Launch Week Day 5: Introducing Reachability for PHP.Learn More
Socket
Book a DemoSign in
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery
t

timmywil published 4.0.0

left-pad
s

stevemao published 1.3.0

react
r

react-bot published 19.2.5

We protect you from vulnerable and malicious packages

xync-client

0.0.124

Live on pypi

Blocked by Socket

This script is high-risk: it automates interactive login flows, captures and persists full browser storage_state (session tokens), and navigates authenticated sessions to banking/payment endpoints. The combination enables account takeover and fraudulent transactions when misused. Treat as malicious or at minimum dangerous automation; require immediate review, restrict execution, and audit any stored agent.state entries. Remediate by removing session persistence, not storing storage_state, and implementing strict access controls and logging.

browsergui

0.0.9.2

Live on pypi

Blocked by Socket

This code implements a high-risk persistent remote command-and-control mechanism: it continuously polls '/command' and evals the server response, and provides an outbound event POST to '/event'. That combination enables remote arbitrary script execution in the browser and potential data exfiltration. Treat this as malicious or dangerously insecure unless there is a strong, explicit, and well-audited trust model with cryptographic signing, authentication, and strict validation. Replace eval-based execution with a safe, validated command dispatch mechanism.

esoftplay

0.0.126-s

by danang

Live on npm

Blocked by Socket

This module/script is a build/publish utility for an Expo/esoftplay application and performs expected local file and build operations. However, it contains an embedded telemetry/exfiltration function (tm) that sends project metadata and local user@host information to a hardcoded Telegram bot token/chat. That is a sensitive, potentially malicious behavior (data exfiltration) and represents a significant supply-chain risk. Remove or disable the tm() call (or the hardcoded token), and audit any exec/copy/rm usage before trusting this script.

bane

4.0.1

Live on pypi

Blocked by Socket

This module is an offensive DDoS/traffic-flooding toolkit. It implements many well-known attack techniques (floods, spoofing, reflection/amplification, slow HTTP attacks, Cloudflare bypass, proxy/Tor anonymization) and is designed to send large volumes of traffic to targets and to leverage third-party services/proxies. It is malicious software and should not be used. Installation or execution may expose the host to legal risk, resource exhaustion, and likely require privileged/network capabilities to run many functions.

cmds-py

0.136

Live on pypi

Blocked by Socket

This script contains multiple high-risk and likely malicious behaviors: it writes hardcoded PyPI credentials to /root/.pypirc, self-modifies its source to persist parameters, executes arbitrary shell commands via subprocess shell=True, attempts to overwrite installed package code (apscheduler) and register an atexit handler intended to inject code into site-packages. Even though parts of the code appear buggy or malformed, the intent and many working operations constitute a supply-chain/backdoor risk. Do not run this code in a trusted environment; treat as malicious and avoid installing or publishing packages produced by it.

@starvale-sdk/orkut-mutasi

0.0.1

by starvale-sdk

Live on npm

Blocked by Socket

The fragment exhibits clear data collection of sensitive device/app information, signs the payload, and exfiltrates it to a remote endpoint. The heavy obfuscation and dynamic key construction serve to conceal data flows and destination endpoints, consistent with telemetry, credential harvesting, or backdoor-like behavior. While some telemetry can be legitimate, the combination of obfuscation, credential-like tokens, and external network leakage constitutes privacy and security risk that warrants caution and further auditing.

pyopenrpa

1.1.20

Live on pypi

Blocked by Socket

The code contains a security risk due to the lack of input validation and sanitization, potentially leading to unauthorized actions or misuse. There are no clear indications of obfuscation or malware in this code.

imagecomponents.win32.imaging

4.0.5

by Image Components

Live on nuget

Blocked by Socket

This assembly contains strong indicators of malicious behavior: heavy obfuscation, embedded encrypted resources, runtime decryption, and native APIs used to allocate/write executable memory and modify runtime method pointers (JIT/module patching). Those behaviors enable in-memory code loading and execution and/or modification of other processes/modules. This is not normal for a benign barcode encoder component and represents a high supply-chain risk. Avoid using this package and treat it as highly suspicious; further dynamic analysis in an isolated sandbox is recommended to confirm actual payload actions.

cyberops-test-package

99.9.9

Removed from npm

Blocked by Socket

The code exhibits clear signs of malicious behavior by exfiltrating system information using DNS queries and altering DNS settings. This poses a significant security risk.

Live on npm for 55 minutes before removal. Socket users were protected even while the package was live.

bluelamp-ai

0.45.4

Live on pypi

Blocked by Socket

This module unambiguously performs immediate execution of an opaque, compressed and base64-encoded payload at import time. That behavior is a high-risk pattern strongly associated with malicious droppers/backdoors in supply-chain attacks. Until the decompressed code is safely decoded and audited, this module should be considered dangerous and untrusted. Do not import or run it in production; perform offline sandbox analysis to determine exact behavior.

thispackagedoesnotexist

0.8.6

Removed from pypi

Blocked by Socket

The code poses a significant risk to users due to its ability to extract sensitive data from browsers without consent and potentially conduct malicious activities.

Live on pypi for 1 hour and 31 minutes before removal. Socket users were protected even while the package was live.

354766/inference-sh-6/skills/storyboard-creation/

199a5bd37dd82eb1cb2dadc4f081d42a4bec6745

Live on socket

Blocked by Socket

[Skill Scanner] Pipe-to-shell or eval pattern detected All findings: [CRITICAL] command_injection: Pipe-to-shell or eval pattern detected (CI013) [AITech 9.1.4] [CRITICAL] command_injection: Natural language instruction to download and install from URL detected (CI009) [AITech 9.1.4] [CRITICAL] command_injection: Natural language instruction to download and install from URL detected (CI009) [AITech 9.1.4] The package documentation and examples are consistent with a legitimate storyboard creation skill that relies on hosted AI inference services. The primary security concern is supply-chain and data-exfiltration risk: the docs encourage a pipe-to-shell installer and rely on third-party hosted binaries and backends (dist.inference.sh and inference.sh). This creates a moderate security risk if the remote hosts or installer are compromised. There is no direct evidence in the provided file of embedded malware or obfuscated malicious code, but the installation and credential/data-upload patterns warrant caution: verify installers and checksums, inspect scripts before executing, and assume prompts/images/credentials may be transmitted to third-party services. LLM verification: The skill is functionally coherent: it documents a legitimate storyboard workflow that uses a third-party image-generation CLI (infsh). The primary security issues are supply-chain and data-exfiltration risks: (1) it instructs users to run an unpinned curl|sh installer that downloads and executes a binary from dist.inference.sh (objectively high-risk), and (2) it routes prompts, images, and login credentials to a third-party service rather than performing work locally. There is no direct evidenc

sino-msw-tool

1.2.2

by arvin.zhu

Removed from npm

Blocked by Socket

The code contains a potential security risk due to dynamic CSS style injection without proper validation. It is important to validate and sanitize CSS content before injecting it into the document.

Live on npm for 24 minutes before removal. Socket users were protected even while the package was live.

py-ayiin

0.4.4.dev31

Live on pypi

Blocked by Socket

This module implements interactive session generation but also harvests highly sensitive secrets (API_ID/API_HASH, phone number OTP, 2FA password) and exports the resulting Telegram string session, transmitting it to a remote chat and pinning it. It also forces created accounts to join specific channels. This behavior constitutes credential exfiltration and a backdoor/supply-chain risk. Do not run or trust this module unless you fully control both the bot that receives the messages and the code; treat it as malicious for most threat models.

resul-angularsdk-rr

0.0.8

by resulticks

Removed from npm

Blocked by Socket

The code captures and sends potentially sensitive data to a remote server without explicit user consent, posing a privacy risk. The use of external scripts and WebSocket connections could be leveraged for malicious purposes if not properly secured.

Live on npm for 12 minutes before removal. Socket users were protected even while the package was live.

ierbase

1.2.0

by 17b4a931

Removed from npm

Blocked by Socket

This code poses a serious security risk and should not be used.

whisper-ai-zxs

0.2.9

Live on pypi

Blocked by Socket

Hardcoded OpenAI API key exposed in source code (sk-proj-MsUkxNYAeWY5UogJ3v8CT3BlbkFJdoLGQKm9GCVjYCzFY0C9) with API calls redirected to suspicious non-official endpoint (http://e78e9fddbd7d736f363e6314d1b70180[.]api-forwards[.]com/v1) instead of the legitimate OpenAI API. This configuration sends credentials and potentially sensitive customer service data (including order information, addresses, phone numbers) to an unauthorized third-party server. The code also imports and overrides built-in functions from an 'xbot' module, which could mask standard behaviors. While not traditional malware, this represents a critical security incident involving credential exposure and potential data interception through a malicious or compromised API proxy.

mtmai

0.5.34

Live on pypi

Blocked by Socket

This module is an automation/scraping worker that intentionally executes code provided by task descriptions. That design requires trusting the task source. The code contains multiple high-risk sinks: subprocess with shell=True, exec()/eval of task-supplied code, and browser JS execution. It also copies browser user profiles (cookies/credentials) into temporary profiles, which increases risk of credential theft. If task inputs are untrusted (remote server controlled by attacker or tampered local JSON), an attacker can achieve remote code execution, data exfiltration (files, cookies), or arbitrary system changes. Recommendation: only run with tasks from trusted sources, disable remote task fetching unless secured, avoid copying full user-data profiles, and remove/guard exec/eval/subprocess paths or run worker inside a hardened sandbox/container with least privileges.

github.com/milvus-io/milvus

v0.10.3-0.20220107094140-f2baa987fb73

Live on go

Blocked by Socket

This code implements an insecure, unauthenticated RPC mechanism that allows remote clients to cause arbitrary code execution and exfiltrate files/system information. Using pickle over an untrusted network and invoking methods by client-supplied names are severe supply-chain/backdoor risks. Do not deploy or reuse this code in production; it should be treated as a backdoor/untrusted remote-execution component unless wrapped with strong authentication, authorization, sandboxing, and safe serialization.

sensadway

0.1

Live on pypi

Blocked by Socket

This setup.py executes an obfuscated command at import/installation time via a dynamically-resolved os.system call. Even though the specific payload decodes to the benign 'calc' command, the use of string-obfuscation and eval to hide execution is a high-risk indicator of supply-chain maliciousness. Treat this package as suspicious: do not install it in trusted environments; require manual review or removal of the offending code before use.

cl-lite

1.0.1114

by michael_tian

Live on npm

Blocked by Socket

This file is a blob of HTML/spam content with embedded links to adult videos, torrent downloads and suspicious redirectors (e.g. https://2023[.]redircdn[.]com/?…, http://rmdown[.]com/link[.]php?hash=…, http://data[.]down2048[.]com/list[.]php?…), plus numerous third-party image URLs. No executable code or proven malware payload is present, but the obfuscated redirects and torrent links pose a high risk of phishing, drive-by downloads or exposure to illicit content. Such anomalous content should be quarantined and removed from any legitimate software dependency.

free-star-stable-accounts-with-10k-star-coins-2023-looker-studio717

1.0.2

Removed from npm

Blocked by Socket

The code defines a function that checks if a string is equal to a suspicious value, and exports that value. This code could be an attempt to trick someone into running it by using a suspicious variable name.

Live on npm for 4 days, 6 hours and 28 minutes before removal. Socket users were protected even while the package was live.

xync-client

0.0.124

Live on pypi

Blocked by Socket

This script is high-risk: it automates interactive login flows, captures and persists full browser storage_state (session tokens), and navigates authenticated sessions to banking/payment endpoints. The combination enables account takeover and fraudulent transactions when misused. Treat as malicious or at minimum dangerous automation; require immediate review, restrict execution, and audit any stored agent.state entries. Remediate by removing session persistence, not storing storage_state, and implementing strict access controls and logging.

browsergui

0.0.9.2

Live on pypi

Blocked by Socket

This code implements a high-risk persistent remote command-and-control mechanism: it continuously polls '/command' and evals the server response, and provides an outbound event POST to '/event'. That combination enables remote arbitrary script execution in the browser and potential data exfiltration. Treat this as malicious or dangerously insecure unless there is a strong, explicit, and well-audited trust model with cryptographic signing, authentication, and strict validation. Replace eval-based execution with a safe, validated command dispatch mechanism.

esoftplay

0.0.126-s

by danang

Live on npm

Blocked by Socket

This module/script is a build/publish utility for an Expo/esoftplay application and performs expected local file and build operations. However, it contains an embedded telemetry/exfiltration function (tm) that sends project metadata and local user@host information to a hardcoded Telegram bot token/chat. That is a sensitive, potentially malicious behavior (data exfiltration) and represents a significant supply-chain risk. Remove or disable the tm() call (or the hardcoded token), and audit any exec/copy/rm usage before trusting this script.

bane

4.0.1

Live on pypi

Blocked by Socket

This module is an offensive DDoS/traffic-flooding toolkit. It implements many well-known attack techniques (floods, spoofing, reflection/amplification, slow HTTP attacks, Cloudflare bypass, proxy/Tor anonymization) and is designed to send large volumes of traffic to targets and to leverage third-party services/proxies. It is malicious software and should not be used. Installation or execution may expose the host to legal risk, resource exhaustion, and likely require privileged/network capabilities to run many functions.

cmds-py

0.136

Live on pypi

Blocked by Socket

This script contains multiple high-risk and likely malicious behaviors: it writes hardcoded PyPI credentials to /root/.pypirc, self-modifies its source to persist parameters, executes arbitrary shell commands via subprocess shell=True, attempts to overwrite installed package code (apscheduler) and register an atexit handler intended to inject code into site-packages. Even though parts of the code appear buggy or malformed, the intent and many working operations constitute a supply-chain/backdoor risk. Do not run this code in a trusted environment; treat as malicious and avoid installing or publishing packages produced by it.

@starvale-sdk/orkut-mutasi

0.0.1

by starvale-sdk

Live on npm

Blocked by Socket

The fragment exhibits clear data collection of sensitive device/app information, signs the payload, and exfiltrates it to a remote endpoint. The heavy obfuscation and dynamic key construction serve to conceal data flows and destination endpoints, consistent with telemetry, credential harvesting, or backdoor-like behavior. While some telemetry can be legitimate, the combination of obfuscation, credential-like tokens, and external network leakage constitutes privacy and security risk that warrants caution and further auditing.

pyopenrpa

1.1.20

Live on pypi

Blocked by Socket

The code contains a security risk due to the lack of input validation and sanitization, potentially leading to unauthorized actions or misuse. There are no clear indications of obfuscation or malware in this code.

imagecomponents.win32.imaging

4.0.5

by Image Components

Live on nuget

Blocked by Socket

This assembly contains strong indicators of malicious behavior: heavy obfuscation, embedded encrypted resources, runtime decryption, and native APIs used to allocate/write executable memory and modify runtime method pointers (JIT/module patching). Those behaviors enable in-memory code loading and execution and/or modification of other processes/modules. This is not normal for a benign barcode encoder component and represents a high supply-chain risk. Avoid using this package and treat it as highly suspicious; further dynamic analysis in an isolated sandbox is recommended to confirm actual payload actions.

cyberops-test-package

99.9.9

Removed from npm

Blocked by Socket

The code exhibits clear signs of malicious behavior by exfiltrating system information using DNS queries and altering DNS settings. This poses a significant security risk.

Live on npm for 55 minutes before removal. Socket users were protected even while the package was live.

bluelamp-ai

0.45.4

Live on pypi

Blocked by Socket

This module unambiguously performs immediate execution of an opaque, compressed and base64-encoded payload at import time. That behavior is a high-risk pattern strongly associated with malicious droppers/backdoors in supply-chain attacks. Until the decompressed code is safely decoded and audited, this module should be considered dangerous and untrusted. Do not import or run it in production; perform offline sandbox analysis to determine exact behavior.

thispackagedoesnotexist

0.8.6

Removed from pypi

Blocked by Socket

The code poses a significant risk to users due to its ability to extract sensitive data from browsers without consent and potentially conduct malicious activities.

Live on pypi for 1 hour and 31 minutes before removal. Socket users were protected even while the package was live.

354766/inference-sh-6/skills/storyboard-creation/

199a5bd37dd82eb1cb2dadc4f081d42a4bec6745

Live on socket

Blocked by Socket

[Skill Scanner] Pipe-to-shell or eval pattern detected All findings: [CRITICAL] command_injection: Pipe-to-shell or eval pattern detected (CI013) [AITech 9.1.4] [CRITICAL] command_injection: Natural language instruction to download and install from URL detected (CI009) [AITech 9.1.4] [CRITICAL] command_injection: Natural language instruction to download and install from URL detected (CI009) [AITech 9.1.4] The package documentation and examples are consistent with a legitimate storyboard creation skill that relies on hosted AI inference services. The primary security concern is supply-chain and data-exfiltration risk: the docs encourage a pipe-to-shell installer and rely on third-party hosted binaries and backends (dist.inference.sh and inference.sh). This creates a moderate security risk if the remote hosts or installer are compromised. There is no direct evidence in the provided file of embedded malware or obfuscated malicious code, but the installation and credential/data-upload patterns warrant caution: verify installers and checksums, inspect scripts before executing, and assume prompts/images/credentials may be transmitted to third-party services. LLM verification: The skill is functionally coherent: it documents a legitimate storyboard workflow that uses a third-party image-generation CLI (infsh). The primary security issues are supply-chain and data-exfiltration risks: (1) it instructs users to run an unpinned curl|sh installer that downloads and executes a binary from dist.inference.sh (objectively high-risk), and (2) it routes prompts, images, and login credentials to a third-party service rather than performing work locally. There is no direct evidenc

sino-msw-tool

1.2.2

by arvin.zhu

Removed from npm

Blocked by Socket

The code contains a potential security risk due to dynamic CSS style injection without proper validation. It is important to validate and sanitize CSS content before injecting it into the document.

Live on npm for 24 minutes before removal. Socket users were protected even while the package was live.

py-ayiin

0.4.4.dev31

Live on pypi

Blocked by Socket

This module implements interactive session generation but also harvests highly sensitive secrets (API_ID/API_HASH, phone number OTP, 2FA password) and exports the resulting Telegram string session, transmitting it to a remote chat and pinning it. It also forces created accounts to join specific channels. This behavior constitutes credential exfiltration and a backdoor/supply-chain risk. Do not run or trust this module unless you fully control both the bot that receives the messages and the code; treat it as malicious for most threat models.

resul-angularsdk-rr

0.0.8

by resulticks

Removed from npm

Blocked by Socket

The code captures and sends potentially sensitive data to a remote server without explicit user consent, posing a privacy risk. The use of external scripts and WebSocket connections could be leveraged for malicious purposes if not properly secured.

Live on npm for 12 minutes before removal. Socket users were protected even while the package was live.

ierbase

1.2.0

by 17b4a931

Removed from npm

Blocked by Socket

This code poses a serious security risk and should not be used.

whisper-ai-zxs

0.2.9

Live on pypi

Blocked by Socket

Hardcoded OpenAI API key exposed in source code (sk-proj-MsUkxNYAeWY5UogJ3v8CT3BlbkFJdoLGQKm9GCVjYCzFY0C9) with API calls redirected to suspicious non-official endpoint (http://e78e9fddbd7d736f363e6314d1b70180[.]api-forwards[.]com/v1) instead of the legitimate OpenAI API. This configuration sends credentials and potentially sensitive customer service data (including order information, addresses, phone numbers) to an unauthorized third-party server. The code also imports and overrides built-in functions from an 'xbot' module, which could mask standard behaviors. While not traditional malware, this represents a critical security incident involving credential exposure and potential data interception through a malicious or compromised API proxy.

mtmai

0.5.34

Live on pypi

Blocked by Socket

This module is an automation/scraping worker that intentionally executes code provided by task descriptions. That design requires trusting the task source. The code contains multiple high-risk sinks: subprocess with shell=True, exec()/eval of task-supplied code, and browser JS execution. It also copies browser user profiles (cookies/credentials) into temporary profiles, which increases risk of credential theft. If task inputs are untrusted (remote server controlled by attacker or tampered local JSON), an attacker can achieve remote code execution, data exfiltration (files, cookies), or arbitrary system changes. Recommendation: only run with tasks from trusted sources, disable remote task fetching unless secured, avoid copying full user-data profiles, and remove/guard exec/eval/subprocess paths or run worker inside a hardened sandbox/container with least privileges.

github.com/milvus-io/milvus

v0.10.3-0.20220107094140-f2baa987fb73

Live on go

Blocked by Socket

This code implements an insecure, unauthenticated RPC mechanism that allows remote clients to cause arbitrary code execution and exfiltrate files/system information. Using pickle over an untrusted network and invoking methods by client-supplied names are severe supply-chain/backdoor risks. Do not deploy or reuse this code in production; it should be treated as a backdoor/untrusted remote-execution component unless wrapped with strong authentication, authorization, sandboxing, and safe serialization.

sensadway

0.1

Live on pypi

Blocked by Socket

This setup.py executes an obfuscated command at import/installation time via a dynamically-resolved os.system call. Even though the specific payload decodes to the benign 'calc' command, the use of string-obfuscation and eval to hide execution is a high-risk indicator of supply-chain maliciousness. Treat this package as suspicious: do not install it in trusted environments; require manual review or removal of the offending code before use.

cl-lite

1.0.1114

by michael_tian

Live on npm

Blocked by Socket

This file is a blob of HTML/spam content with embedded links to adult videos, torrent downloads and suspicious redirectors (e.g. https://2023[.]redircdn[.]com/?…, http://rmdown[.]com/link[.]php?hash=…, http://data[.]down2048[.]com/list[.]php?…), plus numerous third-party image URLs. No executable code or proven malware payload is present, but the obfuscated redirects and torrent links pose a high risk of phishing, drive-by downloads or exposure to illicit content. Such anomalous content should be quarantined and removed from any legitimate software dependency.

free-star-stable-accounts-with-10k-star-coins-2023-looker-studio717

1.0.2

Removed from npm

Blocked by Socket

The code defines a function that checks if a string is equal to a suspicious value, and exports that value. This code could be an attempt to trick someone into running it by using a suspicious variable name.

Live on npm for 4 days, 6 hours and 28 minutes before removal. Socket users were protected even while the package was live.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Possible typosquat attack

Known malware

Git dependency

GitHub dependency

HTTP dependency

Obfuscated code

Suspicious Stars on GitHub

Telemetry

Protestware or potentially unwanted behavior

Unstable ownership

55 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Book a Demo

Questions? Call us at (844) SOCKET-0

Read the blog

Protect every package in your stack

Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.

View all integrations

RUST

crates.io

Rust Package Manager

PHP

Packagist

PHP Package Manager

GOLANG

Go Modules

Go Dependency Management

JAVA

Maven Central

JAVASCRIPT

npm

Node Package Manager

.NET

NuGet

.NET Package Manager

PYTHON

PyPI

Python Package Index

RUBY

RubyGems.org

Ruby Package Manager

SWIFT

Swift

AI

Hugging Face Hub

AI Model Hub

CI

GitHub Actions

CI/CD Workflows

EXTENSIONS

Chrome Web Store

Chrome Browser Extensions

EXTENSIONS

Open VSX

VS Code Extensions

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Nov 23, 2025

Shai Hulud v2

Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.

Nov 05, 2025

Elves on npm

A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.

Jul 04, 2025

RubyGems Automation-Tool Infostealer

Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.

Mar 13, 2025

North Korea's Contagious Interview Campaign

Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.

Jul 23, 2024

Network Reconnaissance Campaign

A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles