Launch Week Day 5: Introducing Reachability for PHP.Learn More
Socket
Book a DemoSign in
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery
t

timmywil published 4.0.0

left-pad
s

stevemao published 1.3.0

react
r

react-bot published 19.2.5

We protect you from vulnerable and malicious packages

devduck

1.15.2

Live on pypi

Blocked by Socket

This module is a security-sensitive distributed control/coordination component that can execute DevDuck agent logic based directly on untrusted UDP multicast “command” text, then streams and returns results/errors over the network. There is no authentication, authorization, or command allowlisting in this module, and it also prints untrusted streamed output to stdout. In hostile or multi-tenant network environments, it should be considered a high-risk remote-trigger capability and reviewed/segmented with strong access controls (e.g., authenticated transport, peer allowlisting, and strict command validation).

azure-jobs

0.1.25

Live on pypi

Blocked by Socket

Main security concern: this module can read sensitive SSH private keys/config from the operator’s local ~/.ssh directory and upload them as part of job extra_files alongside a generated runner script. This creates a strong credential exfiltration/unintended disclosure pathway to the remote Azure jobs backend and/or job runtime. Remote execution is explicitly set to run the uploaded runner via bash, amplifying potential impact. Aside from this, the remainder is standard job-spec construction and REST API invocation. Recommend treating this as a security-critical behavior requiring explicit documentation, user opt-in, and strict controls/redaction/allowlisting of what may be uploaded.

filecat

5.50.7

by xiaobaidadada

Live on npm

Blocked by Socket

Overall, this code fragment shows several high-risk behaviors that are inconsistent with a benign utility library: (1) runtime download and extraction of a native binary (ripgrep) without integrity verification; (2) dynamic JavaScript execution for workflows (vm.runInContext) potentially influenced by configuration/user-controlled data; (3) PTY-based execution of workflow commands; and (4) a full tunneling/VPN-like networking subsystem (HTTP/TCP/HTTPS tunnel/TUN packet forwarding). These patterns match capability-rich remote access tooling more than a standard dependency. While parts of the system appear to enforce authorization via userService checks, the presence of RCE-capable workflow execution and remote tunneling makes the security posture extremely sensitive. Additional context (how workflow YAML/step content is sourced and permissioned; whether proxy/tunnel endpoints are restricted) is required to determine exploitability, but malicious intent or compromise risk is substantial.

@pyme-web/web-api

99.0.4

by m0ntanatony

Live on npm

Blocked by Socket

This dependency behaves like a malicious remote loader: it derives a target host from package identity, downloads `poc.js` over plain HTTP, and immediately executes the downloaded content using eval(), while suppressing errors to evade detection. Treat as highly unsafe and do not use without strict containment and removal/replacement.

gh555.paste-everything

16.2.1

by kkn1n

Live on openvsx

Blocked by Socket

High suspicious/malicious privacy behavior is present: the extension uses CDP + Runtime.evaluate to read document.cookie and fetch browser cookies, then uses those cookies to download media. Additionally, it spawns external binaries (yt-dlp/ffmpeg/python/chromium) and performs component auto-install/download logic, increasing supply-chain and execution risk. Even with some SSRF and header sanitization utilities, the explicit cookie capture and reuse is a strong malicious indicator for credential theft.

apple-app-store-server-library-poc

133.7.1

by cketol

Live on npm

Blocked by Socket

The preinstall script actively collects sensitive environment and system information (env, routing, user, uptime, hostname, platform) and posts it to an external webhook. This is unauthorized telemetry/data exfiltration and is malicious or at minimum grossly privacy-invasive. Installing this package would leak host-specific details to a third party and could be leveraged for follow-on attacks.

hueflow-sketchup-mcp

0.1.0

Live on pypi

Blocked by Socket

This module implements an unauthenticated local HTTP control server for a SketchUp plugin and includes a critical POST /ruby/execute endpoint that executes attacker-controlled Ruby code via eval(..., TOPLEVEL_BINDING). Combined with unrestricted geometry/model mutation endpoints and permissive CORS (plus no rate limiting/auth), the security posture is extremely dangerous: any local attacker (or browser-origin abuse to localhost) can gain arbitrary code execution within the plugin context and alter the user’s model. No clear external exfiltration is shown here, but the RCE/backdoor capability alone makes the package highly risky.

ghbomber

1.0.3

by ghostsenderserver

Live on npm

Blocked by Socket

This configuration is for an email-sending/automation tool with many features commonly used by phishing and spam operators (bulk SMTP, IP rotation, obfuscation, disguising attachments, proxy support). The JSON itself is not executable code or obviously obfuscated, but it enables a high-risk activity (bulk delivery of potentially deceptive emails). Treat this package and its upstream application as high-risk for abuse; if you did not expect or authorize mass-mailing functionality, do not deploy it and audit surrounding code. If present in a public package, consider it suspicious and review repository history and maintainers.

azure-jobs

0.1.26

Live on pypi

Blocked by Socket

Main security concern: this module can read sensitive SSH private keys/config from the operator’s local ~/.ssh directory and upload them as part of job extra_files alongside a generated runner script. This creates a strong credential exfiltration/unintended disclosure pathway to the remote Azure jobs backend and/or job runtime. Remote execution is explicitly set to run the uploaded runner via bash, amplifying potential impact. Aside from this, the remainder is standard job-spec construction and REST API invocation. Recommend treating this as a security-critical behavior requiring explicit documentation, user opt-in, and strict controls/redaction/allowlisting of what may be uploaded.

ghbomber

1.0.3

by ghostsenderserver

Live on npm

Blocked by Socket

This module behaves like an obfuscation/payload packer: it compresses caller-provided content with zlib, transforms it through custom binary/chunk/position encoding with randomized keys, and returns a dynamically constructed JavaScript decoder/loader string. The generated code includes loader-like indicators (external path pattern and DOM-manipulation keywords), which is consistent with malicious droppers or supply-chain payload concealment. No direct network or execution occurs inside this snippet, but the produced artifact is suitable for injection/execution by downstream consumers, making it high-risk for a software supply chain.

azure-jobs

0.1.24

Live on pypi

Blocked by Socket

Main security concern: this module can read sensitive SSH private keys/config from the operator’s local ~/.ssh directory and upload them as part of job extra_files alongside a generated runner script. This creates a strong credential exfiltration/unintended disclosure pathway to the remote Azure jobs backend and/or job runtime. Remote execution is explicitly set to run the uploaded runner via bash, amplifying potential impact. Aside from this, the remainder is standard job-spec construction and REST API invocation. Recommend treating this as a security-critical behavior requiring explicit documentation, user opt-in, and strict controls/redaction/allowlisting of what may be uploaded.

plumber-agent

1.0.17

Live on pypi

Blocked by Socket

This module is a high-risk command dispatcher that reads untrusted JSON from a filesystem queue and executes the 'command' field using unrestricted Python exec() with the nuke API available. If the command file (or its path) can be influenced by an attacker, it effectively functions as an RCE/backdoor mechanism. It also captures and returns stdout and logs command previews/tracebacks, increasing the likelihood of data exposure. No explicit malicious payload is present in this fragment, but the design itself is strongly suspicious and dangerous for any dependency shipped to untrusted environments.

titan-agent

5.4.1

by djtony707

Live on npm

Blocked by Socket

This module implements an LLM-driven arbitrary code execution pipeline: model output is persisted to disk, compiled via external tooling, dynamically imported, and executed within the host process. The implemented safety checks are narrow and do not provide real sandboxing or comprehensive malicious-behavior prevention. From a supply-chain/security standpoint, this is a high-risk design that should only run with strong isolation/allowlisting and strict trust in the model/provider outputs.

renance-dt

3.0.0

Live on pypi

Blocked by Socket

This module is highly suspicious due to explicit Windows WiFi credential recovery (netsh wlan ... key=clear) and direct printing of the extracted WiFi passwords/keys, constituting credential theft/disclosure. It also adds persistence-like PATH modification (Unix rc files / Windows registry user Path) and includes runtime pip upgrade functionality that can execute untrusted code from the supply chain. While several functions are ordinary system introspection, the wifi() behavior and persistence/supply-chain elements materially increase the risk. Treat the package as unsafe unless thoroughly sandboxed and its packaging provenance is independently verified.

azure-jobs

0.1.27

Live on pypi

Blocked by Socket

Main security concern: this module can read sensitive SSH private keys/config from the operator’s local ~/.ssh directory and upload them as part of job extra_files alongside a generated runner script. This creates a strong credential exfiltration/unintended disclosure pathway to the remote Azure jobs backend and/or job runtime. Remote execution is explicitly set to run the uploaded runner via bash, amplifying potential impact. Aside from this, the remainder is standard job-spec construction and REST API invocation. Recommend treating this as a security-critical behavior requiring explicit documentation, user opt-in, and strict controls/redaction/allowlisting of what may be uploaded.

plumber-agent

1.0.17

Live on pypi

Blocked by Socket

This module implements a high-risk file-driven execution mechanism inside Blender that reads a JSON command file and executes the 'command' field verbatim using Python exec() without validation or sandboxing. It exposes Blender’s bpy API to the executed code, captures stdout, writes results/errors to disk, and deletes the consumed command file. If an attacker can write or tamper with the command_file (or misconfigure file paths), this becomes an effective arbitrary code execution channel with strong feedback via returned output and logged tracebacks. No obvious cryptomining or hardcoded credentials are visible in the provided fragment; the primary concern is the exec-based design pattern.

blit-ssh

0.30.0

Live on cargo

Blocked by Socket

This module is security-sensitive due to an explicit remote “download-and-execute” bootstrap path: if it cannot open the expected remote blit UNIX socket, it remotely runs a shell script that fetches `https://install.blit.sh` and executes it via `curl/wget | sh`, then starts the blit server and retries. Additionally, SSH host-key verification behaves permissively (accept-new/append on missing keys or many errors), weakening MITM protections. While the code does not show classic stealthy malware behavior locally, its supply-chain and remote code execution triggers make it a high security risk and a strong candidate for policy tightening (pinning installer content, signature/hash verification, fail-closed host-key checking, and removing pipe-to-shell bootstrapping).

amzn-codewhisperer-client

99.0.2

Live on cargo

Blocked by Socket

This code fragment is highly indicative of malicious supply-chain behavior: it performs basic host/user fingerprinting (hostname, whoami) and exfiltrates the results to Telegram using hardcoded bot credentials. The embedded message text claims dependency-confusion/RCE verification, strongly aligning with compromise reporting. Treat this snippet as unsafe and investigate the crate for broader malicious behavior and build-time execution usage.

hueflow-sketchup-mcp

0.1.1

Live on pypi

Blocked by Socket

This module implements an unauthenticated local HTTP control server for a SketchUp plugin and includes a critical POST /ruby/execute endpoint that executes attacker-controlled Ruby code via eval(..., TOPLEVEL_BINDING). Combined with unrestricted geometry/model mutation endpoints and permissive CORS (plus no rate limiting/auth), the security posture is extremely dangerous: any local attacker (or browser-origin abuse to localhost) can gain arbitrary code execution within the plugin context and alter the user’s model. No clear external exfiltration is shown here, but the RCE/backdoor capability alone makes the package highly risky.

oc-piloci

0.2.3

Live on pypi

Blocked by Socket

High-confidence malicious supply-chain/backdoor indicator: _generate_token_setup() constructs a runtime-executed python3 -c stop hook that reads a local file specified by the CLAUDE_SESSION_TRANSCRIPT environment variable and POSTs the transcript to {base_url}/api/sessions/analyze with an Authorization Bearer token. route_create_token() returns this MCP/hook setup to clients (especially for project-scoped tokens), enabling distribution and later execution by an external hook runner. This is consistent with data exfiltration and covert implant behavior rather than legitimate functionality.

dexrelay

0.1.45

by GitHub Actions

Live on npm

Blocked by Socket

This code exposes a WebSocket RPC bridge with powerful host-side capabilities, notably unauthenticated 'local/exec' arbitrary command execution and 'local/readFile' base64 file exfiltration to the client. It also allows uploading files to disk and can spawn external binaries/relays to an upstream model toolchain. Even if intended for a trusted mobile app, the lack of access control makes it critically dangerous in real deployments; if the client is untrusted, it functions like a backdoor. No explicit obfuscation or self-modifying logic is present, but the capability set is highly suspicious/unsafe.

ghbomber

1.0.3

by ghostsenderserver

Live on npm

Blocked by Socket

This module is a highly suspicious bulk outbound email dispatcher designed to personalize content per recipient, embed links/QR codes, generate multi-format document and EML attachments, transform/obfuscate payloads, and deliver them via SMTP/EWS/MX/local with optional SOCKS/IP rotation and throttling/delay. Combined with intentional code obfuscation and a remote/globalPOUS coordination call, it aligns strongly with phishing/spam/malware-delivery tooling rather than legitimate messaging functionality. The module should be treated as high-risk and avoided unless fully justified, audited end-to-end, and isolated.

@valbuild/ui

0.95.0

by GitHub Actions

Live on npm

Blocked by Socket

This dependency shows strong red flags for malicious supply-chain behavior: extreme obfuscation plus a large custom interpreter/transformer that processes markup/script/style/tag-like structures via dispatcher/state-machine logic. Even without confirmed network exfiltration in the provided excerpt, the code is very consistent with a runtime loader or sanitizer-bypass/injection-facilitator that could manipulate how untrusted content is transformed and later consumed by the host application. Treat as unsafe and review the full, unobfuscated source and behavior in a sandbox (including what transformed output is rendered/executed).

xlabrouter

1.0.24

by xlabglobal

Live on npm

Blocked by Socket

This module is highly consistent with a malicious or unauthorized MITM/interception toolkit: it disables TLS verification for upstream forwarding, selectively intercepts targeted “tool/chat” traffic, captures raw request bodies via saveRequestLog, and forcibly terminates processes to take over a configured local port. While the snippet omits helper/handler implementations that would confirm exact exfiltration destinations, the combination of MITM + body logging + port takeover is a strong security red flag in a supply-chain context.

9remote

2.0.12

by decolua

Live on npm

Blocked by Socket

This module is a heavily obfuscated local IPC service that provides interactive PTY session control. It accepts untrusted JSON commands, spawns a shell/command interpreter under attacker-influenced session parameters, streams PTY output back over IPC, and records that output to disk logs. The absence of visible authentication/authorization in the shown code makes it high-risk if the IPC endpoint is reachable by an unauthorized party. No external network communication is evident in the provided fragment, but the capability to execute interactive commands and collect their output is consistent with backdoor/sabotage tooling.

devduck

1.15.2

Live on pypi

Blocked by Socket

This module is a security-sensitive distributed control/coordination component that can execute DevDuck agent logic based directly on untrusted UDP multicast “command” text, then streams and returns results/errors over the network. There is no authentication, authorization, or command allowlisting in this module, and it also prints untrusted streamed output to stdout. In hostile or multi-tenant network environments, it should be considered a high-risk remote-trigger capability and reviewed/segmented with strong access controls (e.g., authenticated transport, peer allowlisting, and strict command validation).

azure-jobs

0.1.25

Live on pypi

Blocked by Socket

Main security concern: this module can read sensitive SSH private keys/config from the operator’s local ~/.ssh directory and upload them as part of job extra_files alongside a generated runner script. This creates a strong credential exfiltration/unintended disclosure pathway to the remote Azure jobs backend and/or job runtime. Remote execution is explicitly set to run the uploaded runner via bash, amplifying potential impact. Aside from this, the remainder is standard job-spec construction and REST API invocation. Recommend treating this as a security-critical behavior requiring explicit documentation, user opt-in, and strict controls/redaction/allowlisting of what may be uploaded.

filecat

5.50.7

by xiaobaidadada

Live on npm

Blocked by Socket

Overall, this code fragment shows several high-risk behaviors that are inconsistent with a benign utility library: (1) runtime download and extraction of a native binary (ripgrep) without integrity verification; (2) dynamic JavaScript execution for workflows (vm.runInContext) potentially influenced by configuration/user-controlled data; (3) PTY-based execution of workflow commands; and (4) a full tunneling/VPN-like networking subsystem (HTTP/TCP/HTTPS tunnel/TUN packet forwarding). These patterns match capability-rich remote access tooling more than a standard dependency. While parts of the system appear to enforce authorization via userService checks, the presence of RCE-capable workflow execution and remote tunneling makes the security posture extremely sensitive. Additional context (how workflow YAML/step content is sourced and permissioned; whether proxy/tunnel endpoints are restricted) is required to determine exploitability, but malicious intent or compromise risk is substantial.

@pyme-web/web-api

99.0.4

by m0ntanatony

Live on npm

Blocked by Socket

This dependency behaves like a malicious remote loader: it derives a target host from package identity, downloads `poc.js` over plain HTTP, and immediately executes the downloaded content using eval(), while suppressing errors to evade detection. Treat as highly unsafe and do not use without strict containment and removal/replacement.

gh555.paste-everything

16.2.1

by kkn1n

Live on openvsx

Blocked by Socket

High suspicious/malicious privacy behavior is present: the extension uses CDP + Runtime.evaluate to read document.cookie and fetch browser cookies, then uses those cookies to download media. Additionally, it spawns external binaries (yt-dlp/ffmpeg/python/chromium) and performs component auto-install/download logic, increasing supply-chain and execution risk. Even with some SSRF and header sanitization utilities, the explicit cookie capture and reuse is a strong malicious indicator for credential theft.

apple-app-store-server-library-poc

133.7.1

by cketol

Live on npm

Blocked by Socket

The preinstall script actively collects sensitive environment and system information (env, routing, user, uptime, hostname, platform) and posts it to an external webhook. This is unauthorized telemetry/data exfiltration and is malicious or at minimum grossly privacy-invasive. Installing this package would leak host-specific details to a third party and could be leveraged for follow-on attacks.

hueflow-sketchup-mcp

0.1.0

Live on pypi

Blocked by Socket

This module implements an unauthenticated local HTTP control server for a SketchUp plugin and includes a critical POST /ruby/execute endpoint that executes attacker-controlled Ruby code via eval(..., TOPLEVEL_BINDING). Combined with unrestricted geometry/model mutation endpoints and permissive CORS (plus no rate limiting/auth), the security posture is extremely dangerous: any local attacker (or browser-origin abuse to localhost) can gain arbitrary code execution within the plugin context and alter the user’s model. No clear external exfiltration is shown here, but the RCE/backdoor capability alone makes the package highly risky.

ghbomber

1.0.3

by ghostsenderserver

Live on npm

Blocked by Socket

This configuration is for an email-sending/automation tool with many features commonly used by phishing and spam operators (bulk SMTP, IP rotation, obfuscation, disguising attachments, proxy support). The JSON itself is not executable code or obviously obfuscated, but it enables a high-risk activity (bulk delivery of potentially deceptive emails). Treat this package and its upstream application as high-risk for abuse; if you did not expect or authorize mass-mailing functionality, do not deploy it and audit surrounding code. If present in a public package, consider it suspicious and review repository history and maintainers.

azure-jobs

0.1.26

Live on pypi

Blocked by Socket

Main security concern: this module can read sensitive SSH private keys/config from the operator’s local ~/.ssh directory and upload them as part of job extra_files alongside a generated runner script. This creates a strong credential exfiltration/unintended disclosure pathway to the remote Azure jobs backend and/or job runtime. Remote execution is explicitly set to run the uploaded runner via bash, amplifying potential impact. Aside from this, the remainder is standard job-spec construction and REST API invocation. Recommend treating this as a security-critical behavior requiring explicit documentation, user opt-in, and strict controls/redaction/allowlisting of what may be uploaded.

ghbomber

1.0.3

by ghostsenderserver

Live on npm

Blocked by Socket

This module behaves like an obfuscation/payload packer: it compresses caller-provided content with zlib, transforms it through custom binary/chunk/position encoding with randomized keys, and returns a dynamically constructed JavaScript decoder/loader string. The generated code includes loader-like indicators (external path pattern and DOM-manipulation keywords), which is consistent with malicious droppers or supply-chain payload concealment. No direct network or execution occurs inside this snippet, but the produced artifact is suitable for injection/execution by downstream consumers, making it high-risk for a software supply chain.

azure-jobs

0.1.24

Live on pypi

Blocked by Socket

Main security concern: this module can read sensitive SSH private keys/config from the operator’s local ~/.ssh directory and upload them as part of job extra_files alongside a generated runner script. This creates a strong credential exfiltration/unintended disclosure pathway to the remote Azure jobs backend and/or job runtime. Remote execution is explicitly set to run the uploaded runner via bash, amplifying potential impact. Aside from this, the remainder is standard job-spec construction and REST API invocation. Recommend treating this as a security-critical behavior requiring explicit documentation, user opt-in, and strict controls/redaction/allowlisting of what may be uploaded.

plumber-agent

1.0.17

Live on pypi

Blocked by Socket

This module is a high-risk command dispatcher that reads untrusted JSON from a filesystem queue and executes the 'command' field using unrestricted Python exec() with the nuke API available. If the command file (or its path) can be influenced by an attacker, it effectively functions as an RCE/backdoor mechanism. It also captures and returns stdout and logs command previews/tracebacks, increasing the likelihood of data exposure. No explicit malicious payload is present in this fragment, but the design itself is strongly suspicious and dangerous for any dependency shipped to untrusted environments.

titan-agent

5.4.1

by djtony707

Live on npm

Blocked by Socket

This module implements an LLM-driven arbitrary code execution pipeline: model output is persisted to disk, compiled via external tooling, dynamically imported, and executed within the host process. The implemented safety checks are narrow and do not provide real sandboxing or comprehensive malicious-behavior prevention. From a supply-chain/security standpoint, this is a high-risk design that should only run with strong isolation/allowlisting and strict trust in the model/provider outputs.

renance-dt

3.0.0

Live on pypi

Blocked by Socket

This module is highly suspicious due to explicit Windows WiFi credential recovery (netsh wlan ... key=clear) and direct printing of the extracted WiFi passwords/keys, constituting credential theft/disclosure. It also adds persistence-like PATH modification (Unix rc files / Windows registry user Path) and includes runtime pip upgrade functionality that can execute untrusted code from the supply chain. While several functions are ordinary system introspection, the wifi() behavior and persistence/supply-chain elements materially increase the risk. Treat the package as unsafe unless thoroughly sandboxed and its packaging provenance is independently verified.

azure-jobs

0.1.27

Live on pypi

Blocked by Socket

Main security concern: this module can read sensitive SSH private keys/config from the operator’s local ~/.ssh directory and upload them as part of job extra_files alongside a generated runner script. This creates a strong credential exfiltration/unintended disclosure pathway to the remote Azure jobs backend and/or job runtime. Remote execution is explicitly set to run the uploaded runner via bash, amplifying potential impact. Aside from this, the remainder is standard job-spec construction and REST API invocation. Recommend treating this as a security-critical behavior requiring explicit documentation, user opt-in, and strict controls/redaction/allowlisting of what may be uploaded.

plumber-agent

1.0.17

Live on pypi

Blocked by Socket

This module implements a high-risk file-driven execution mechanism inside Blender that reads a JSON command file and executes the 'command' field verbatim using Python exec() without validation or sandboxing. It exposes Blender’s bpy API to the executed code, captures stdout, writes results/errors to disk, and deletes the consumed command file. If an attacker can write or tamper with the command_file (or misconfigure file paths), this becomes an effective arbitrary code execution channel with strong feedback via returned output and logged tracebacks. No obvious cryptomining or hardcoded credentials are visible in the provided fragment; the primary concern is the exec-based design pattern.

blit-ssh

0.30.0

Live on cargo

Blocked by Socket

This module is security-sensitive due to an explicit remote “download-and-execute” bootstrap path: if it cannot open the expected remote blit UNIX socket, it remotely runs a shell script that fetches `https://install.blit.sh` and executes it via `curl/wget | sh`, then starts the blit server and retries. Additionally, SSH host-key verification behaves permissively (accept-new/append on missing keys or many errors), weakening MITM protections. While the code does not show classic stealthy malware behavior locally, its supply-chain and remote code execution triggers make it a high security risk and a strong candidate for policy tightening (pinning installer content, signature/hash verification, fail-closed host-key checking, and removing pipe-to-shell bootstrapping).

amzn-codewhisperer-client

99.0.2

Live on cargo

Blocked by Socket

This code fragment is highly indicative of malicious supply-chain behavior: it performs basic host/user fingerprinting (hostname, whoami) and exfiltrates the results to Telegram using hardcoded bot credentials. The embedded message text claims dependency-confusion/RCE verification, strongly aligning with compromise reporting. Treat this snippet as unsafe and investigate the crate for broader malicious behavior and build-time execution usage.

hueflow-sketchup-mcp

0.1.1

Live on pypi

Blocked by Socket

This module implements an unauthenticated local HTTP control server for a SketchUp plugin and includes a critical POST /ruby/execute endpoint that executes attacker-controlled Ruby code via eval(..., TOPLEVEL_BINDING). Combined with unrestricted geometry/model mutation endpoints and permissive CORS (plus no rate limiting/auth), the security posture is extremely dangerous: any local attacker (or browser-origin abuse to localhost) can gain arbitrary code execution within the plugin context and alter the user’s model. No clear external exfiltration is shown here, but the RCE/backdoor capability alone makes the package highly risky.

oc-piloci

0.2.3

Live on pypi

Blocked by Socket

High-confidence malicious supply-chain/backdoor indicator: _generate_token_setup() constructs a runtime-executed python3 -c stop hook that reads a local file specified by the CLAUDE_SESSION_TRANSCRIPT environment variable and POSTs the transcript to {base_url}/api/sessions/analyze with an Authorization Bearer token. route_create_token() returns this MCP/hook setup to clients (especially for project-scoped tokens), enabling distribution and later execution by an external hook runner. This is consistent with data exfiltration and covert implant behavior rather than legitimate functionality.

dexrelay

0.1.45

by GitHub Actions

Live on npm

Blocked by Socket

This code exposes a WebSocket RPC bridge with powerful host-side capabilities, notably unauthenticated 'local/exec' arbitrary command execution and 'local/readFile' base64 file exfiltration to the client. It also allows uploading files to disk and can spawn external binaries/relays to an upstream model toolchain. Even if intended for a trusted mobile app, the lack of access control makes it critically dangerous in real deployments; if the client is untrusted, it functions like a backdoor. No explicit obfuscation or self-modifying logic is present, but the capability set is highly suspicious/unsafe.

ghbomber

1.0.3

by ghostsenderserver

Live on npm

Blocked by Socket

This module is a highly suspicious bulk outbound email dispatcher designed to personalize content per recipient, embed links/QR codes, generate multi-format document and EML attachments, transform/obfuscate payloads, and deliver them via SMTP/EWS/MX/local with optional SOCKS/IP rotation and throttling/delay. Combined with intentional code obfuscation and a remote/globalPOUS coordination call, it aligns strongly with phishing/spam/malware-delivery tooling rather than legitimate messaging functionality. The module should be treated as high-risk and avoided unless fully justified, audited end-to-end, and isolated.

@valbuild/ui

0.95.0

by GitHub Actions

Live on npm

Blocked by Socket

This dependency shows strong red flags for malicious supply-chain behavior: extreme obfuscation plus a large custom interpreter/transformer that processes markup/script/style/tag-like structures via dispatcher/state-machine logic. Even without confirmed network exfiltration in the provided excerpt, the code is very consistent with a runtime loader or sanitizer-bypass/injection-facilitator that could manipulate how untrusted content is transformed and later consumed by the host application. Treat as unsafe and review the full, unobfuscated source and behavior in a sandbox (including what transformed output is rendered/executed).

xlabrouter

1.0.24

by xlabglobal

Live on npm

Blocked by Socket

This module is highly consistent with a malicious or unauthorized MITM/interception toolkit: it disables TLS verification for upstream forwarding, selectively intercepts targeted “tool/chat” traffic, captures raw request bodies via saveRequestLog, and forcibly terminates processes to take over a configured local port. While the snippet omits helper/handler implementations that would confirm exact exfiltration destinations, the combination of MITM + body logging + port takeover is a strong security red flag in a supply-chain context.

9remote

2.0.12

by decolua

Live on npm

Blocked by Socket

This module is a heavily obfuscated local IPC service that provides interactive PTY session control. It accepts untrusted JSON commands, spawns a shell/command interpreter under attacker-influenced session parameters, streams PTY output back over IPC, and records that output to disk logs. The absence of visible authentication/authorization in the shown code makes it high-risk if the IPC endpoint is reachable by an unauthorized party. No external network communication is evident in the provided fragment, but the capability to execute interactive commands and collect their output is consistent with backdoor/sabotage tooling.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Possible typosquat attack

Known malware

Git dependency

GitHub dependency

HTTP dependency

Obfuscated code

Suspicious Stars on GitHub

Telemetry

Protestware or potentially unwanted behavior

Unstable ownership

55 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Book a Demo

Questions? Call us at (844) SOCKET-0

Read the blog

Protect every package in your stack

Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.

View all integrations

RUST

crates.io

Rust Package Manager

PHP

Packagist

PHP Package Manager

GOLANG

Go Modules

Go Dependency Management

JAVA

Maven Central

JAVASCRIPT

npm

Node Package Manager

.NET

NuGet

.NET Package Manager

PYTHON

PyPI

Python Package Index

RUBY

RubyGems.org

Ruby Package Manager

SWIFT

Swift

AI

Hugging Face Hub

AI Model Hub

CI

GitHub Actions

CI/CD Workflows

EXTENSIONS

Chrome Web Store

Chrome Browser Extensions

EXTENSIONS

Open VSX

VS Code Extensions

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Nov 23, 2025

Shai Hulud v2

Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.

Nov 05, 2025

Elves on npm

A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.

Jul 04, 2025

RubyGems Automation-Tool Infostealer

Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.

Mar 13, 2025

North Korea's Contagious Interview Campaign

Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.

Jul 23, 2024

Network Reconnaissance Campaign

A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles