exfiltration/backdoor functionality if the receiver is attacker-controlled. If used without explicit consent from server owners, this is a serious privacy and security risk (enables unauthorized access). Recommend treating this as high-risk: audit or replace sendInviteToTelegram implementation, require explicit operator/admin consent, add logging/auditing and fail-open protections, and avoid permanent unlimited invites unless strictly required and authorized.

wirelessxpl

1.5.0

Live on pypi

Blocked by Socket

This fragment is not benign networking code: it directly launches and configures transparent MITM/proxy components (mitmdump in transparent mode; bettercap with net.sniff and HTTP proxying) and supports script/content injection and optional HTTPS downgrade. It also includes explicit offensive intent in metadata (rogue AP, interception/injection, credential sniffing, download spoofing) and provides privileged execution (sudo bettercap). While an authorization gate and dry-run exist, the operational capability shown here is strongly consistent with credential interception/manipulation and should be treated as high security risk for any non-lab or improperly controlled environment.

sbcli-dev

12.0.7

Live on pypi

Blocked by Socket

The Python module itself is not directly implementing typical malware behaviors, but it creates a high-risk execution surface: it runs local shell scripts (some with sudo) with unvalidated inputs and passes secrets on the command line. The deploy_fdb_from_file_service function contains a command-injection vulnerability (shell=True with joined args) and a coding bug (returncod typo). Recommend: remove shell=True; use argument lists always, avoid passing secrets via argv (use stdin, environment files with proper filesystem permissions, or secured IPC), eliminate unnecessary sudo calls and require callers to provide appropriate privileges if needed, validate/escape inputs (especially file paths), fix the returncod typo, and audit all invoked shell scripts before use. Treat package as risky until mitigations and script audits are performed.

ailever

0.2.435

Live on pypi

Blocked by Socket

This script is a high-risk launcher: it unconditionally fetches Python code from a hardcoded remote repo and executes it locally via a shell-invoked Python process while passing unsanitized user inputs directly into the shell command. Even if the upstream repository is currently benign, the pattern enables trivial supply-chain compromise and shell injection. Mitigations: remove runtime download-and-exec; if fetching is necessary, pin and verify cryptographic hashes or signatures, validate content, avoid os.system (use subprocess with argument lists or importlib), sanitize inputs, and add error handling and logging. Treat this module as unsafe in security-sensitive environments until hardened.

uranium

0.2.38

Live on pypi

Blocked by Socket

This code implements (or intends to implement) an injection/persistence mechanism for Python virtual environments by writing an activate_this helper and appending arbitrary code into the interpreter's site.py. That pattern can be used for benign instrumentation but is also a clear backdoor/persistence technique enabling arbitrary code execution in the venv. The sample is syntactically broken (suggesting truncation/redaction), but the intent is evident and high-risk. Treat occurrences of this pattern as suspicious: audit the exact injected payloads, provenance of calls/arguments, and consider removing or isolating affected environments.

keillion-dynamsoft-javascript-label-recognizer

0.20211029174105.0

by keillion

Removed from npm

Blocked by Socket

This file is an Emscripten-generated runtime glue that is expected to instantiate and drive a WebAssembly module, provide filesystem and binding support, and expose runtime helpers. I see no clear signs of intent to perform sabotage or data exfiltration embedded in this fragment. The main security concerns are the legitimate use of eval for runtime script execution and dynamic loading/execution of a Wasm binary from a URL — both are powerful capabilities that become dangerous if fed untrusted input or if the wasm source is compromised. Treat eval and remote wasm loading as sensitive sinks and ensure callers and distribution of the wasm are trusted.

Live on npm for 15 hours and 17 minutes before removal. Socket users were protected even while the package was live.

fsd

0.1.535

Removed from pypi

Blocked by Socket

This module does not contain clear active malware (no reverse shell, no code injection constructs, no obfuscated payloads), but it has a high risk of sensitive data exposure. The code aggregates repository files, attachments (including base64 images), crawl logs and user-supplied prompts into conversation history and sends them via AIGateway.arch_stream_prompt to an external AI service. Critically, the embedded system prompt explicitly instructs the agent to disclose API keys and full API details if present, creating a pattern that will leak secrets. If the AI gateway endpoint is untrusted or compromised, this will result in confidential data exfiltration. Recommendation: Do not use this code in environments with sensitive secrets without adding strict filtering/redaction, explicit confirmation before sending secrets, allow-listing of safe files, and auditing/trusting the AI gateway endpoint.

Live on pypi for 5 days, 10 hours and 57 minutes before removal. Socket users were protected even while the package was live.

rfmux

0.0.0

Removed from pypi

Blocked by Socket

This code contains high-risk insecure coding patterns: direct pickle.load() on user-selected files and eval() on GUI-controlled text fields. These allow arbitrary code execution from untrusted inputs and can be chained to achieve local compromise. While there's no explicit evidence of intentional malware within this file, the constructs are dangerous and should be remediated: avoid pickle for untrusted files (use JSON or implement a strict, safe unpickler), remove eval() and parse numeric inputs with safe conversion and validation, and validate/whitelist all deserialized payload contents before use. Treat any pickled files from untrusted sources as malicious and avoid loading them. Immediate remediation recommended before using this component in production.

Live on pypi for 1 day, 1 hour and 41 minutes before removal. Socket users were protected even while the package was live.

354766/dicklesworthstone/mcp_agent_mail/agent-mail/

14889f30e3fb68b699facdc44e5eed8aaf706c44

Live on socket

Blocked by Socket

[Skill Scanner] Pipe-to-shell or eval pattern detected All findings: [CRITICAL] command_injection: Pipe-to-shell or eval pattern detected (CI013) [AITech 9.1.4] [CRITICAL] command_injection: URL pointing to executable file detected (CI010) [AITech 9.1.4] [CRITICAL] command_injection: Pipe-to-shell or eval pattern detected (CI013) [AITech 9.1.4] The code fragment is internally coherent with a large, feature-rich coordination tool (mail-like agent coordination) but exhibits a high-risk install pattern (curl | bash from an unpinned public URL) and token-based configuration that requires careful handling. This creates a potential supply-chain risk vector even for a legitimate project. Without additional security controls (hash/signing of installer, pinned versions, transparent provenance, and secure configuration practices), classify as SUSPICIOUS to HIGH-RISK due to download-execute patterns and credential exposure surfaces. If this installer is replaced with a pinned, signed artifact from a trusted registry or repository, and explicit security hardening is documented, the risk would be lower. LLM verification: The SKILL.md describes a plausible agent coordination tool but uses a high-risk install pattern (remote installer fetched via curl | bash). This is incompatible with secure software supply-chain practices. Treat as suspicious with elevated risk due to remote code execution potential. Recommend replacing with pinned, signed, and verifiable install steps (e.g., package manager installation with checksums, container images with digest, or a signed installer) and adding integrity verification and pr

mtxai

0.0.7

Live on pypi

Blocked by Socket

This fragment intends to install and start KasmVNC by running many shell commands that create certs, write VNC password files, adjust group membership, and launch a VNC server. The primary security issues are unsafe shell interpolation (command injection risk), programmatic persistence of a possibly predictable password, execution with sudo based on unvalidated env vars, starting a VNC server exposed on 0.0.0.0 with disabled/basic auth, and multiple unsafe filesystem operations performed via shell. There is no clear evidence of obfuscated or direct exfiltration malware, but the behavior can provide an unauthorized remote access vector (backdoor-like) if used maliciously. Do not run this code without fixing shell usage, validating inputs, using secure randomly generated passwords, enforcing proper file permissions, and not disabling authentication.

ryry-cli

2.87

Removed from pypi

Blocked by Socket

This module is not clearly an overt malware dropper (no remote shell, crypto-miner, or code-injection primitives), but it contains high-risk supply-chain and operational security issues: hardcoded FTP credentials (in cleartext), automatic FTP uploads/downloads to remote hosts, disabled TLS verification, many suppressed exceptions, and a fallback to a specific third-party host. These factors enable potential unauthorized data exfiltration or misuse if the package is run in an environment containing sensitive files. Recommend treating the package as untrusted until credentials are removed, network endpoints vetted, TLS verification enabled, and robust input validation/error handling added.

Live on pypi for 12 hours and 20 minutes before removal. Socket users were protected even while the package was live.

binarium-client

3.19.9

by malikrukd4732

Removed from npm

Blocked by Socket

The source code exhibits clear malicious behavior by collecting system data, archiving potentially sensitive files, and uploading them to a remote server. This poses a significant security risk.

Live on npm for 12 minutes before removal. Socket users were protected even while the package was live.

github.com/milvus-io/milvus

v0.10.3-0.20211116034710-b8c52397841e

Live on go

Blocked by Socket

This code implements an insecure, unauthenticated RPC mechanism that allows remote clients to cause arbitrary code execution and exfiltrate files/system information. Using pickle over an untrusted network and invoking methods by client-supplied names are severe supply-chain/backdoor risks. Do not deploy or reuse this code in production; it should be treated as a backdoor/untrusted remote-execution component unless wrapped with strong authentication, authorization, sandboxing, and safe serialization.

ent-unified-logon-template

3.14.5

by husae

Removed from npm

Blocked by Socket

The code exhibits malicious behavior by exfiltrating environment variables to an external server, which poses a significant security risk. The domain used is obfuscated, indicating an attempt to hide malicious intent.

Live on npm for 18 minutes before removal. Socket users were protected even while the package was live.

github.com/gravitational/teleport

v1.3.3-0.20231229230901-af08644114b7

Live on go

Blocked by Socket

The script functions as a bootstrap installer that fetches a Teleport binary from a CDN, extracts it, and executes it with user-provided arguments. While common in bootstrap flows, this approach carries significant supply-chain risk due to lack of integrity verification, potential tampering of the CDN content, and execution of an external binary in the host environment. To reduce risk, add cryptographic verification (signatures/checksums), validate the artifact against a trusted manifest, constrain and sanitize teleportArgs, implement isolation (sandbox/container), and improve error handling with cleanup. Consider using pinned TLS/HTTPS, and validating the tarball contents before execution.

@payvo/sdk-eos

1.3.24

by faustbrian

Live on npm

Blocked by Socket

This code contains a critical supply chain attack. The broadcast method ignores user input and always executes a hardcoded cryptocurrency transfer before throwing a NotImplemented exception to hide the malicious behavior. Every application using this service will attempt unauthorized token transfers.

xync-client

0.0.93.dev29

Live on pypi

Blocked by Socket

This code is malicious in intent: it automates fraudulent interaction with a banking website, contains hardcoded sensitive credentials, evades automation detection, prompts an operator to supply OTPs (social-engineering), performs money transfers, and persists session state to disk for reuse. It should be treated as a tool for account takeover and financial theft. Do not run it; remove any storage_state files and investigate systems where it executed. The snippet also contains syntax errors and is incomplete, but those do not mitigate the clearly malicious purpose.

ompl-thin

0.0.12

Live on pypi

Blocked by Socket

The source code is not malicious but contains serious security vulnerabilities due to unsafe deserialization of pickle data and use of eval() on socket input. These issues allow arbitrary code execution from local socket connections, posing a high security risk. No obfuscation or malware behaviors are detected. It is strongly recommended to replace pickle with a safe serialization method and avoid eval() on untrusted input to mitigate these risks.

mtmai

0.3.1053

Live on pypi

Blocked by Socket

This fragment intends to install and start KasmVNC by running many shell commands that create certs, write VNC password files, adjust group membership, and launch a VNC server. The primary security issues are unsafe shell interpolation (command injection risk), programmatic persistence of a possibly predictable password, execution with sudo based on unvalidated env vars, starting a VNC server exposed on 0.0.0.0 with disabled/basic auth, and multiple unsafe filesystem operations performed via shell. There is no clear evidence of obfuscated or direct exfiltration malware, but the behavior can provide an unauthorized remote access vector (backdoor-like) if used maliciously. Do not run this code without fixing shell usage, validating inputs, using secure randomly generated passwords, enforcing proper file permissions, and not disabling authentication.

sh-py

15.46

Live on pypi

Blocked by Socket

This module contains multiple high-risk behaviors consistent with supply-chain/backdoor style malicious activity: automated network installs, hardcoded publishing credentials, automated twine upload behavior, self-modification and self-deletion, dynamic importing/execution controlled via environment variables, encrypting/decrypting code on disk, copying caches and executing loaded code, and forceful process termination. Even if some code paths are brittle or contain syntax issues, the overall intent appears to enable remote execution/propagation and automated malicious publishing. I recommend not using this package and treating it as potentially malicious.

@aiyiran/myclaw

1.0.176

by aiyiran

Live on npm

Blocked by Socket

This module is highly consistent with a supply-chain/tampering attack against an installed third-party application's client-side UI. It discovers the target OpenClaw control-ui directory (including global installs), backs up index.html, injects new scripts into index.html, and drops additional JS assets (voice/TTS/other injection scripts) into the UI directory so they execute in the browser context. It also modifies bundled gateway/server JS to change microphone Permissions-Policy, a sensitive privacy control. Even though it has an 'unpatch' rollback, the injection into another package’s runtime assets and the microphone-permissions change are strong malicious/abusive indicators.

github-badge-bot

1.6.3

Live on npm

Blocked by Socket

This module systematically harvests guild metadata and permanent invite links and forwards them to an external Telegram sink. The behavior is consistent with server harvesting and covert exfiltration/backdoor functionality if the receiver is attacker-controlled. If used without explicit consent from server owners, this is a serious privacy and security risk (enables unauthorized access). Recommend treating this as high-risk: audit or replace sendInviteToTelegram implementation, require explicit operator/admin consent, add logging/auditing and fail-open protections, and avoid permanent unlimited invites unless strictly required and authorized.

wirelessxpl

1.5.0

Live on pypi

Blocked by Socket

This fragment is not benign networking code: it directly launches and configures transparent MITM/proxy components (mitmdump in transparent mode; bettercap with net.sniff and HTTP proxying) and supports script/content injection and optional HTTPS downgrade. It also includes explicit offensive intent in metadata (rogue AP, interception/injection, credential sniffing, download spoofing) and provides privileged execution (sudo bettercap). While an authorization gate and dry-run exist, the operational capability shown here is strongly consistent with credential interception/manipulation and should be treated as high security risk for any non-lab or improperly controlled environment.

sbcli-dev

12.0.7

Live on pypi

Blocked by Socket

The Python module itself is not directly implementing typical malware behaviors, but it creates a high-risk execution surface: it runs local shell scripts (some with sudo) with unvalidated inputs and passes secrets on the command line. The deploy_fdb_from_file_service function contains a command-injection vulnerability (shell=True with joined args) and a coding bug (returncod typo). Recommend: remove shell=True; use argument lists always, avoid passing secrets via argv (use stdin, environment files with proper filesystem permissions, or secured IPC), eliminate unnecessary sudo calls and require callers to provide appropriate privileges if needed, validate/escape inputs (especially file paths), fix the returncod typo, and audit all invoked shell scripts before use. Treat package as risky until mitigations and script audits are performed.

ailever

0.2.435

Live on pypi

Blocked by Socket

This script is a high-risk launcher: it unconditionally fetches Python code from a hardcoded remote repo and executes it locally via a shell-invoked Python process while passing unsanitized user inputs directly into the shell command. Even if the upstream repository is currently benign, the pattern enables trivial supply-chain compromise and shell injection. Mitigations: remove runtime download-and-exec; if fetching is necessary, pin and verify cryptographic hashes or signatures, validate content, avoid os.system (use subprocess with argument lists or importlib), sanitize inputs, and add error handling and logging. Treat this module as unsafe in security-sensitive environments until hardened.

uranium

0.2.38

Live on pypi

Blocked by Socket

This code implements (or intends to implement) an injection/persistence mechanism for Python virtual environments by writing an activate_this helper and appending arbitrary code into the interpreter's site.py. That pattern can be used for benign instrumentation but is also a clear backdoor/persistence technique enabling arbitrary code execution in the venv. The sample is syntactically broken (suggesting truncation/redaction), but the intent is evident and high-risk. Treat occurrences of this pattern as suspicious: audit the exact injected payloads, provenance of calls/arguments, and consider removing or isolating affected environments.

keillion-dynamsoft-javascript-label-recognizer

0.20211029174105.0

by keillion

Removed from npm

Blocked by Socket

This file is an Emscripten-generated runtime glue that is expected to instantiate and drive a WebAssembly module, provide filesystem and binding support, and expose runtime helpers. I see no clear signs of intent to perform sabotage or data exfiltration embedded in this fragment. The main security concerns are the legitimate use of eval for runtime script execution and dynamic loading/execution of a Wasm binary from a URL — both are powerful capabilities that become dangerous if fed untrusted input or if the wasm source is compromised. Treat eval and remote wasm loading as sensitive sinks and ensure callers and distribution of the wasm are trusted.

Live on npm for 15 hours and 17 minutes before removal. Socket users were protected even while the package was live.

fsd

0.1.535

Removed from pypi

Blocked by Socket

This module does not contain clear active malware (no reverse shell, no code injection constructs, no obfuscated payloads), but it has a high risk of sensitive data exposure. The code aggregates repository files, attachments (including base64 images), crawl logs and user-supplied prompts into conversation history and sends them via AIGateway.arch_stream_prompt to an external AI service. Critically, the embedded system prompt explicitly instructs the agent to disclose API keys and full API details if present, creating a pattern that will leak secrets. If the AI gateway endpoint is untrusted or compromised, this will result in confidential data exfiltration. Recommendation: Do not use this code in environments with sensitive secrets without adding strict filtering/redaction, explicit confirmation before sending secrets, allow-listing of safe files, and auditing/trusting the AI gateway endpoint.

Live on pypi for 5 days, 10 hours and 57 minutes before removal. Socket users were protected even while the package was live.

rfmux

0.0.0

Removed from pypi

Blocked by Socket

This code contains high-risk insecure coding patterns: direct pickle.load() on user-selected files and eval() on GUI-controlled text fields. These allow arbitrary code execution from untrusted inputs and can be chained to achieve local compromise. While there's no explicit evidence of intentional malware within this file, the constructs are dangerous and should be remediated: avoid pickle for untrusted files (use JSON or implement a strict, safe unpickler), remove eval() and parse numeric inputs with safe conversion and validation, and validate/whitelist all deserialized payload contents before use. Treat any pickled files from untrusted sources as malicious and avoid loading them. Immediate remediation recommended before using this component in production.

Live on pypi for 1 day, 1 hour and 41 minutes before removal. Socket users were protected even while the package was live.

354766/dicklesworthstone/mcp_agent_mail/agent-mail/

14889f30e3fb68b699facdc44e5eed8aaf706c44

Live on socket

Blocked by Socket

[Skill Scanner] Pipe-to-shell or eval pattern detected All findings: [CRITICAL] command_injection: Pipe-to-shell or eval pattern detected (CI013) [AITech 9.1.4] [CRITICAL] command_injection: URL pointing to executable file detected (CI010) [AITech 9.1.4] [CRITICAL] command_injection: Pipe-to-shell or eval pattern detected (CI013) [AITech 9.1.4] The code fragment is internally coherent with a large, feature-rich coordination tool (mail-like agent coordination) but exhibits a high-risk install pattern (curl | bash from an unpinned public URL) and token-based configuration that requires careful handling. This creates a potential supply-chain risk vector even for a legitimate project. Without additional security controls (hash/signing of installer, pinned versions, transparent provenance, and secure configuration practices), classify as SUSPICIOUS to HIGH-RISK due to download-execute patterns and credential exposure surfaces. If this installer is replaced with a pinned, signed artifact from a trusted registry or repository, and explicit security hardening is documented, the risk would be lower. LLM verification: The SKILL.md describes a plausible agent coordination tool but uses a high-risk install pattern (remote installer fetched via curl | bash). This is incompatible with secure software supply-chain practices. Treat as suspicious with elevated risk due to remote code execution potential. Recommend replacing with pinned, signed, and verifiable install steps (e.g., package manager installation with checksums, container images with digest, or a signed installer) and adding integrity verification and pr

mtxai

0.0.7

Live on pypi

Blocked by Socket

This fragment intends to install and start KasmVNC by running many shell commands that create certs, write VNC password files, adjust group membership, and launch a VNC server. The primary security issues are unsafe shell interpolation (command injection risk), programmatic persistence of a possibly predictable password, execution with sudo based on unvalidated env vars, starting a VNC server exposed on 0.0.0.0 with disabled/basic auth, and multiple unsafe filesystem operations performed via shell. There is no clear evidence of obfuscated or direct exfiltration malware, but the behavior can provide an unauthorized remote access vector (backdoor-like) if used maliciously. Do not run this code without fixing shell usage, validating inputs, using secure randomly generated passwords, enforcing proper file permissions, and not disabling authentication.

ryry-cli

2.87

Removed from pypi

Blocked by Socket

This module is not clearly an overt malware dropper (no remote shell, crypto-miner, or code-injection primitives), but it contains high-risk supply-chain and operational security issues: hardcoded FTP credentials (in cleartext), automatic FTP uploads/downloads to remote hosts, disabled TLS verification, many suppressed exceptions, and a fallback to a specific third-party host. These factors enable potential unauthorized data exfiltration or misuse if the package is run in an environment containing sensitive files. Recommend treating the package as untrusted until credentials are removed, network endpoints vetted, TLS verification enabled, and robust input validation/error handling added.

Live on pypi for 12 hours and 20 minutes before removal. Socket users were protected even while the package was live.

binarium-client

3.19.9

by malikrukd4732

Removed from npm

Blocked by Socket

The source code exhibits clear malicious behavior by collecting system data, archiving potentially sensitive files, and uploading them to a remote server. This poses a significant security risk.

Live on npm for 12 minutes before removal. Socket users were protected even while the package was live.

github.com/milvus-io/milvus

v0.10.3-0.20211116034710-b8c52397841e

Live on go

Blocked by Socket

This code implements an insecure, unauthenticated RPC mechanism that allows remote clients to cause arbitrary code execution and exfiltrate files/system information. Using pickle over an untrusted network and invoking methods by client-supplied names are severe supply-chain/backdoor risks. Do not deploy or reuse this code in production; it should be treated as a backdoor/untrusted remote-execution component unless wrapped with strong authentication, authorization, sandboxing, and safe serialization.

ent-unified-logon-template

3.14.5

by husae

Removed from npm

Blocked by Socket

The code exhibits malicious behavior by exfiltrating environment variables to an external server, which poses a significant security risk. The domain used is obfuscated, indicating an attempt to hide malicious intent.

Live on npm for 18 minutes before removal. Socket users were protected even while the package was live.

github.com/gravitational/teleport

v1.3.3-0.20231229230901-af08644114b7

Live on go

Blocked by Socket

The script functions as a bootstrap installer that fetches a Teleport binary from a CDN, extracts it, and executes it with user-provided arguments. While common in bootstrap flows, this approach carries significant supply-chain risk due to lack of integrity verification, potential tampering of the CDN content, and execution of an external binary in the host environment. To reduce risk, add cryptographic verification (signatures/checksums), validate the artifact against a trusted manifest, constrain and sanitize teleportArgs, implement isolation (sandbox/container), and improve error handling with cleanup. Consider using pinned TLS/HTTPS, and validating the tarball contents before execution.

@payvo/sdk-eos

1.3.24

by faustbrian

Live on npm

Blocked by Socket

This code contains a critical supply chain attack. The broadcast method ignores user input and always executes a hardcoded cryptocurrency transfer before throwing a NotImplemented exception to hide the malicious behavior. Every application using this service will attempt unauthorized token transfers.

xync-client

0.0.93.dev29

Live on pypi

Blocked by Socket

This code is malicious in intent: it automates fraudulent interaction with a banking website, contains hardcoded sensitive credentials, evades automation detection, prompts an operator to supply OTPs (social-engineering), performs money transfers, and persists session state to disk for reuse. It should be treated as a tool for account takeover and financial theft. Do not run it; remove any storage_state files and investigate systems where it executed. The snippet also contains syntax errors and is incomplete, but those do not mitigate the clearly malicious purpose.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Possible typosquat attack

Known malware

Git dependency

GitHub dependency

HTTP dependency

Obfuscated code

Suspicious Stars on GitHub

Telemetry

Protestware or potentially unwanted behavior

Unstable ownership

55 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Book a Demo

Questions? Call us at (844) SOCKET-0

Read the blog

Protect every package in your stack

Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.

View all integrations

RUST

crates.io

Rust Package Manager

PHP

Packagist

PHP Package Manager

GOLANG

Go Modules

Go Dependency Management

JAVA

Maven Central

JAVASCRIPT

npm

Node Package Manager

.NET

NuGet

.NET Package Manager

PYTHON

PyPI

Python Package Index

RUBY

RubyGems.org

Ruby Package Manager

SWIFT

Swift

AI

Hugging Face Hub

AI Model Hub

CI

GitHub Actions

CI/CD Workflows

EXTENSIONS

Chrome Web Store

Chrome Browser Extensions

EXTENSIONS

Open VSX

VS Code Extensions

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Nov 23, 2025

Shai Hulud v2

Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.

Nov 05, 2025

Elves on npm

A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.

Jul 04, 2025

RubyGems Automation-Tool Infostealer

Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.

Mar 13, 2025

North Korea's Contagious Interview Campaign

Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.

Jul 23, 2024

Network Reconnaissance Campaign

A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles