Launch Week Day 5: Introducing Reachability for PHP.Learn More
Socket
Book a DemoSign in
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery
t

timmywil published 4.0.0

left-pad
s

stevemao published 1.3.0

react
r

react-bot published 19.2.5

We protect you from vulnerable and malicious packages

micropython-espresso

1.3

Live on pypi

Blocked by Socket

This module implements a persistent remote code execution/backdoor: it connects to a hardcoded WebSocket server, registers with a device ID, receives arbitrary Python code over the network and executes it locally, and returns output. It contains hardcoded Wi‑Fi credentials and controller address. This is a high‑risk component and should be considered malicious or at least extremely dangerous in most deployment scenarios. Do not deploy on production or untrusted devices; if this code is unexpected, treat the package as compromised and revoke credentials and network access for affected devices.

glyphs-info-mcp

1.3.0

Live on pypi

Blocked by Socket

This script is a local dropper/updater that bulk-overwrites plugin executables named 'plugin' inside macOS plugin bundles under the user's Glyphs 3 Repositories folder with a payload binary located next to the script. The behavior is consistent with supply-chain replacement or persistence mechanisms and is high-risk: if the payload is malicious it enables arbitrary code execution via application plugins. The snippet lacks safeguards (validation, backups, prompting) and contains a syntax error. Treat as potentially malicious; do not run without verifying the payload, author, and intent.

@link-assistant/hive-mind

1.46.1

by GitHub Actions

Live on npm

Blocked by Socket

The code implements a cross-platform system resource checker (RAM/Disk) with an additional, high-risk remote dynamic loader pattern. The remote fetch and eval step constitutes the principal security vulnerability and supply-chain risk, as it allows arbitrary code execution and potential backdoors. While the local checks themselves appear benign, the trust boundary is broken by remote code injection. To reduce risk, eliminate remote dynamic loading, or replace with pinned, signed dependencies and verifiable integrity checks. If remote loading must remain, implement strict integrity verification (SRI-like), sandboxing, and code-signing guarantees, and remove eval usage.

ailever

0.3.218

Live on pypi

Blocked by Socket

The code presents a strong supply-chain and remote-execution risk by automatically downloading and executing remote Python payloads without integrity checks or sandboxing. It also creates and runs external services (Jupyter, Visdom, RStudio) based on user inputs, which can amplify impact if the remote payload is malicious. Mitigations include removing remote code execution paths, adding cryptographic verification (signatures or hash checks), isolating execution (sandboxes or containerization), validating inputs, and avoiding untrusted downloads or executions.

yj-filepool

3.0.12

by hanneil

Live on npm

Blocked by Socket

The code is a legitimate file upload UI component with standard features and no direct security vulnerabilities or malware. However, it contains an intrusive and potentially malicious snippet that targets users with Russian language and certain domain suffixes by disabling pointer events and playing an external audio file without consent. This behavior constitutes a significant security and privacy risk and should be considered malicious or at least unwanted. Users should be cautious using this package, and this snippet should be removed or disabled to ensure user safety and trust.

github.com/weaveworks/weave

v1.0.2-0.20150810131312-c2d5b35cd633

Live on go

Blocked by Socket

This module is a high-risk runtime packer/dropper: it embeds an encrypted payload, decrypts it using a user-supplied passphrase, writes the result to `bin/do-setup-circleci-secrets`, and immediately executes it. Because there is no integrity/authenticity validation of the decrypted artifact and the executed code is not shown here, the module should be treated as potentially malicious until the decrypted `bin/do-setup-circleci-secrets` content is inspected and validated in a safe environment.

bluelamp-ai

1.0.1

Live on pypi

Blocked by Socket

This module executes a concealed payload reconstructed from an embedded base64 + zlib blob via exec() at import time. That pattern is a high-risk indicator for malicious or at least hidden behavior. Without decoding and analyzing the embedded payload, one cannot determine intent or effects. Treat this file (and the containing package) as untrusted until the decompressed source is examined in an isolated environment. Recommended immediate actions: do not run or import this package in sensitive environments; decode and audit the payload offline; if malicious actions are found, remove the package and rotate any potentially exposed secrets.

nuxt-tailwind-marketpalce-kit

0.2.5

by savvyversa

Live on npm

Blocked by Socket

The install hook will execute a local script (src/postinstall.js) during npm install. That is the primary risk: arbitrary code execution, which could perform data exfiltration, install backdoors, modify system files, or add git hooks. Additional red flags: an odd third-party dependency name (tailwind-marketpalce-kit) and a npm-published 'fs' package. You should NOT install this package without first auditing src/postinstall.js and carefully vetting all dependencies (especially similarly named or squatted packages). If you must install, do so in an isolated, offline, or ephemeral environment and inspect network/file operations performed by the postinstall script.

ckanext-toolbelt

0.4.21

Live on pypi

Blocked by Socket

The code primarily serves to provide alert functionality using the SweetAlert2 library. However, it includes potentially risky behavior, such as the use of new Function(), and dynamically playing a remote audio file based on locale and domain conditions. This requires further scrutiny for any context-specific vulnerabilities.

util-cql-parser

9.617.0

by hcldfrty

Live on npm

Blocked by Socket

The code represents a covert data-exfiltration backdoor pattern. It stealthily collects environment data and transmits it to an attacker-controlled endpoint, guarded by evasive checks to avoid execution in certain environments. This behavior poses significant supply-chain and privacy risks and should be treated as malicious until proven otherwise. Remediation should remove the exfiltration logic, add clear user-consent mechanisms, and implement strict data-handling policies and auditing.

osbtlib

0.0.3

Live on pypi

Blocked by Socket

This module is an orchestration client that explicitly crafts and sends commands to a remote operator service for offensive actions (IDSpoofing, MaliciousEndpoint, IdPConfusion). It does not perform attacks locally but enables remote attack orchestration. It lacks input validation and authentication and uses broad exception handling. There is also a syntax error in the provided fragment that would prevent execution as-is. Treat inclusion of this module in trusted software as a high-risk indicator; avoid or audit thoroughly and remove if not explicitly required for legitimate testing under strict controls.

wirelessxpl

1.3.0

Live on pypi

Blocked by Socket

This module is highly indicative of offensive Wi-Fi exploitation tooling. It performs active 802.11 deauthentication frame injection toward operator-specified targets, captures CCMP traffic, and attempts KR00K-consistent decryption using a hardcoded all-zero temporal key, then reconstructs and saves decrypted frames to PCAP files. The live-mode behavior (deauth thread + sniffing + decrypted artifact persistence) is consistent with unauthorized interception/decryption and network disruption rather than benign library functionality.

@rexxhayanasi/elaina-baileys

1.1.0-rc.6

Live on npm

Blocked by Socket

`lotusbail` is a malicious npm package that masquerades as a WhatsApp Web API library by forking legitimate Baileys-based code and preserving working messaging functionality. In addition to normal API behavior, it inserts a wrapper around the WhatsApp WebSocket client so that all traffic passing through the library is duplicated for collection. Reported data theft includes WhatsApp authentication tokens and session keys, full message content (sent/received and historical), contact lists (including phone numbers), and transferred media/files. The package also attempts to establish persistent unauthorized access by hijacking the WhatsApp device-linking (“pairing”) workflow using a hardcoded pairing code, effectively linking an attacker-controlled device to the victim’s account; removing the npm dependency does not automatically remove the linked device. To hinder detection, the exfiltration endpoint is hidden behind multiple obfuscation layers, collected data is encrypted (including a custom RSA implementation), and the code includes anti-debugging traps designed to disrupt analysis.

oebuild

0.0.36

Live on pypi

Blocked by Socket

The code contains potentially dangerous subprocess calls with user-provided input, hardcoded paths, and the use of pty.spawn, indicating potential security risks and possible malicious behavior.

current-context-urn

99.20.10

by lasitoninja

Live on npm

Blocked by Socket

This code is best characterized as a malicious supply-chain side-effect that performs sensitive environment harvesting (all process.env values), attempts cloud metadata collection via the instance metadata IP, and exfiltrates the collected system/cloud/environment details to an external OAST host and a hardcoded Discord webhook. It also performs out-of-band DNS signaling for execution verification. Overall, the behavior strongly matches credential/secret-adjacent theft and telemetry exfiltration rather than legitimate dependency functionality.

ailever

0.2.537

Live on pypi

Blocked by Socket

The fragment contains a high-risk pattern: it downloads a Python script from a remote source and immediately executes it without integrity verification or sandboxing. This creates a critical supply-chain and remote-code-execution risk, as the remote payload could perform any action on the host, including data exfiltration, credential access, or system compromise. Even though defaults use placeholders, the mechanism itself is unsafe and should be disallowed or hardened (e.g., verify hashes, use signed modules, avoid executing remote code).

fiinquant

0.10.20

Live on pypi

Blocked by Socket

This file contains obfuscated malicious code that uses multiple evasion techniques to hide its true functionality. The code implements a multi-stage decoder that: 1) Reverses an encoded string 2) Decodes it using base64 3) Decompresses it using zlib 4) Executes the resulting code using exec(). This pattern is a common malware technique designed to evade security scanning and hide malicious payloads. The use of exec() to execute arbitrary decoded content poses a severe security risk as it allows execution of potentially harmful code. The intentional obfuscation through multiple encoding layers combined with dynamic code execution strongly indicates this is malware rather than legitimate functionality. The code should not be executed as it likely contains a malicious payload designed for system compromise, data exfiltration, or other harmful activities.

vtuanhihi

2.0.6

by vtuanhihi

Removed from npm

Blocked by Socket

The code has several security risks due to unsanitized input being used in sensitive operations such as file I/O and system command execution. There's also a risk of remote code execution through the fetching and executing of remote content. The complexity of the code and the data flow increase the difficulty in ensuring security.

Live on npm for 57 days, 18 hours and 48 minutes before removal. Socket users were protected even while the package was live.

xgm-dev

0.0.1

Live on pypi

Blocked by Socket

This script functions as a privilege-elevating launcher that invokes a local binary (quark) with a configuration (remote.json) from a non-standard directory (C:\systemq). The technique (mshta -> ShellExecute 'runas') is a common malicious pattern for stealthy elevation. Without the quark binary and config we cannot definitively label the end payload, but the overall behavior is highly suspicious and consistent with a stager for remote-control or other malicious activity. Immediate investigation and quarantine are recommended.

imagecomponents.wpf.imaging

4.0.0.1

by Image Components

Live on nuget

Blocked by Socket

This assembly contains an obfuscated loader/runtime that decrypts embedded resources, verifies signatures, allocates and writes executable memory, resolves native functions, creates delegates/dynamic methods and invokes code in-memory. Those behaviors are consistent with a malicious runtime loader or in-memory payload injector (supply-chain/backdoor capability). The UI PropertyGrid classes appear clean, but are bundled with a high-risk obfuscated native loader. Do not use this package in production; treat it as malicious and remove it from supply chain.

argocd-csq

0.1.3

Live on pypi

Blocked by Socket

This module collects interactive Okta credentials and MFA session tokens, logs a JWT, and transmits username and MD5-hashed password/sessionToken as JSON to a hardcoded remote host over an unencrypted TCP socket. These are explicit credential-exfiltration behaviors. Unless there is well-documented, trusted justification and secure transport/consent, treat this code as malicious or severely unsafe. Immediate mitigation: do not run; remove or disable send_message calls; do not log JWTs or secrets; avoid MD5; require TLS/mutual auth and explicit user consent for any remote transmission; investigate repository provenance and the remote host.

mtmai

0.3.739

Live on pypi

Blocked by Socket

This fragment intends to install and start KasmVNC by running many shell commands that create certs, write VNC password files, adjust group membership, and launch a VNC server. The primary security issues are unsafe shell interpolation (command injection risk), programmatic persistence of a possibly predictable password, execution with sudo based on unvalidated env vars, starting a VNC server exposed on 0.0.0.0 with disabled/basic auth, and multiple unsafe filesystem operations performed via shell. There is no clear evidence of obfuscated or direct exfiltration malware, but the behavior can provide an unauthorized remote access vector (backdoor-like) if used maliciously. Do not run this code without fixing shell usage, validating inputs, using secure randomly generated passwords, enforcing proper file permissions, and not disabling authentication.

88q

1.0.4

by vsamaru

Live on npm

Blocked by Socket

This source code contains a malicious backdoor that exfiltrates console logs (warnings, errors, info) to attacker-controlled Telegram chats using a hardcoded bot token and chat IDs. It suppresses normal console output and contains coding errors such as an undefined variable and an undefined export. The behavior constitutes a serious supply chain security risk due to unauthorized data leakage. The code is not obfuscated but is clearly malicious and should be treated as malware.

micropython-espresso

1.3

Live on pypi

Blocked by Socket

This module implements a persistent remote code execution/backdoor: it connects to a hardcoded WebSocket server, registers with a device ID, receives arbitrary Python code over the network and executes it locally, and returns output. It contains hardcoded Wi‑Fi credentials and controller address. This is a high‑risk component and should be considered malicious or at least extremely dangerous in most deployment scenarios. Do not deploy on production or untrusted devices; if this code is unexpected, treat the package as compromised and revoke credentials and network access for affected devices.

glyphs-info-mcp

1.3.0

Live on pypi

Blocked by Socket

This script is a local dropper/updater that bulk-overwrites plugin executables named 'plugin' inside macOS plugin bundles under the user's Glyphs 3 Repositories folder with a payload binary located next to the script. The behavior is consistent with supply-chain replacement or persistence mechanisms and is high-risk: if the payload is malicious it enables arbitrary code execution via application plugins. The snippet lacks safeguards (validation, backups, prompting) and contains a syntax error. Treat as potentially malicious; do not run without verifying the payload, author, and intent.

@link-assistant/hive-mind

1.46.1

by GitHub Actions

Live on npm

Blocked by Socket

The code implements a cross-platform system resource checker (RAM/Disk) with an additional, high-risk remote dynamic loader pattern. The remote fetch and eval step constitutes the principal security vulnerability and supply-chain risk, as it allows arbitrary code execution and potential backdoors. While the local checks themselves appear benign, the trust boundary is broken by remote code injection. To reduce risk, eliminate remote dynamic loading, or replace with pinned, signed dependencies and verifiable integrity checks. If remote loading must remain, implement strict integrity verification (SRI-like), sandboxing, and code-signing guarantees, and remove eval usage.

ailever

0.3.218

Live on pypi

Blocked by Socket

The code presents a strong supply-chain and remote-execution risk by automatically downloading and executing remote Python payloads without integrity checks or sandboxing. It also creates and runs external services (Jupyter, Visdom, RStudio) based on user inputs, which can amplify impact if the remote payload is malicious. Mitigations include removing remote code execution paths, adding cryptographic verification (signatures or hash checks), isolating execution (sandboxes or containerization), validating inputs, and avoiding untrusted downloads or executions.

yj-filepool

3.0.12

by hanneil

Live on npm

Blocked by Socket

The code is a legitimate file upload UI component with standard features and no direct security vulnerabilities or malware. However, it contains an intrusive and potentially malicious snippet that targets users with Russian language and certain domain suffixes by disabling pointer events and playing an external audio file without consent. This behavior constitutes a significant security and privacy risk and should be considered malicious or at least unwanted. Users should be cautious using this package, and this snippet should be removed or disabled to ensure user safety and trust.

github.com/weaveworks/weave

v1.0.2-0.20150810131312-c2d5b35cd633

Live on go

Blocked by Socket

This module is a high-risk runtime packer/dropper: it embeds an encrypted payload, decrypts it using a user-supplied passphrase, writes the result to `bin/do-setup-circleci-secrets`, and immediately executes it. Because there is no integrity/authenticity validation of the decrypted artifact and the executed code is not shown here, the module should be treated as potentially malicious until the decrypted `bin/do-setup-circleci-secrets` content is inspected and validated in a safe environment.

bluelamp-ai

1.0.1

Live on pypi

Blocked by Socket

This module executes a concealed payload reconstructed from an embedded base64 + zlib blob via exec() at import time. That pattern is a high-risk indicator for malicious or at least hidden behavior. Without decoding and analyzing the embedded payload, one cannot determine intent or effects. Treat this file (and the containing package) as untrusted until the decompressed source is examined in an isolated environment. Recommended immediate actions: do not run or import this package in sensitive environments; decode and audit the payload offline; if malicious actions are found, remove the package and rotate any potentially exposed secrets.

nuxt-tailwind-marketpalce-kit

0.2.5

by savvyversa

Live on npm

Blocked by Socket

The install hook will execute a local script (src/postinstall.js) during npm install. That is the primary risk: arbitrary code execution, which could perform data exfiltration, install backdoors, modify system files, or add git hooks. Additional red flags: an odd third-party dependency name (tailwind-marketpalce-kit) and a npm-published 'fs' package. You should NOT install this package without first auditing src/postinstall.js and carefully vetting all dependencies (especially similarly named or squatted packages). If you must install, do so in an isolated, offline, or ephemeral environment and inspect network/file operations performed by the postinstall script.

ckanext-toolbelt

0.4.21

Live on pypi

Blocked by Socket

The code primarily serves to provide alert functionality using the SweetAlert2 library. However, it includes potentially risky behavior, such as the use of new Function(), and dynamically playing a remote audio file based on locale and domain conditions. This requires further scrutiny for any context-specific vulnerabilities.

util-cql-parser

9.617.0

by hcldfrty

Live on npm

Blocked by Socket

The code represents a covert data-exfiltration backdoor pattern. It stealthily collects environment data and transmits it to an attacker-controlled endpoint, guarded by evasive checks to avoid execution in certain environments. This behavior poses significant supply-chain and privacy risks and should be treated as malicious until proven otherwise. Remediation should remove the exfiltration logic, add clear user-consent mechanisms, and implement strict data-handling policies and auditing.

osbtlib

0.0.3

Live on pypi

Blocked by Socket

This module is an orchestration client that explicitly crafts and sends commands to a remote operator service for offensive actions (IDSpoofing, MaliciousEndpoint, IdPConfusion). It does not perform attacks locally but enables remote attack orchestration. It lacks input validation and authentication and uses broad exception handling. There is also a syntax error in the provided fragment that would prevent execution as-is. Treat inclusion of this module in trusted software as a high-risk indicator; avoid or audit thoroughly and remove if not explicitly required for legitimate testing under strict controls.

wirelessxpl

1.3.0

Live on pypi

Blocked by Socket

This module is highly indicative of offensive Wi-Fi exploitation tooling. It performs active 802.11 deauthentication frame injection toward operator-specified targets, captures CCMP traffic, and attempts KR00K-consistent decryption using a hardcoded all-zero temporal key, then reconstructs and saves decrypted frames to PCAP files. The live-mode behavior (deauth thread + sniffing + decrypted artifact persistence) is consistent with unauthorized interception/decryption and network disruption rather than benign library functionality.

@rexxhayanasi/elaina-baileys

1.1.0-rc.6

Live on npm

Blocked by Socket

`lotusbail` is a malicious npm package that masquerades as a WhatsApp Web API library by forking legitimate Baileys-based code and preserving working messaging functionality. In addition to normal API behavior, it inserts a wrapper around the WhatsApp WebSocket client so that all traffic passing through the library is duplicated for collection. Reported data theft includes WhatsApp authentication tokens and session keys, full message content (sent/received and historical), contact lists (including phone numbers), and transferred media/files. The package also attempts to establish persistent unauthorized access by hijacking the WhatsApp device-linking (“pairing”) workflow using a hardcoded pairing code, effectively linking an attacker-controlled device to the victim’s account; removing the npm dependency does not automatically remove the linked device. To hinder detection, the exfiltration endpoint is hidden behind multiple obfuscation layers, collected data is encrypted (including a custom RSA implementation), and the code includes anti-debugging traps designed to disrupt analysis.

oebuild

0.0.36

Live on pypi

Blocked by Socket

The code contains potentially dangerous subprocess calls with user-provided input, hardcoded paths, and the use of pty.spawn, indicating potential security risks and possible malicious behavior.

current-context-urn

99.20.10

by lasitoninja

Live on npm

Blocked by Socket

This code is best characterized as a malicious supply-chain side-effect that performs sensitive environment harvesting (all process.env values), attempts cloud metadata collection via the instance metadata IP, and exfiltrates the collected system/cloud/environment details to an external OAST host and a hardcoded Discord webhook. It also performs out-of-band DNS signaling for execution verification. Overall, the behavior strongly matches credential/secret-adjacent theft and telemetry exfiltration rather than legitimate dependency functionality.

ailever

0.2.537

Live on pypi

Blocked by Socket

The fragment contains a high-risk pattern: it downloads a Python script from a remote source and immediately executes it without integrity verification or sandboxing. This creates a critical supply-chain and remote-code-execution risk, as the remote payload could perform any action on the host, including data exfiltration, credential access, or system compromise. Even though defaults use placeholders, the mechanism itself is unsafe and should be disallowed or hardened (e.g., verify hashes, use signed modules, avoid executing remote code).

fiinquant

0.10.20

Live on pypi

Blocked by Socket

This file contains obfuscated malicious code that uses multiple evasion techniques to hide its true functionality. The code implements a multi-stage decoder that: 1) Reverses an encoded string 2) Decodes it using base64 3) Decompresses it using zlib 4) Executes the resulting code using exec(). This pattern is a common malware technique designed to evade security scanning and hide malicious payloads. The use of exec() to execute arbitrary decoded content poses a severe security risk as it allows execution of potentially harmful code. The intentional obfuscation through multiple encoding layers combined with dynamic code execution strongly indicates this is malware rather than legitimate functionality. The code should not be executed as it likely contains a malicious payload designed for system compromise, data exfiltration, or other harmful activities.

vtuanhihi

2.0.6

by vtuanhihi

Removed from npm

Blocked by Socket

The code has several security risks due to unsanitized input being used in sensitive operations such as file I/O and system command execution. There's also a risk of remote code execution through the fetching and executing of remote content. The complexity of the code and the data flow increase the difficulty in ensuring security.

Live on npm for 57 days, 18 hours and 48 minutes before removal. Socket users were protected even while the package was live.

xgm-dev

0.0.1

Live on pypi

Blocked by Socket

This script functions as a privilege-elevating launcher that invokes a local binary (quark) with a configuration (remote.json) from a non-standard directory (C:\systemq). The technique (mshta -> ShellExecute 'runas') is a common malicious pattern for stealthy elevation. Without the quark binary and config we cannot definitively label the end payload, but the overall behavior is highly suspicious and consistent with a stager for remote-control or other malicious activity. Immediate investigation and quarantine are recommended.

imagecomponents.wpf.imaging

4.0.0.1

by Image Components

Live on nuget

Blocked by Socket

This assembly contains an obfuscated loader/runtime that decrypts embedded resources, verifies signatures, allocates and writes executable memory, resolves native functions, creates delegates/dynamic methods and invokes code in-memory. Those behaviors are consistent with a malicious runtime loader or in-memory payload injector (supply-chain/backdoor capability). The UI PropertyGrid classes appear clean, but are bundled with a high-risk obfuscated native loader. Do not use this package in production; treat it as malicious and remove it from supply chain.

argocd-csq

0.1.3

Live on pypi

Blocked by Socket

This module collects interactive Okta credentials and MFA session tokens, logs a JWT, and transmits username and MD5-hashed password/sessionToken as JSON to a hardcoded remote host over an unencrypted TCP socket. These are explicit credential-exfiltration behaviors. Unless there is well-documented, trusted justification and secure transport/consent, treat this code as malicious or severely unsafe. Immediate mitigation: do not run; remove or disable send_message calls; do not log JWTs or secrets; avoid MD5; require TLS/mutual auth and explicit user consent for any remote transmission; investigate repository provenance and the remote host.

mtmai

0.3.739

Live on pypi

Blocked by Socket

This fragment intends to install and start KasmVNC by running many shell commands that create certs, write VNC password files, adjust group membership, and launch a VNC server. The primary security issues are unsafe shell interpolation (command injection risk), programmatic persistence of a possibly predictable password, execution with sudo based on unvalidated env vars, starting a VNC server exposed on 0.0.0.0 with disabled/basic auth, and multiple unsafe filesystem operations performed via shell. There is no clear evidence of obfuscated or direct exfiltration malware, but the behavior can provide an unauthorized remote access vector (backdoor-like) if used maliciously. Do not run this code without fixing shell usage, validating inputs, using secure randomly generated passwords, enforcing proper file permissions, and not disabling authentication.

88q

1.0.4

by vsamaru

Live on npm

Blocked by Socket

This source code contains a malicious backdoor that exfiltrates console logs (warnings, errors, info) to attacker-controlled Telegram chats using a hardcoded bot token and chat IDs. It suppresses normal console output and contains coding errors such as an undefined variable and an undefined export. The behavior constitutes a serious supply chain security risk due to unauthorized data leakage. The code is not obfuscated but is clearly malicious and should be treated as malware.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Possible typosquat attack

Known malware

Git dependency

GitHub dependency

HTTP dependency

Obfuscated code

Suspicious Stars on GitHub

Telemetry

Protestware or potentially unwanted behavior

Unstable ownership

55 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Book a Demo

Questions? Call us at (844) SOCKET-0

Read the blog

Protect every package in your stack

Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.

View all integrations

RUST

crates.io

Rust Package Manager

PHP

Packagist

PHP Package Manager

GOLANG

Go Modules

Go Dependency Management

JAVA

Maven Central

JAVASCRIPT

npm

Node Package Manager

.NET

NuGet

.NET Package Manager

PYTHON

PyPI

Python Package Index

RUBY

RubyGems.org

Ruby Package Manager

SWIFT

Swift

AI

Hugging Face Hub

AI Model Hub

CI

GitHub Actions

CI/CD Workflows

EXTENSIONS

Chrome Web Store

Chrome Browser Extensions

EXTENSIONS

Open VSX

VS Code Extensions

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Nov 23, 2025

Shai Hulud v2

Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.

Nov 05, 2025

Elves on npm

A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.

Jul 04, 2025

RubyGems Automation-Tool Infostealer

Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.

Mar 13, 2025

North Korea's Contagious Interview Campaign

Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.

Jul 23, 2024

Network Reconnaissance Campaign

A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles