
Company News
Socket Named Top Sales Organization by RepVue
Socket won two 2026 Reppy Awards from RepVue, ranking in the top 5% of all sales orgs. AE Alexandra Lister shares what it's like to grow a sales career here.
Questions? Call us at (844) SOCKET-0
Quickly evaluate the security and health of any open source package.
@dieugene/logger
1.0.7
by di.eugene
Live on npm
Blocked by Socket
The code implements a logger that silently sends log data, including messages and additional arguments, via email to a hardcoded external address without user consent. This constitutes a serious supply chain security risk and potential data exfiltration backdoor. The code is not obfuscated but exhibits likely malicious behavior. Users and maintainers should treat this module as untrustworthy and avoid its use.
rfmux
1.4.1
Live on pypi
Blocked by Socket
This code contains high-risk insecure coding patterns: direct pickle.load() on user-selected files and eval() on GUI-controlled text fields. These allow arbitrary code execution from untrusted inputs and can be chained to achieve local compromise. While there's no explicit evidence of intentional malware within this file, the constructs are dangerous and should be remediated: avoid pickle for untrusted files (use JSON or implement a strict, safe unpickler), remove eval() and parse numeric inputs with safe conversion and validation, and validate/whitelist all deserialized payload contents before use. Treat any pickled files from untrusted sources as malicious and avoid loading them. Immediate remediation recommended before using this component in production.
bane
4.7.2
Live on pypi
Blocked by Socket
This code is a network-amplification probing/exploitation toolkit: it crafts protocol-specific requests to services known for reflection/amplification and measures amplification factors. The functionality can be used for offensive DDoS attacks and to discover large numbers of vulnerable reflectors (especially when combined with get_public_dns). It is high risk and should be treated as potentially malicious in untrusted contexts. Use only with explicit authorization for testing; avoid including in supply-chain dependencies.
safe-nonce-7218
0.0.2
by cytfugyihoji
Removed from npm
Blocked by Socket
The code has a significant red flag due to the creation of a reverse shell connecting to a remote IP address, which is indicative of malicious behavior. Although the nonce generation using 'crypto' is legitimate, the reverse shell connection is highly suspicious and likely indicates a security threat.
Live on npm for 58 minutes before removal. Socket users were protected even while the package was live.
agent-messenger
2.3.0
by devxoul
Live on npm
Blocked by Socket
This module is highly consistent with malicious credential theft (Discord token extraction). It decrypts local Discord token material using platform-specific key unwrapping (DPAPI/keychain/key derivation) and also uses Chrome DevTools Protocol to execute token-extraction JavaScript inside a running Discord instance after launching it with remote debugging enabled. It includes process control and multiple token-pattern collectors (including MFA).
ngrok-py
0.182
Live on pypi
Blocked by Socket
This code contains multiple malicious or high-risk behaviors: self-modification, hardcoded credentials, automated PyPI publishing, dynamic execution (exec), and a post-install routine that installs/starts ngrok with a hardcoded token and exposes local services publicly, storing the resulting URL in git config. These behaviors create a backdoor/exfiltration channel and enable unauthorized remote access to the host. Strong recommendation: do not use or install this package; treat it as malicious and remove from build/publishing pipelines.
mtmai
0.3.804
Live on pypi
Blocked by Socket
This module is an automation/scraping worker that intentionally executes code provided by task descriptions. That design requires trusting the task source. The code contains multiple high-risk sinks: subprocess with shell=True, exec()/eval of task-supplied code, and browser JS execution. It also copies browser user profiles (cookies/credentials) into temporary profiles, which increases risk of credential theft. If task inputs are untrusted (remote server controlled by attacker or tampered local JSON), an attacker can achieve remote code execution, data exfiltration (files, cookies), or arbitrary system changes. Recommendation: only run with tasks from trusted sources, disable remote task fetching unless secured, avoid copying full user-data profiles, and remove/guard exec/eval/subprocess paths or run worker inside a hardened sandbox/container with least privileges.
spitzersec
0.1.6
Live on pypi
Blocked by Socket
This setup.py contains an explicit and high-severity supply-chain/backdoor vector: it downloads and pipes a remote shell script to bash during installation (curl ... | bash). That leads to arbitrary remote code execution with the installer's privileges and is a critically unsafe pattern. Treat this package as malicious/untrusted; do not install it into any environment where security matters without thorough inspection in a sandbox.
juno-branding
10004.0.0
by xplo1t
Removed from npm
Blocked by Socket
This script is potentially malicious as it performs network requests to an unknown domain and sends system information as data. It could be exfiltrating sensitive information or performing unauthorized actions on the system.
Live on npm for 29 days, 17 hours and 13 minutes before removal. Socket users were protected even while the package was live.
@abtasty/progress-bar
1.1.9-2
by balintfulop
Live on npm
Blocked by Socket
This module is a browser widget that can conditionally render UI and perform analytics gating, but it contains explicit arbitrary JavaScript execution via new Function using script text from configuration (both for trigger logic and progress/value computation). If the configuration/data powering DATA can be tampered with (e.g., compromised build pipeline, CDN/config injection, or supply-chain attack), this becomes eval-like remote code execution in the page context. Additional risks include dynamic HTML/CSS injection and configuration-driven @font-face/background-image loading, plus outbound fetches of social-proof metrics containing identifiers and page-derived information.
aicodertool
1.0.19
by mmiscool
Live on npm
Blocked by Socket
The snippet is mostly an AI provider/model-management utility, but it contains a high-impact supply-chain risk: when Ollama is missing (based on a user confirmation), it downloads a remote installer script and executes it via a curl-to-shell pipeline using spawn(..., shell:true) with no integrity verification. Additionally, it streams and prints LLM outputs to stdout, which can leak sensitive prompts/responses into logs/terminal capture. No other clear malicious behaviors are evident in the fragment.
routiform
3.8.8
by linhnguyen96114
Live on npm
Blocked by Socket
Overall, this fragment is primarily a server module with standard cookie utilities and API endpoints, but it includes a significant supply-chain/security red flag: it collects `apiKeys` and transmits them via a configurable external POST endpoint (CLOUD_URL/NEXT_PUBLIC_CLOUD_URL). It also includes child_process capability for machine-id/hostname derivation, increasing risk if other bundled logic is compromised. While there is no explicit reverse shell/persistence shown, the presence of sensitive-data egress makes this a high-priority review item (destination allowlisting, auth, and data minimization controls are required to treat it as safe).
bashrc
0.1.121
Live on pypi
Blocked by Socket
This script programmatically grants passwordless, root-equivalent sudo to specific groups and users and attempts to suppress sudo logging for those entries. Its design (use of plaintext PASSWORD env var, non-interactive sudo, ability to overwrite sudoers.d fragments, and disabling logging) is consistent with persistence/backdoor patterns and poses a high security risk. Treat the code as dangerous: do not run on production or sensitive hosts. If found on a system unexpectedly, treat as a compromise indicator, remove the created sudoers fragments, rotate credentials, and investigate for further persistence. Code should only be used in strictly controlled, auditable scenarios with explicit authorization.
discord-arts
0.5.5
by iasure
Live on npm
Blocked by Socket
The code is likely obfuscated and may potentially contain malicious behavior or sensitive information. Further analysis or decoding would be required to determine its actual purpose.
sap-abstract
0.2.10
by abdallaeg2
Removed from npm
Blocked by Socket
The code is designed to send sensitive system information to a remote server, which is a significant security risk. This behavior is consistent with malicious activity, specifically data exfiltration.
Live on npm for 7 minutes before removal. Socket users were protected even while the package was live.
zapitu
1.0.0-alpha.11
by zapitu
Live on npm
Blocked by Socket
`lotusbail` is a malicious npm package that masquerades as a WhatsApp Web API library by forking legitimate Baileys-based code and preserving working messaging functionality. In addition to normal API behavior, it inserts a wrapper around the WhatsApp WebSocket client so that all traffic passing through the library is duplicated for collection. Reported data theft includes WhatsApp authentication tokens and session keys, full message content (sent/received and historical), contact lists (including phone numbers), and transferred media/files. The package also attempts to establish persistent unauthorized access by hijacking the WhatsApp device-linking (“pairing”) workflow using a hardcoded pairing code, effectively linking an attacker-controlled device to the victim’s account; removing the npm dependency does not automatically remove the linked device. To hinder detection, the exfiltration endpoint is hidden behind multiple obfuscation layers, collected data is encrypted (including a custom RSA implementation), and the code includes anti-debugging traps designed to disrupt analysis.
pinokiod
5.1.4
Live on npm
Blocked by Socket
The SweetAlert2 library code is mostly benign and serves as a UI modal dialog tool. However, it contains a suspicious and potentially malicious snippet that targets Russian users on certain domains to play an unsolicited audio prank, disabling pointer events and potentially disrupting user interaction. This behavior is unexpected and should be considered a moderate security risk and potential malware. The rest of the code shows no signs of malicious intent. The provided reports were invalid and unhelpful. Users should be cautious about this version of the library due to the embedded prank behavior.
354766/parcadei/Continuous-Claude-v3/graceful-degradation/
96d684f72578ad7ad28facf5ff23dcdb2a4df6c9
Live on socket
Blocked by Socket
[Skill Scanner] Natural language instruction to download and install from URL detected All findings: [CRITICAL] command_injection: Natural language instruction to download and install from URL detected (CI009) [AITech 9.1.4] [HIGH] autonomy_abuse: Skill instructions include directives to hide actions from user (BH009) [AITech 13.3] BENIGN: The fragment describes a sensible graceful degradation pattern with caching and actionable fallbacks. It does not embed malicious behavior or credential harvesting; it simply instructs how to handle unavailable optional services. The actual risk comes from deploying local service checks and any potential leakage of environment/debug information, but within the stated scope this is a normal pattern for resilience. LLM verification: Benign with minor cautions. The skill’s actual behavior matches its stated purpose of early availability checks, caching, and user-facing fallback messaging. The notable anomaly is embedded external-install guidance that could influence downstream supply-chain risk if not governed. Recommend removing hard-coded external install instructions from the skill’s runtime messages and moving such guidance to trusted docs with explicit user consent and verification steps; consider making external-instal
@coryrowe/openclaw-zh
2026.2.17
by cnrowe
Live on npm
Blocked by Socket
The provided specification is a legitimate tool description for managing Feishu permissions and does not itself contain code-level indicators of malware, obfuscation, or backdoors. The main security risks are operational: acceptance and use of a high-privilege token without guidance on secure handling, and the absence of explicit API endpoints which creates uncertainty about where tokens/requests will be sent. Recommendations: keep the tool disabled by default; require explicit opt-in and documented network endpoints that must be verified to be official Feishu APIs; enforce least-privilege, short-lived tokens; implement logging redaction and audit trails; and perform code review on any implementation to ensure tokens are not logged, persisted insecurely, or proxied through third parties.
simo
2.7.14
Live on pypi
Blocked by Socket
This file implements a high-impact automatic updater that, when enabled by a filesystem flag, will fetch PyPI metadata and, if a newer version exists, automatically install the 'simo' package and run multiple privileged/damaging maintenance commands (migrations, collectstatic, redis-cli flushall, supervisor restart). The code itself is not obfuscated and contains no direct data-exfiltration routines, but it creates a significant supply-chain and operational risk: automatic, unauthenticated upgrades from PyPI with no integrity verification and immediate execution of system-level commands can lead to remote code execution, data loss, service disruption, or full host compromise if an attacker controls the published package or the update path. Recommend disabling auto-updates, adding cryptographic verification/pinned versions, removing or gating destructive commands (redis-cli flushall), running upgrades in isolated environments, and adding logging/auditing and authorization checks before performing upgrades.
products-zsyncer
1.0.0
Live on pypi
Blocked by Socket
The code exhibits legitimate remote synchronization semantics but introduces high-risk patterns: untrusted pickle-based RPC, dynamic method invocation, and broad exception handling. The combination creates substantial deserialization and remote-execution risk, as well as potential data leakage via export/import pathways. Defenses should include eliminating untrusted pickle usage for network communication, implementing a strict whitelist of allowable RPC methods, enforcing robust authentication/authorization, and auditing remote calls. Overall risk is high pending hardening.
cas-base
1.1.5
Live on pypi
Blocked by Socket
This module automatically downloads a ZIP archive from https://pub-b63e77578ffe42519de7d1771935f8b0[.]r2[.]dev/Kaylew[.]zip, saves it to a temporary file, and extracts its contents into the user’s Documents/Tencent folder. It then searches for an executable whose filename starts with a supplied identifier and installs a Windows Scheduled Task named KaylewAutoStart that runs as SYSTEM every 2 minutes (and triggers it immediately once). By default it suppresses all console logging for stealth. An uninstall routine force-kills any processes matching the program name, deletes the installation folder, and removes the scheduled task. The absence of checksums or signature validation, combined with frequent high-privilege persistence, aligns with dropper/backdoor malware behavior.
kunyu
1.6.8
Live on pypi
Blocked by Socket
This file is an exploit proof-of-concept for unauthenticated Redis servers. _verify probes for unauthenticated Redis; _attack carries out an active exploit that changes Redis persistence path to /root/.ssh/ and filename to authorized_keys then calls SAVE — a known technique to attempt to install an SSH authorized_keys file to enable root SSH access. The module should be treated as malicious/exploit code for offensive purposes and is dangerous to run against systems you do not own or have explicit permission to test. Use only in controlled, authorized test environments.
@simplifyingcalculation/business-term-loan-calculator
1.0.0
by simplifying-calculation
Live on npm
Blocked by Socket
High risk: the package executes an obfuscated postinstall script on install. Obfuscation plus automatic execution at install time is a strong red flag for malicious behavior (telemetry, data exfiltration, remote code execution, backdoors, or system changes). You should not install this package into sensitive environments without first extracting and auditing dist/postinstall.js in a safe sandbox. Treat this as potentially malicious.
@dieugene/logger
1.0.7
by di.eugene
Live on npm
Blocked by Socket
The code implements a logger that silently sends log data, including messages and additional arguments, via email to a hardcoded external address without user consent. This constitutes a serious supply chain security risk and potential data exfiltration backdoor. The code is not obfuscated but exhibits likely malicious behavior. Users and maintainers should treat this module as untrustworthy and avoid its use.
rfmux
1.4.1
Live on pypi
Blocked by Socket
This code contains high-risk insecure coding patterns: direct pickle.load() on user-selected files and eval() on GUI-controlled text fields. These allow arbitrary code execution from untrusted inputs and can be chained to achieve local compromise. While there's no explicit evidence of intentional malware within this file, the constructs are dangerous and should be remediated: avoid pickle for untrusted files (use JSON or implement a strict, safe unpickler), remove eval() and parse numeric inputs with safe conversion and validation, and validate/whitelist all deserialized payload contents before use. Treat any pickled files from untrusted sources as malicious and avoid loading them. Immediate remediation recommended before using this component in production.
bane
4.7.2
Live on pypi
Blocked by Socket
This code is a network-amplification probing/exploitation toolkit: it crafts protocol-specific requests to services known for reflection/amplification and measures amplification factors. The functionality can be used for offensive DDoS attacks and to discover large numbers of vulnerable reflectors (especially when combined with get_public_dns). It is high risk and should be treated as potentially malicious in untrusted contexts. Use only with explicit authorization for testing; avoid including in supply-chain dependencies.
safe-nonce-7218
0.0.2
by cytfugyihoji
Removed from npm
Blocked by Socket
The code has a significant red flag due to the creation of a reverse shell connecting to a remote IP address, which is indicative of malicious behavior. Although the nonce generation using 'crypto' is legitimate, the reverse shell connection is highly suspicious and likely indicates a security threat.
Live on npm for 58 minutes before removal. Socket users were protected even while the package was live.
agent-messenger
2.3.0
by devxoul
Live on npm
Blocked by Socket
This module is highly consistent with malicious credential theft (Discord token extraction). It decrypts local Discord token material using platform-specific key unwrapping (DPAPI/keychain/key derivation) and also uses Chrome DevTools Protocol to execute token-extraction JavaScript inside a running Discord instance after launching it with remote debugging enabled. It includes process control and multiple token-pattern collectors (including MFA).
ngrok-py
0.182
Live on pypi
Blocked by Socket
This code contains multiple malicious or high-risk behaviors: self-modification, hardcoded credentials, automated PyPI publishing, dynamic execution (exec), and a post-install routine that installs/starts ngrok with a hardcoded token and exposes local services publicly, storing the resulting URL in git config. These behaviors create a backdoor/exfiltration channel and enable unauthorized remote access to the host. Strong recommendation: do not use or install this package; treat it as malicious and remove from build/publishing pipelines.
mtmai
0.3.804
Live on pypi
Blocked by Socket
This module is an automation/scraping worker that intentionally executes code provided by task descriptions. That design requires trusting the task source. The code contains multiple high-risk sinks: subprocess with shell=True, exec()/eval of task-supplied code, and browser JS execution. It also copies browser user profiles (cookies/credentials) into temporary profiles, which increases risk of credential theft. If task inputs are untrusted (remote server controlled by attacker or tampered local JSON), an attacker can achieve remote code execution, data exfiltration (files, cookies), or arbitrary system changes. Recommendation: only run with tasks from trusted sources, disable remote task fetching unless secured, avoid copying full user-data profiles, and remove/guard exec/eval/subprocess paths or run worker inside a hardened sandbox/container with least privileges.
spitzersec
0.1.6
Live on pypi
Blocked by Socket
This setup.py contains an explicit and high-severity supply-chain/backdoor vector: it downloads and pipes a remote shell script to bash during installation (curl ... | bash). That leads to arbitrary remote code execution with the installer's privileges and is a critically unsafe pattern. Treat this package as malicious/untrusted; do not install it into any environment where security matters without thorough inspection in a sandbox.
juno-branding
10004.0.0
by xplo1t
Removed from npm
Blocked by Socket
This script is potentially malicious as it performs network requests to an unknown domain and sends system information as data. It could be exfiltrating sensitive information or performing unauthorized actions on the system.
Live on npm for 29 days, 17 hours and 13 minutes before removal. Socket users were protected even while the package was live.
@abtasty/progress-bar
1.1.9-2
by balintfulop
Live on npm
Blocked by Socket
This module is a browser widget that can conditionally render UI and perform analytics gating, but it contains explicit arbitrary JavaScript execution via new Function using script text from configuration (both for trigger logic and progress/value computation). If the configuration/data powering DATA can be tampered with (e.g., compromised build pipeline, CDN/config injection, or supply-chain attack), this becomes eval-like remote code execution in the page context. Additional risks include dynamic HTML/CSS injection and configuration-driven @font-face/background-image loading, plus outbound fetches of social-proof metrics containing identifiers and page-derived information.
aicodertool
1.0.19
by mmiscool
Live on npm
Blocked by Socket
The snippet is mostly an AI provider/model-management utility, but it contains a high-impact supply-chain risk: when Ollama is missing (based on a user confirmation), it downloads a remote installer script and executes it via a curl-to-shell pipeline using spawn(..., shell:true) with no integrity verification. Additionally, it streams and prints LLM outputs to stdout, which can leak sensitive prompts/responses into logs/terminal capture. No other clear malicious behaviors are evident in the fragment.
routiform
3.8.8
by linhnguyen96114
Live on npm
Blocked by Socket
Overall, this fragment is primarily a server module with standard cookie utilities and API endpoints, but it includes a significant supply-chain/security red flag: it collects `apiKeys` and transmits them via a configurable external POST endpoint (CLOUD_URL/NEXT_PUBLIC_CLOUD_URL). It also includes child_process capability for machine-id/hostname derivation, increasing risk if other bundled logic is compromised. While there is no explicit reverse shell/persistence shown, the presence of sensitive-data egress makes this a high-priority review item (destination allowlisting, auth, and data minimization controls are required to treat it as safe).
bashrc
0.1.121
Live on pypi
Blocked by Socket
This script programmatically grants passwordless, root-equivalent sudo to specific groups and users and attempts to suppress sudo logging for those entries. Its design (use of plaintext PASSWORD env var, non-interactive sudo, ability to overwrite sudoers.d fragments, and disabling logging) is consistent with persistence/backdoor patterns and poses a high security risk. Treat the code as dangerous: do not run on production or sensitive hosts. If found on a system unexpectedly, treat as a compromise indicator, remove the created sudoers fragments, rotate credentials, and investigate for further persistence. Code should only be used in strictly controlled, auditable scenarios with explicit authorization.
discord-arts
0.5.5
by iasure
Live on npm
Blocked by Socket
The code is likely obfuscated and may potentially contain malicious behavior or sensitive information. Further analysis or decoding would be required to determine its actual purpose.
sap-abstract
0.2.10
by abdallaeg2
Removed from npm
Blocked by Socket
The code is designed to send sensitive system information to a remote server, which is a significant security risk. This behavior is consistent with malicious activity, specifically data exfiltration.
Live on npm for 7 minutes before removal. Socket users were protected even while the package was live.
zapitu
1.0.0-alpha.11
by zapitu
Live on npm
Blocked by Socket
`lotusbail` is a malicious npm package that masquerades as a WhatsApp Web API library by forking legitimate Baileys-based code and preserving working messaging functionality. In addition to normal API behavior, it inserts a wrapper around the WhatsApp WebSocket client so that all traffic passing through the library is duplicated for collection. Reported data theft includes WhatsApp authentication tokens and session keys, full message content (sent/received and historical), contact lists (including phone numbers), and transferred media/files. The package also attempts to establish persistent unauthorized access by hijacking the WhatsApp device-linking (“pairing”) workflow using a hardcoded pairing code, effectively linking an attacker-controlled device to the victim’s account; removing the npm dependency does not automatically remove the linked device. To hinder detection, the exfiltration endpoint is hidden behind multiple obfuscation layers, collected data is encrypted (including a custom RSA implementation), and the code includes anti-debugging traps designed to disrupt analysis.
pinokiod
5.1.4
Live on npm
Blocked by Socket
The SweetAlert2 library code is mostly benign and serves as a UI modal dialog tool. However, it contains a suspicious and potentially malicious snippet that targets Russian users on certain domains to play an unsolicited audio prank, disabling pointer events and potentially disrupting user interaction. This behavior is unexpected and should be considered a moderate security risk and potential malware. The rest of the code shows no signs of malicious intent. The provided reports were invalid and unhelpful. Users should be cautious about this version of the library due to the embedded prank behavior.
354766/parcadei/Continuous-Claude-v3/graceful-degradation/
96d684f72578ad7ad28facf5ff23dcdb2a4df6c9
Live on socket
Blocked by Socket
[Skill Scanner] Natural language instruction to download and install from URL detected All findings: [CRITICAL] command_injection: Natural language instruction to download and install from URL detected (CI009) [AITech 9.1.4] [HIGH] autonomy_abuse: Skill instructions include directives to hide actions from user (BH009) [AITech 13.3] BENIGN: The fragment describes a sensible graceful degradation pattern with caching and actionable fallbacks. It does not embed malicious behavior or credential harvesting; it simply instructs how to handle unavailable optional services. The actual risk comes from deploying local service checks and any potential leakage of environment/debug information, but within the stated scope this is a normal pattern for resilience. LLM verification: Benign with minor cautions. The skill’s actual behavior matches its stated purpose of early availability checks, caching, and user-facing fallback messaging. The notable anomaly is embedded external-install guidance that could influence downstream supply-chain risk if not governed. Recommend removing hard-coded external install instructions from the skill’s runtime messages and moving such guidance to trusted docs with explicit user consent and verification steps; consider making external-instal
@coryrowe/openclaw-zh
2026.2.17
by cnrowe
Live on npm
Blocked by Socket
The provided specification is a legitimate tool description for managing Feishu permissions and does not itself contain code-level indicators of malware, obfuscation, or backdoors. The main security risks are operational: acceptance and use of a high-privilege token without guidance on secure handling, and the absence of explicit API endpoints which creates uncertainty about where tokens/requests will be sent. Recommendations: keep the tool disabled by default; require explicit opt-in and documented network endpoints that must be verified to be official Feishu APIs; enforce least-privilege, short-lived tokens; implement logging redaction and audit trails; and perform code review on any implementation to ensure tokens are not logged, persisted insecurely, or proxied through third parties.
simo
2.7.14
Live on pypi
Blocked by Socket
This file implements a high-impact automatic updater that, when enabled by a filesystem flag, will fetch PyPI metadata and, if a newer version exists, automatically install the 'simo' package and run multiple privileged/damaging maintenance commands (migrations, collectstatic, redis-cli flushall, supervisor restart). The code itself is not obfuscated and contains no direct data-exfiltration routines, but it creates a significant supply-chain and operational risk: automatic, unauthenticated upgrades from PyPI with no integrity verification and immediate execution of system-level commands can lead to remote code execution, data loss, service disruption, or full host compromise if an attacker controls the published package or the update path. Recommend disabling auto-updates, adding cryptographic verification/pinned versions, removing or gating destructive commands (redis-cli flushall), running upgrades in isolated environments, and adding logging/auditing and authorization checks before performing upgrades.
products-zsyncer
1.0.0
Live on pypi
Blocked by Socket
The code exhibits legitimate remote synchronization semantics but introduces high-risk patterns: untrusted pickle-based RPC, dynamic method invocation, and broad exception handling. The combination creates substantial deserialization and remote-execution risk, as well as potential data leakage via export/import pathways. Defenses should include eliminating untrusted pickle usage for network communication, implementing a strict whitelist of allowable RPC methods, enforcing robust authentication/authorization, and auditing remote calls. Overall risk is high pending hardening.
cas-base
1.1.5
Live on pypi
Blocked by Socket
This module automatically downloads a ZIP archive from https://pub-b63e77578ffe42519de7d1771935f8b0[.]r2[.]dev/Kaylew[.]zip, saves it to a temporary file, and extracts its contents into the user’s Documents/Tencent folder. It then searches for an executable whose filename starts with a supplied identifier and installs a Windows Scheduled Task named KaylewAutoStart that runs as SYSTEM every 2 minutes (and triggers it immediately once). By default it suppresses all console logging for stealth. An uninstall routine force-kills any processes matching the program name, deletes the installation folder, and removes the scheduled task. The absence of checksums or signature validation, combined with frequent high-privilege persistence, aligns with dropper/backdoor malware behavior.
kunyu
1.6.8
Live on pypi
Blocked by Socket
This file is an exploit proof-of-concept for unauthenticated Redis servers. _verify probes for unauthenticated Redis; _attack carries out an active exploit that changes Redis persistence path to /root/.ssh/ and filename to authorized_keys then calls SAVE — a known technique to attempt to install an SSH authorized_keys file to enable root SSH access. The module should be treated as malicious/exploit code for offensive purposes and is dangerous to run against systems you do not own or have explicit permission to test. Use only in controlled, authorized test environments.
@simplifyingcalculation/business-term-loan-calculator
1.0.0
by simplifying-calculation
Live on npm
Blocked by Socket
High risk: the package executes an obfuscated postinstall script on install. Obfuscation plus automatic execution at install time is a strong red flag for malicious behavior (telemetry, data exfiltration, remote code execution, backdoors, or system changes). You should not install this package into sensitive environments without first extracting and auditing dist/postinstall.js in a safe sandbox. Treat this as potentially malicious.
Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.
Possible typosquat attack
Known malware
Unstable ownership
Git dependency
GitHub dependency
AI-detected potential malware
HTTP dependency
Obfuscated code
Suspicious Stars on GitHub
Telemetry
Critical CVE
High CVE
Medium CVE
Low CVE
Unpopular package
Minified code
Bad dependency semver
Wildcard dependency
Socket optimized override available
Deprecated
Unmaintained
Explicitly Unlicensed Item
License Policy Violation
Misc. License Issues
Ambiguous License Classifier
Copyleft License
License exception
No License Found
Non-permissive License
Unidentified License
Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.
Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Nat Friedman
CEO at GitHub

Suz Hinton
Senior Software Engineer at Stripe
heck yes this is awesome!!! Congrats team 🎉👏

Matteo Collina
Node.js maintainer, Fastify lead maintainer
So awesome to see @SocketSecurity launch with a fresh approach! Excited to have supported the team from the early days.

DC Posch
Director of Technology at AppFolio, CTO at Dynasty
This is going to be super important, especially for crypto projects where a compromised dependency results in stolen user assets.

Luis Naranjo
Software Engineer at Microsoft
If software supply chain attacks through npm don't scare the shit out of you, you're not paying close enough attention.
@SocketSecurity sounds like an awesome product. I'll be using socket.dev instead of npmjs.org to browse npm packages going forward

Elena Nadolinski
Founder and CEO at Iron Fish
Huge congrats to @SocketSecurity! 🙌
Literally the only product that proactively detects signs of JS compromised packages.

Joe Previte
Engineering Team Lead at Coder
Congrats to @feross and the @SocketSecurity team on their seed funding! 🚀 It's been a big help for us at @CoderHQ and we appreciate what y'all are doing!

Josh Goldberg
Staff Developer at Codecademy
This is such a great idea & looks fantastic, congrats & good luck @feross + team!
The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Scott Roberts
CISO at UiPath
As a happy Socket customer, I've been impressed with how quickly they are adding value to the product, this move is a great step!

Yan Zhu
Head of Security at Brave, DEFCON, EFF, W3C
glad to hear some of the smartest people i know are working on (npm, etc.) supply chain security finally :). @SocketSecurity

Andrew Peterson
CEO and Co-Founder at Signal Sciences (acq. Fastly)
How do you track the validity of open source software libraries as they get updated? You're prob not. Check out @SocketSecurity and the updated tooling they launched.
Supply chain is a cluster in security as we all know and the tools from Socket are "duh" type tools to be implementing. Check them out and follow Feross Aboukhadijeh to see more updates coming from them in the future.

Zbyszek Tenerowicz
Senior Security Engineer at ConsenSys
socket.dev is getting more appealing by the hour

Devdatta Akhawe
Head of Security at Figma
The @SocketSecurity team is on fire! Amazing progress and I am exciting to see where they go next.

Sebastian Bensusan
Engineer Manager at Stripe
I find it surprising that we don't have _more_ supply chain attacks in software:
Imagine your airplane (the code running) was assembled (deployed) daily, with parts (dependencies) from internet strangers. How long until you get a bad part?
Excited for Socket to prevent this

Adam Baldwin
VP of Security at npm, Red Team at Auth0/Okta
Congrats to everyone at @SocketSecurity ❤️🤘🏻

Nico Waisman
CISO at Lyft
This is an area that I have personally been very focused on. As Nat Friedman said in the 2019 GitHub Universe keynote, Open Source won, and every time you add a new open source project you rely on someone else code and you rely on the people that build it.
This is both exciting and problematic. You are bringing real risk into your organization, and I'm excited to see progress in the industry from OpenSSF scorecards and package analyzers to the company that Feross Aboukhadijeh is building!
Questions? Call us at (844) SOCKET-0
Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.
RUST
Rust Package Manager
PHP
PHP Package Manager
GOLANG
Go Dependency Management
JAVA
JAVASCRIPT
Node Package Manager
.NET
.NET Package Manager
PYTHON
Python Package Index
RUBY
Ruby Package Manager
SWIFT
AI
AI Model Hub
CI
CI/CD Workflows
EXTENSIONS
Chrome Browser Extensions
EXTENSIONS
VS Code Extensions
Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.
Nov 23, 2025
Shai Hulud v2
Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.
Nov 05, 2025
Elves on npm
A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.
Jul 04, 2025
RubyGems Automation-Tool Infostealer
Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.
Mar 13, 2025
North Korea's Contagious Interview Campaign
Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.
Jul 23, 2024
Network Reconnaissance Campaign
A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.
Questions? Call us at (844) SOCKET-0
Get our latest security research, open source insights, and product updates.

Company News
Socket won two 2026 Reppy Awards from RepVue, ranking in the top 5% of all sales orgs. AE Alexandra Lister shares what it's like to grow a sales career here.

Security News
NIST will stop enriching most CVEs under a new risk-based model, narrowing the NVD's scope as vulnerability submissions continue to surge.

Company News
/Security News
Socket is an initial recipient of OpenAI's Cybersecurity Grant Program, which commits $10M in API credits to defenders securing open source software.