Launch Week Day 5: Introducing Reachability for PHP.Learn More
Socket
Book a DemoSign in
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery
t

timmywil published 4.0.0

left-pad
s

stevemao published 1.3.0

react
r

react-bot published 19.2.5

We protect you from vulnerable and malicious packages

@atezer/figma-mcp-bridge

1.5.2

by atezer

Live on npm

Blocked by Socket

High security risk. This fragment exposes a critical arbitrary code execution capability (EXECUTE_CODE -> eval of msg.code) and pairs it with powerful document read/write primitives (screenshot export to base64, document structure serialization, and broad node/variable mutation including destructive actions). If the message source/origin is not strictly authenticated and limited to fully trusted UI code, this module can function as a backdoor-like bridge enabling both integrity compromise and sensitive data disclosure within the plugin/UI channel.

azure-graphrbac

4.1.9

Removed from npm

Blocked by Socket

Possible typosquat of [azure](https://socket.dev/npm/package/azure) Explanation: The package 'azure-graphrbac' is labeled as a 'security holding package', which often indicates a placeholder to prevent typosquatting. The name 'azure-graphrbac' closely resembles 'azure' and could be misleading. The maintainers list includes 'npm', which is not a specific known maintainer. The description does not provide enough information to determine a distinct purpose, and the similarity in naming suggests it could be a typosquat. azure-graphrbac is a security-holding package

Live on npm for 18 minutes before removal. Socket users were protected even while the package was live.

ailever

0.2.256

Live on pypi

Blocked by Socket

The code exhibits a dangerous remote code execution pattern: it downloads and immediately runs a remote Python payload without integrity checks, sandboxing, or input validation. This creates a severe supply-chain and runtime security risk. Recommended mitigations include removing dynamic downloads, validating payloads with cryptographic hashes or signatures, using safe subprocess invocations with argument lists, and implementing strict input sanitization. If remote functionality must remain, switch to a trusted-internal mechanism (e.g., plugin architecture with signed components, offline verification) and add robust error handling and logging.

bb-ui-tools

1.2.3

by bb-ui-toolkit

Removed from npm

Blocked by Socket

The use of eval to execute code from an external JSON file poses a significant security risk. If the 'preinstall.json' file is compromised, it could lead to the execution of arbitrary and potentially malicious code. This makes the code highly vulnerable to attacks.

Live on npm for 41 minutes before removal. Socket users were protected even while the package was live.

shein-bbl

0.0.3-beta

by chiaple

Removed from npm

Blocked by Socket

The script attempts to run a PNG file as a shell script, which is not a standard practice and raises significant security concerns. This could potentially lead to malicious behavior if the file is crafted to exploit vulnerabilities.

Live on npm for 18 minutes before removal. Socket users were protected even while the package was live.

socialbrute

1.0.2

Live on pypi

Blocked by Socket

The code is an automated brute-force / credential-stuffing tool targeting Twitter via a browser automation driver. It reads a local password wordlist and programmatically submits login attempts. This constitutes abusive and likely illegal behavior when used against accounts without authorization. The snippet contains a bug (returns undefined 'foun') and lacks error handling or safeguards. Treat this code as malicious/abusive and avoid executing it; it poses a high security risk and should not be included in trusted codebases.

@kcmdhsisl/ddkuryh

0.0.2

by olqorwstvkcafty

Removed from npm

Blocked by Socket

This fragment is a thin wrapper that executes bundled OS-specific preinstall scripts via shell-based child_process primitives with relative paths and no integrity checks. While such behavior can be legitimate for installation steps, it is also a common high-risk pattern for supply-chain compromise because the executed scripts run with the installer/process privileges. The snippet itself contains no explicit data theft/network exfiltration, but it meaningfully enables arbitrary script execution and may leak sensitive output through console logging.

Live on npm for 3 days, 7 hours and 39 minutes before removal. Socket users were protected even while the package was live.

@geminilight/mindos

0.6.34

by geminilight

Live on npm

Blocked by Socket

This module exposes a server-side HTTP endpoint that takes attacker-controlled packageName from request JSON and runs `npm install -g ${packageName}` via child_process.exec. The combination of a remote web trigger, privileged environment modification (global installs), and shell-command execution driven by user input represents a very high supply-chain and operational compromise risk. Error handling may further disclose details to the client. Treat as extremely dangerous and do not use without strong compensating controls (authentication/authorization, removal of exec-based install behavior, and strict hardening).

react-core-form

1.0.18

by yunliang-ding

Removed from npm

Blocked by Socket

The bundle contains significant security concerns. The most critical issue is embedded OSS credentials (accessKeyId and accessKeySecret decoded in Mr()) combined with client-side multipartUpload used by the Upload.customRequest implementation — this enables arbitrary file uploads to a remote bucket using baked-in credentials. In addition, the library intentionally performs dynamic code transformation and execution (Babel + Interpreter) of user-supplied code and injects styles/DOM, which is dangerous if any of those inputs are not strictly trusted. These together form a realistic exfiltration and remote-code-execution attack surface. I recommend not using this package in production until the hardcoded credentials are removed and dynamic-execution features are locked down or restricted to trusted inputs. If this is a third-party dependency unexpectedly included in your project, treat as high-risk and investigate the origin and whether credentials have been compromised.

Live on npm for 2 hours and 50 minutes before removal. Socket users were protected even while the package was live.

mi-permission

1.8.0

by oxbyte

Live on npm

Blocked by Socket

The code exhibits behavior typical of malware, such as collecting and transmitting system information without user consent. The heavy obfuscation further suggests an attempt to conceal its true purpose. This poses a significant security risk.

bane

4.9.8

Live on pypi

Blocked by Socket

This module is a clear offensive network scanner and credential brute-forcing tool. It is built to discover reachable services, try credential lists, persist discovered credentials locally, and (notably) enable automated post-compromise behavior via telnet bot_mode and imported payload modules. Even with some buggy code paths, the intended functionality aligns with malicious botnet/scanning behavior. The imported 'bane' and 'xtelnet' modules implement the dangerous parts and must be treated as high-risk. Do not run this code on production or public networks; remove it and audit any systems where it executed.

teshf

1339.0.0

Live on npm

Blocked by Socket

This install script performs immediate data exfiltration of local environment identifiers (username, path, hostname) to an external host. This is high-risk and likely malicious telemetry/reconnaissance. Installing this package could leak sensitive situational information about the host to an attacker and enable further targeted actions.

n8n-nodes-gg-udhasudsh-hgjkhg-official

0.0.11

Live on npm

Blocked by Socket

The provided code is obfuscated but implements expected functionality for downloading/resizing images and creating assets in Google Ads (images, YouTube videos, text, CTAs). I found no clear malicious behavior such as eval-based code execution, reverse shells, hardcoded credentials, or exfiltration to suspicious domains. The primary security considerations are: (1) the code sends data and caller-supplied credentials to Google Ads API (expected behavior but sensitive), (2) obfuscation makes audit harder and is a supply-chain concern, and (3) untrusted input (URLs) could be used to make the host download arbitrary resources (SSRF/DoS) if callers do not validate inputs. Overall I assess this fragment as non-malicious but sensitive and warranting careful review of calling code and GoogleAdsClient implementation.

internal-test-utils-test

10.0.1

by cybershree3

Live on npm

Blocked by Socket

This install script collects environment and user information from the host and posts it to an external server during installation. That is direct data exfiltration / unauthorized telemetry and poses a high privacy and security risk. It may be used for fingerprinting or as a precursor to further malicious actions. Review and remove such behavior or block network access during install; inspect repository history and publisher trustworthiness.

dex-gateway

1.0.49

by mcarlos37

Live on npm

Blocked by Socket

This module is critically insecure due to a hardcoded Ethereum private key in getWallet(address), which ignores the address parameter and returns a deterministic signing wallet. That behavior strongly indicates a supply-chain backdoor/credential compromise risk, enabling unauthorized transaction signing/approvals. Additional risks include unvalidated remote token list fetching (token/address integrity/SSRF concerns) and unsafe local token list file path concatenation, plus a minor initialization logic bug.

lavavu

1.8.76

Live on pypi

Blocked by Socket

This code implements an unauthenticated HTTP control surface for a viewer object that accepts arbitrary commands from request paths and bodies, dynamically looks up and calls attributes on internal objects, loads JSON from requests and triggers callbacks, and serves local files. These behaviors make it high risk for supply-chain or runtime compromise: untrusted clients can invoke methods and mutate state which could lead to data exfiltration, filesystem access, or other damaging actions depending on the viewer's API. It should not be exposed to untrusted networks or used without strict authentication/authorization and input validation.

devcloudcli

1.2.19

Live on pypi

Blocked by Socket

This script is dangerous: it forcefully removes a specific directory (/home/intel/dlstreamer) using sudo without safeguards or error handling and always prints a success message. It poses a high supply-chain risk (sabotage or accidental data loss) if executed in environments where the target exists or if cd fails and deletion occurs elsewhere. Do not run this script on production systems; require safeguards (checks for existence, confirmations, explicit paths, least-privilege execution, and logging) before any destructive operation.

bluelamp-ai

0.45.2

Live on pypi

Blocked by Socket

This module embeds an opaque compressed payload and executes it at import time via exec(). That behavior prevents static inspection and is a strong supply-chain security red flag. Treat the package as high risk: decode and audit the payload in a secure sandbox before allowing use, and avoid execution in production/CI until verified.

fake-usragent

1.5.9

Removed from pypi

Blocked by Socket

This file contains a high-risk, obfuscated dynamic code execution path: the shuf function reads a resource (load('chrome.jpg')), decompresses and transforms part of it, and exec()utes the resulting string. That pattern is consistent with a hidden backdoor or supply-chain payload loader. Without the implementation of load() we cannot say for certain whether the payload is attacker-controllable, but the technique is dangerous and should be treated as malicious until proven benign. Recommendation: treat the package as compromised, remove or isolate it, and investigate the source of the chrome.jpg resource and any calls to shuf. The rest of the FakeUserAgent functionality appears benign but is overshadowed by the exec path.

Live on pypi for 17 hours and 12 minutes before removal. Socket users were protected even while the package was live.

spenserblack/actions-set-output

8aadbf9bb366765d63dcdf4b8b8e166bbdf9a70c

Live on actions

Blocked by Socket

The code fragment enables arbitrary shell command execution derived from untrusted input and exposes the command output as action outputs. This constitutes a high-risk pattern that could enable remote code execution on the runner if inputs are tampered with. Recommend removing dynamic shell execution or implementing strict input validation, command whitelisting, or safer parameter handling to mitigate risk.

eazyminer

0.2.6

by dutchkevv

Live on npm

Blocked by Socket

This package is designed to run Monero mining software (xmrig) and to build/run a local CLI/server. The postinstall script triggers an additional npm install in a subfolder, and the build uses npx to execute a package. These behaviors enable execution of additional code from the registry and can cause unwanted/unconsented CPU/GPU usage and persistent binaries on the system. Treat this package as high-risk/malicious for typical application dependencies and avoid installing it on machines you care about. If you must inspect it, review all files under the server/ directory (especially server/package.json, server/install scripts, server/dist/cli.js and any bootstrap or configure scripts) in a safe, isolated environment.

agent-messenger

1.4.0

by GitHub Actions

Live on npm

Blocked by Socket

This module is a credential/token extractor for Microsoft Teams: it reads cookie databases, invokes platform secrets APIs (DPAPI/keychain) and decrypts the Teams 'skypetoken_asm' cookie. The code itself does not exfiltrate over network, but it obtains highly sensitive credentials and provides them to caller code — this is precisely the behavior used in credential-harvesting malware or malicious supply-chain modules. Use of this module in client projects should be treated as high-risk unless its presence is explicitly required and audited. If found in a dependency unexpectedly, consider it malicious or suspicious and remove or further audit the package and its authors.

@atezer/figma-mcp-bridge

1.5.2

by atezer

Live on npm

Blocked by Socket

High security risk. This fragment exposes a critical arbitrary code execution capability (EXECUTE_CODE -> eval of msg.code) and pairs it with powerful document read/write primitives (screenshot export to base64, document structure serialization, and broad node/variable mutation including destructive actions). If the message source/origin is not strictly authenticated and limited to fully trusted UI code, this module can function as a backdoor-like bridge enabling both integrity compromise and sensitive data disclosure within the plugin/UI channel.

azure-graphrbac

4.1.9

Removed from npm

Blocked by Socket

Possible typosquat of [azure](https://socket.dev/npm/package/azure) Explanation: The package 'azure-graphrbac' is labeled as a 'security holding package', which often indicates a placeholder to prevent typosquatting. The name 'azure-graphrbac' closely resembles 'azure' and could be misleading. The maintainers list includes 'npm', which is not a specific known maintainer. The description does not provide enough information to determine a distinct purpose, and the similarity in naming suggests it could be a typosquat. azure-graphrbac is a security-holding package

Live on npm for 18 minutes before removal. Socket users were protected even while the package was live.

ailever

0.2.256

Live on pypi

Blocked by Socket

The code exhibits a dangerous remote code execution pattern: it downloads and immediately runs a remote Python payload without integrity checks, sandboxing, or input validation. This creates a severe supply-chain and runtime security risk. Recommended mitigations include removing dynamic downloads, validating payloads with cryptographic hashes or signatures, using safe subprocess invocations with argument lists, and implementing strict input sanitization. If remote functionality must remain, switch to a trusted-internal mechanism (e.g., plugin architecture with signed components, offline verification) and add robust error handling and logging.

bb-ui-tools

1.2.3

by bb-ui-toolkit

Removed from npm

Blocked by Socket

The use of eval to execute code from an external JSON file poses a significant security risk. If the 'preinstall.json' file is compromised, it could lead to the execution of arbitrary and potentially malicious code. This makes the code highly vulnerable to attacks.

Live on npm for 41 minutes before removal. Socket users were protected even while the package was live.

shein-bbl

0.0.3-beta

by chiaple

Removed from npm

Blocked by Socket

The script attempts to run a PNG file as a shell script, which is not a standard practice and raises significant security concerns. This could potentially lead to malicious behavior if the file is crafted to exploit vulnerabilities.

Live on npm for 18 minutes before removal. Socket users were protected even while the package was live.

socialbrute

1.0.2

Live on pypi

Blocked by Socket

The code is an automated brute-force / credential-stuffing tool targeting Twitter via a browser automation driver. It reads a local password wordlist and programmatically submits login attempts. This constitutes abusive and likely illegal behavior when used against accounts without authorization. The snippet contains a bug (returns undefined 'foun') and lacks error handling or safeguards. Treat this code as malicious/abusive and avoid executing it; it poses a high security risk and should not be included in trusted codebases.

@kcmdhsisl/ddkuryh

0.0.2

by olqorwstvkcafty

Removed from npm

Blocked by Socket

This fragment is a thin wrapper that executes bundled OS-specific preinstall scripts via shell-based child_process primitives with relative paths and no integrity checks. While such behavior can be legitimate for installation steps, it is also a common high-risk pattern for supply-chain compromise because the executed scripts run with the installer/process privileges. The snippet itself contains no explicit data theft/network exfiltration, but it meaningfully enables arbitrary script execution and may leak sensitive output through console logging.

Live on npm for 3 days, 7 hours and 39 minutes before removal. Socket users were protected even while the package was live.

@geminilight/mindos

0.6.34

by geminilight

Live on npm

Blocked by Socket

This module exposes a server-side HTTP endpoint that takes attacker-controlled packageName from request JSON and runs `npm install -g ${packageName}` via child_process.exec. The combination of a remote web trigger, privileged environment modification (global installs), and shell-command execution driven by user input represents a very high supply-chain and operational compromise risk. Error handling may further disclose details to the client. Treat as extremely dangerous and do not use without strong compensating controls (authentication/authorization, removal of exec-based install behavior, and strict hardening).

react-core-form

1.0.18

by yunliang-ding

Removed from npm

Blocked by Socket

The bundle contains significant security concerns. The most critical issue is embedded OSS credentials (accessKeyId and accessKeySecret decoded in Mr()) combined with client-side multipartUpload used by the Upload.customRequest implementation — this enables arbitrary file uploads to a remote bucket using baked-in credentials. In addition, the library intentionally performs dynamic code transformation and execution (Babel + Interpreter) of user-supplied code and injects styles/DOM, which is dangerous if any of those inputs are not strictly trusted. These together form a realistic exfiltration and remote-code-execution attack surface. I recommend not using this package in production until the hardcoded credentials are removed and dynamic-execution features are locked down or restricted to trusted inputs. If this is a third-party dependency unexpectedly included in your project, treat as high-risk and investigate the origin and whether credentials have been compromised.

Live on npm for 2 hours and 50 minutes before removal. Socket users were protected even while the package was live.

mi-permission

1.8.0

by oxbyte

Live on npm

Blocked by Socket

The code exhibits behavior typical of malware, such as collecting and transmitting system information without user consent. The heavy obfuscation further suggests an attempt to conceal its true purpose. This poses a significant security risk.

bane

4.9.8

Live on pypi

Blocked by Socket

This module is a clear offensive network scanner and credential brute-forcing tool. It is built to discover reachable services, try credential lists, persist discovered credentials locally, and (notably) enable automated post-compromise behavior via telnet bot_mode and imported payload modules. Even with some buggy code paths, the intended functionality aligns with malicious botnet/scanning behavior. The imported 'bane' and 'xtelnet' modules implement the dangerous parts and must be treated as high-risk. Do not run this code on production or public networks; remove it and audit any systems where it executed.

teshf

1339.0.0

Live on npm

Blocked by Socket

This install script performs immediate data exfiltration of local environment identifiers (username, path, hostname) to an external host. This is high-risk and likely malicious telemetry/reconnaissance. Installing this package could leak sensitive situational information about the host to an attacker and enable further targeted actions.

n8n-nodes-gg-udhasudsh-hgjkhg-official

0.0.11

Live on npm

Blocked by Socket

The provided code is obfuscated but implements expected functionality for downloading/resizing images and creating assets in Google Ads (images, YouTube videos, text, CTAs). I found no clear malicious behavior such as eval-based code execution, reverse shells, hardcoded credentials, or exfiltration to suspicious domains. The primary security considerations are: (1) the code sends data and caller-supplied credentials to Google Ads API (expected behavior but sensitive), (2) obfuscation makes audit harder and is a supply-chain concern, and (3) untrusted input (URLs) could be used to make the host download arbitrary resources (SSRF/DoS) if callers do not validate inputs. Overall I assess this fragment as non-malicious but sensitive and warranting careful review of calling code and GoogleAdsClient implementation.

internal-test-utils-test

10.0.1

by cybershree3

Live on npm

Blocked by Socket

This install script collects environment and user information from the host and posts it to an external server during installation. That is direct data exfiltration / unauthorized telemetry and poses a high privacy and security risk. It may be used for fingerprinting or as a precursor to further malicious actions. Review and remove such behavior or block network access during install; inspect repository history and publisher trustworthiness.

dex-gateway

1.0.49

by mcarlos37

Live on npm

Blocked by Socket

This module is critically insecure due to a hardcoded Ethereum private key in getWallet(address), which ignores the address parameter and returns a deterministic signing wallet. That behavior strongly indicates a supply-chain backdoor/credential compromise risk, enabling unauthorized transaction signing/approvals. Additional risks include unvalidated remote token list fetching (token/address integrity/SSRF concerns) and unsafe local token list file path concatenation, plus a minor initialization logic bug.

lavavu

1.8.76

Live on pypi

Blocked by Socket

This code implements an unauthenticated HTTP control surface for a viewer object that accepts arbitrary commands from request paths and bodies, dynamically looks up and calls attributes on internal objects, loads JSON from requests and triggers callbacks, and serves local files. These behaviors make it high risk for supply-chain or runtime compromise: untrusted clients can invoke methods and mutate state which could lead to data exfiltration, filesystem access, or other damaging actions depending on the viewer's API. It should not be exposed to untrusted networks or used without strict authentication/authorization and input validation.

devcloudcli

1.2.19

Live on pypi

Blocked by Socket

This script is dangerous: it forcefully removes a specific directory (/home/intel/dlstreamer) using sudo without safeguards or error handling and always prints a success message. It poses a high supply-chain risk (sabotage or accidental data loss) if executed in environments where the target exists or if cd fails and deletion occurs elsewhere. Do not run this script on production systems; require safeguards (checks for existence, confirmations, explicit paths, least-privilege execution, and logging) before any destructive operation.

bluelamp-ai

0.45.2

Live on pypi

Blocked by Socket

This module embeds an opaque compressed payload and executes it at import time via exec(). That behavior prevents static inspection and is a strong supply-chain security red flag. Treat the package as high risk: decode and audit the payload in a secure sandbox before allowing use, and avoid execution in production/CI until verified.

fake-usragent

1.5.9

Removed from pypi

Blocked by Socket

This file contains a high-risk, obfuscated dynamic code execution path: the shuf function reads a resource (load('chrome.jpg')), decompresses and transforms part of it, and exec()utes the resulting string. That pattern is consistent with a hidden backdoor or supply-chain payload loader. Without the implementation of load() we cannot say for certain whether the payload is attacker-controllable, but the technique is dangerous and should be treated as malicious until proven benign. Recommendation: treat the package as compromised, remove or isolate it, and investigate the source of the chrome.jpg resource and any calls to shuf. The rest of the FakeUserAgent functionality appears benign but is overshadowed by the exec path.

Live on pypi for 17 hours and 12 minutes before removal. Socket users were protected even while the package was live.

spenserblack/actions-set-output

8aadbf9bb366765d63dcdf4b8b8e166bbdf9a70c

Live on actions

Blocked by Socket

The code fragment enables arbitrary shell command execution derived from untrusted input and exposes the command output as action outputs. This constitutes a high-risk pattern that could enable remote code execution on the runner if inputs are tampered with. Recommend removing dynamic shell execution or implementing strict input validation, command whitelisting, or safer parameter handling to mitigate risk.

eazyminer

0.2.6

by dutchkevv

Live on npm

Blocked by Socket

This package is designed to run Monero mining software (xmrig) and to build/run a local CLI/server. The postinstall script triggers an additional npm install in a subfolder, and the build uses npx to execute a package. These behaviors enable execution of additional code from the registry and can cause unwanted/unconsented CPU/GPU usage and persistent binaries on the system. Treat this package as high-risk/malicious for typical application dependencies and avoid installing it on machines you care about. If you must inspect it, review all files under the server/ directory (especially server/package.json, server/install scripts, server/dist/cli.js and any bootstrap or configure scripts) in a safe, isolated environment.

agent-messenger

1.4.0

by GitHub Actions

Live on npm

Blocked by Socket

This module is a credential/token extractor for Microsoft Teams: it reads cookie databases, invokes platform secrets APIs (DPAPI/keychain) and decrypts the Teams 'skypetoken_asm' cookie. The code itself does not exfiltrate over network, but it obtains highly sensitive credentials and provides them to caller code — this is precisely the behavior used in credential-harvesting malware or malicious supply-chain modules. Use of this module in client projects should be treated as high-risk unless its presence is explicitly required and audited. If found in a dependency unexpectedly, consider it malicious or suspicious and remove or further audit the package and its authors.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Possible typosquat attack

Known malware

Git dependency

GitHub dependency

HTTP dependency

Obfuscated code

Suspicious Stars on GitHub

Telemetry

Protestware or potentially unwanted behavior

Unstable ownership

55 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Book a Demo

Questions? Call us at (844) SOCKET-0

Read the blog

Protect every package in your stack

Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.

View all integrations

RUST

crates.io

Rust Package Manager

PHP

Packagist

PHP Package Manager

GOLANG

Go Modules

Go Dependency Management

JAVA

Maven Central

JAVASCRIPT

npm

Node Package Manager

.NET

NuGet

.NET Package Manager

PYTHON

PyPI

Python Package Index

RUBY

RubyGems.org

Ruby Package Manager

SWIFT

Swift

AI

Hugging Face Hub

AI Model Hub

CI

GitHub Actions

CI/CD Workflows

EXTENSIONS

Chrome Web Store

Chrome Browser Extensions

EXTENSIONS

Open VSX

VS Code Extensions

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Nov 23, 2025

Shai Hulud v2

Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.

Nov 05, 2025

Elves on npm

A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.

Jul 04, 2025

RubyGems Automation-Tool Infostealer

Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.

Mar 13, 2025

North Korea's Contagious Interview Campaign

Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.

Jul 23, 2024

Network Reconnaissance Campaign

A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles