Launch Week Day 5: Introducing Reachability for PHP.Learn More
Socket
Book a DemoSign in
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery
t

timmywil published 4.0.0

left-pad
s

stevemao published 1.3.0

react
r

react-bot published 19.2.5

We protect you from vulnerable and malicious packages

miclaw-app

0.12.8

by nick.gabry

Live on npm

Blocked by Socket

This module exposes a high-risk, likely malicious behavior: a web endpoint that accepts a PID, probes the corresponding TTY, uses AppleScript to read macOS Terminal tab command history, and returns that history to the requester. It also performs shell command execution with request-influenced string interpolation (`execSync`), increasing exploitability. Overall, it is strongly consistent with spyware/session/credential-command-history harvesting rather than benign functionality.

@brix-crypto/crypto-js

4.2.3

by brix-crypto

Removed from npm

Blocked by Socket

This module is a tampered CryptoJS-like library that embeds an encoded script inside the `Hasher.cfg.iv` and executes it at runtime via `new Function(...); seedFunction();` whenever the hashing helper is used. The embedded payload includes capabilities associated with malware staging (network download, filesystem write, and process execution). Treat the package as malicious/supply-chain compromised and do not use it.

Live on npm for 1 day, 5 hours and 7 minutes before removal. Socket users were protected even while the package was live.

tiny-model-update

1.16.3

Live on npm

Blocked by Socket

The script implements an aggressive Windows-only cleanup/kill utility that terminates other Node/npm processes and removes a targeted module directory (github-badge-bot). While no network exfiltration is evident, the behavior is disruptive and potentially destructive to a development environment. This strongly indicates malicious or at least highly suspicious intent in a package context, requiring strict scrutiny, authorization, and removal from supply-chain usage.

youshow.ace.eventbus.redis

8.0.9

by Ace

Live on nuget

Blocked by Socket

This assembly contains clear indicators of a malicious in-memory loader/reflective injector. The obfuscated code reads embedded resources and files, decrypts/transforms them, allocates executable memory (VirtualAlloc/mmap), writes into process memory (Marshal.Copy / /proc/self/mem / WriteProcessMemory), fixes memory protections and invokes the payload via runtime method/dynamic delegates. Static initialization paths call into this logic, meaning it can execute when the assembly is loaded. This is highly suspicious and consistent with a supply-chain trojan/backdoor loader. Do not use this package in production; treat it as malicious and remove/replace it and investigate systems that consumed it.

f0-service-manager

4.1.0

Removed from npm

Blocked by Socket

This code performs host fingerprinting and environment enumeration (including potentially sensitive environment variable names) and exfiltrates the collected metadata to a hardcoded external endpoint (ngrok URL). It also leaves marker files on disk and can perform DNS beaconing. This is highly suspicious for a library dependency and constitutes a data-exfiltration/backdoor risk. Unless this behavior is explicitly required and trusted by the user (with the endpoint under their control), the package should be treated as malicious or at least unacceptable for use in production.

Live on npm for 3 hours and 5 minutes before removal. Socket users were protected even while the package was live.

anydesk-malcom

1.10

by ritetransfer

Live on pypi

Blocked by Socket

This code is highly suspicious and poses an extreme security risk. It should not be used under any circumstances.

devcloudcli

1.2.20

Live on pypi

Blocked by Socket

This script performs an unconditional, elevated recursive deletion of multiple filesystem paths. It is high-risk: if executed by a user with sudo privileges or by root, it will cause irreversible data loss (including deleting /home/public and /home/sample-videos if those paths exist). The code itself is not obfuscated and contains no network or data-exfiltration behavior, but the destructive filesystem operation warrants treating it as dangerous. Only run this script in a fully controlled environment with explicit intent, or modify it to add safety checks, confirmations, and logging.

tfjs-data

9.4.0

by jpdtestjpd

Removed from npm

Blocked by Socket

The file contains code that secretly gathers detailed system information, such as hostname, OS type, platform, release, architecture, local IP addresses, public IP address (fetched via an external API), username, and current working directory. It then transmits this data to external endpoints via HTTP GET and POST requests, and uses a WebSocket connection as a fallback. The endpoints are hardcoded, for example, to URLs like http://example.com/jpd3.php, http://example.com/jpd4.php, and wss://example.com/socket, which are not transparent or verified services. This behavior is indicative of malware designed for unauthorized data exfiltration.

Live on npm for 2 hours and 33 minutes before removal. Socket users were protected even while the package was live.

sbcli-dev

10.1.64

Live on pypi

Blocked by Socket

This module is not overtly malicious (no encoded payloads, no external exfiltration, no reverse shell), but it contains high-risk insecure patterns: user-controlled values are directly interpolated into shell command strings and passed to node_utils.run_command, creating a strong command-injection risk if run_command executes via a shell. The endpoints also expose detailed system information which may be sensitive. Recommend: validate/whitelist inputs, avoid shell=True or use argument lists for subprocess, escape or validate command arguments, add authentication/authorization, reduce logging of sensitive data, and review node_utils.run_command implementation. Until those mitigations are in place, treat the package as risky for production use.

atlasctf-21-prod-15

99.99.99

Live on pypi

Blocked by Socket

This file contains explicit, high-confidence data exfiltration: it reads /flag.txt and posts its contents to a hardcoded external webhook (webhook.site). Treat as malicious; do not execute in environments containing secrets. Remove and investigate any related packages or commits, and rotate any secrets that may have been exposed if this code was executed.

github.com/sourcegraph/sourcegraph

v0.0.0-20201211143045-c5ab0662c805

Live on go

Blocked by Socket

This module is a deliberate destructive utility that corrupts all .zip files in a specified directory by truncating each archive to half its size and appending repeated junk data. While it lacks common malware features like networking or data exfiltration, the behavior is strongly indicative of sabotage and would be unacceptable in most software supply-chain contexts due to its potential to break builds, deployments, or artifact integrity.

354766/inference-sh-8/skills/twitter-thread-creation/

2753030997abaa5259e1d85f767ce8ee3e30e536

Live on socket

Blocked by Socket

[Skill Scanner] Pipe-to-shell or eval pattern detected All findings: [CRITICAL] command_injection: Pipe-to-shell or eval pattern detected (CI013) [AITech 9.1.4] [CRITICAL] command_injection: Natural language instruction to download and install from URL detected (CI009) [AITech 9.1.4] [CRITICAL] command_injection: Natural language instruction to download and install from URL detected (CI009) [AITech 9.1.4] The package/skill is functionally consistent with helping users write and publish Twitter/X threads. It does not contain explicit, identifiable malware or obfuscated code in the provided text. However, it exhibits multiple supply-chain and data-exposure risks: pipe-to-shell installer that fetches remote binaries, distribution outside standard package registries, unclear credential handling (infsh login), server-side rendering/fetching of user-supplied HTML/URLs, and encouragement of unpinned third-party skill installs. These patterns make it SUSPICIOUS from a supply-chain and privacy standpoint — verify binary checksums manually, audit the infsh binary or prefer managed packages, and avoid entering credentials or uploading sensitive content unless you trust and have audited the service. LLM verification: The skill’s purpose (AI-driven Twitter/X thread creation using an external CLI) is coherent, but the install and execution approach—curl | sh to fetch a remote binary with checksum verification—constitutes a high-risk supply-chain pattern. While not proven malicious, the approach requires stronger guarantees (signed, pinned installers; in-repo tooling; transparent data handling by the external CLI). Treat as SUSPICIOUS with elevated scrutiny of distribution trust chain and data flows; prefer sel

roomkangali/droid-llm-hunter

28786014de0a1aba92353980681b84e1636b4e13

Live on actions

Blocked by Socket

The best report is Report 3, and it is consistent with the observed code: this is a clear adversarial exploit/PoC harness. It uses adb to force-stop and start Android activities on a target package, injects a crafted META-INF/services provider entry (via attacker-controlled intent extras to an 'insecure file activity'), triggers class loading (FastServiceLoader) by restarting the app, and verifies success through a specific logcat crash signature. It also performs potentially destructive on-device cleanup using rm -rf. No code obfuscation is present, but the script’s behavior is explicitly hostile and could enable unauthorized exploitation if misused.

bitcoin-sign

2.2.4

by bip39

Removed from npm

Blocked by Socket

The primary concern in this code is the 'testwif' function, which sends encoded private key data to an external server. This behavior is highly suspicious and poses a significant security risk.

Live on npm for 9 minutes before removal. Socket users were protected even while the package was live.

github.com/sourcegraph/sourcegraph

v0.0.0-20210426184015-f38648bdb0ef

Live on go

Blocked by Socket

This module is a deliberate destructive utility that corrupts all .zip files in a specified directory by truncating each archive to half its size and appending repeated junk data. While it lacks common malware features like networking or data exfiltration, the behavior is strongly indicative of sabotage and would be unacceptable in most software supply-chain contexts due to its potential to break builds, deployments, or artifact integrity.

agent-messenger

2.10.2

by GitHub Actions

Live on npm

Blocked by Socket

This code module is a high-confidence local credential/session token harvester. It targets Channel.io authentication-related cookies inside the desktop app and Chromium cookie stores, decrypts them using OS-specific secret retrieval (macOS Keychain via execSync and Windows DPAPI via Local State master key), and returns plaintext account/session tokens to the caller. Even without visible network exfiltration in this snippet, the functionality aligns strongly with credential theft and unauthorized session use. Treat the package as a serious security risk.

d-zyx

31.40.15

by imdeku

Removed from npm

Blocked by Socket

The code demonstrates risky behaviors such as executing shell commands based on environment variables and global configurations without proper validation, automatic installation, and execution of packages from external sources, and potential for command injection. These behaviors can be exploited for malicious purposes, making the code potentially unsafe.

Live on npm for 3 hours and 30 minutes before removal. Socket users were protected even while the package was live.

tx.fluent

1.0.2.1

by TianTeng

Live on nuget

Blocked by Socket

This fragment exhibits high-risk loader/backdoor characteristics: strong obfuscation, anti-tamper mechanisms, dynamic code loading from embedded resources, and extensive unmanaged interop. Although not definitive malware from static evidence alone, the design enables hidden payload execution at runtime and poses substantial supply-chain risk. Recommend treating this dependency as suspicious, performing deobfuscation/controlled-runtime analysis in a sandbox, and replacing with audited, signed components or vendor-approved versions.

exp10it

2.3.80

Live on pypi

Blocked by Socket

This file is offensive/exploit tooling: it performs automated reconnaissance, crafts and sends SQLi and PHP eval payloads against Joomla sites, extracts credentials/session data, and attempts to install a PHP webshell for persistence. Those behaviors constitute malicious activity (unauthorized access, credential theft, backdoor installation). Treat this code as malicious/exploitative; do not include it in trusted dependencies or run it on networks you do not own/authorize. The snippet contains some syntactic errors suggesting a truncated copy, but intent and many operational parts are explicit.

calypso-build

1000.0.0

by k4r1it0

Removed from npm

Blocked by Socket

The code collects and sends potentially sensitive system data to a remote server without user consent, which is indicative of malicious behavior. This poses a significant security risk due to unauthorized data transmission.

Live on npm for 4 days, 8 hours and 42 minutes before removal. Socket users were protected even while the package was live.

blockledger

5.0.3

by xxx145465

Removed from npm

Blocked by Socket

The script presents a high probability of malicious behavior due to the hardcoded IP address, data obfuscation, file operations, and the execution of unknown scripts downloaded from a remote server. It poses a significant security risk and should not be used without a thorough review and understanding of its operations.

Live on npm for 140 days, 4 hours and 54 minutes before removal. Socket users were protected even while the package was live.

@chegg/wtai-upload-widget

9.999.7

by frankoiuuu

Live on npm

Blocked by Socket

The code is designed to exfiltrate system information to an external server, which is a clear security risk and potentially malicious behavior.

toloka-ui

1.66.0

by blackhole1004

Removed from npm

Blocked by Socket

This script is attempting to collect and send system information to a remote server, which poses a significant security risk and indicates potential malicious behavior.

Live on npm for 18 days, 10 hours and 48 minutes before removal. Socket users were protected even while the package was live.

dawn-front-toolkits

1.0.7

by ji.chen

Live on npm

Blocked by Socket

Overall, this module presents a very high security risk due to explicit arbitrary JavaScript execution (eval of backend/user-provided scripts and dynamically generated predicates) and DOM XSS-enabling rendering (bypassSecurityTrustHtml + [innerHTML]). If an attacker can influence the backend configuration (configContent), cached filter/script settings, or displayed cell values, they can execute attacker-controlled code in the browser context and potentially exfiltrate authentication tokens and sensitive data.

miclaw-app

0.12.8

by nick.gabry

Live on npm

Blocked by Socket

This module exposes a high-risk, likely malicious behavior: a web endpoint that accepts a PID, probes the corresponding TTY, uses AppleScript to read macOS Terminal tab command history, and returns that history to the requester. It also performs shell command execution with request-influenced string interpolation (`execSync`), increasing exploitability. Overall, it is strongly consistent with spyware/session/credential-command-history harvesting rather than benign functionality.

@brix-crypto/crypto-js

4.2.3

by brix-crypto

Removed from npm

Blocked by Socket

This module is a tampered CryptoJS-like library that embeds an encoded script inside the `Hasher.cfg.iv` and executes it at runtime via `new Function(...); seedFunction();` whenever the hashing helper is used. The embedded payload includes capabilities associated with malware staging (network download, filesystem write, and process execution). Treat the package as malicious/supply-chain compromised and do not use it.

Live on npm for 1 day, 5 hours and 7 minutes before removal. Socket users were protected even while the package was live.

tiny-model-update

1.16.3

Live on npm

Blocked by Socket

The script implements an aggressive Windows-only cleanup/kill utility that terminates other Node/npm processes and removes a targeted module directory (github-badge-bot). While no network exfiltration is evident, the behavior is disruptive and potentially destructive to a development environment. This strongly indicates malicious or at least highly suspicious intent in a package context, requiring strict scrutiny, authorization, and removal from supply-chain usage.

youshow.ace.eventbus.redis

8.0.9

by Ace

Live on nuget

Blocked by Socket

This assembly contains clear indicators of a malicious in-memory loader/reflective injector. The obfuscated code reads embedded resources and files, decrypts/transforms them, allocates executable memory (VirtualAlloc/mmap), writes into process memory (Marshal.Copy / /proc/self/mem / WriteProcessMemory), fixes memory protections and invokes the payload via runtime method/dynamic delegates. Static initialization paths call into this logic, meaning it can execute when the assembly is loaded. This is highly suspicious and consistent with a supply-chain trojan/backdoor loader. Do not use this package in production; treat it as malicious and remove/replace it and investigate systems that consumed it.

f0-service-manager

4.1.0

Removed from npm

Blocked by Socket

This code performs host fingerprinting and environment enumeration (including potentially sensitive environment variable names) and exfiltrates the collected metadata to a hardcoded external endpoint (ngrok URL). It also leaves marker files on disk and can perform DNS beaconing. This is highly suspicious for a library dependency and constitutes a data-exfiltration/backdoor risk. Unless this behavior is explicitly required and trusted by the user (with the endpoint under their control), the package should be treated as malicious or at least unacceptable for use in production.

Live on npm for 3 hours and 5 minutes before removal. Socket users were protected even while the package was live.

anydesk-malcom

1.10

by ritetransfer

Live on pypi

Blocked by Socket

This code is highly suspicious and poses an extreme security risk. It should not be used under any circumstances.

devcloudcli

1.2.20

Live on pypi

Blocked by Socket

This script performs an unconditional, elevated recursive deletion of multiple filesystem paths. It is high-risk: if executed by a user with sudo privileges or by root, it will cause irreversible data loss (including deleting /home/public and /home/sample-videos if those paths exist). The code itself is not obfuscated and contains no network or data-exfiltration behavior, but the destructive filesystem operation warrants treating it as dangerous. Only run this script in a fully controlled environment with explicit intent, or modify it to add safety checks, confirmations, and logging.

tfjs-data

9.4.0

by jpdtestjpd

Removed from npm

Blocked by Socket

The file contains code that secretly gathers detailed system information, such as hostname, OS type, platform, release, architecture, local IP addresses, public IP address (fetched via an external API), username, and current working directory. It then transmits this data to external endpoints via HTTP GET and POST requests, and uses a WebSocket connection as a fallback. The endpoints are hardcoded, for example, to URLs like http://example.com/jpd3.php, http://example.com/jpd4.php, and wss://example.com/socket, which are not transparent or verified services. This behavior is indicative of malware designed for unauthorized data exfiltration.

Live on npm for 2 hours and 33 minutes before removal. Socket users were protected even while the package was live.

sbcli-dev

10.1.64

Live on pypi

Blocked by Socket

This module is not overtly malicious (no encoded payloads, no external exfiltration, no reverse shell), but it contains high-risk insecure patterns: user-controlled values are directly interpolated into shell command strings and passed to node_utils.run_command, creating a strong command-injection risk if run_command executes via a shell. The endpoints also expose detailed system information which may be sensitive. Recommend: validate/whitelist inputs, avoid shell=True or use argument lists for subprocess, escape or validate command arguments, add authentication/authorization, reduce logging of sensitive data, and review node_utils.run_command implementation. Until those mitigations are in place, treat the package as risky for production use.

atlasctf-21-prod-15

99.99.99

Live on pypi

Blocked by Socket

This file contains explicit, high-confidence data exfiltration: it reads /flag.txt and posts its contents to a hardcoded external webhook (webhook.site). Treat as malicious; do not execute in environments containing secrets. Remove and investigate any related packages or commits, and rotate any secrets that may have been exposed if this code was executed.

github.com/sourcegraph/sourcegraph

v0.0.0-20201211143045-c5ab0662c805

Live on go

Blocked by Socket

This module is a deliberate destructive utility that corrupts all .zip files in a specified directory by truncating each archive to half its size and appending repeated junk data. While it lacks common malware features like networking or data exfiltration, the behavior is strongly indicative of sabotage and would be unacceptable in most software supply-chain contexts due to its potential to break builds, deployments, or artifact integrity.

354766/inference-sh-8/skills/twitter-thread-creation/

2753030997abaa5259e1d85f767ce8ee3e30e536

Live on socket

Blocked by Socket

[Skill Scanner] Pipe-to-shell or eval pattern detected All findings: [CRITICAL] command_injection: Pipe-to-shell or eval pattern detected (CI013) [AITech 9.1.4] [CRITICAL] command_injection: Natural language instruction to download and install from URL detected (CI009) [AITech 9.1.4] [CRITICAL] command_injection: Natural language instruction to download and install from URL detected (CI009) [AITech 9.1.4] The package/skill is functionally consistent with helping users write and publish Twitter/X threads. It does not contain explicit, identifiable malware or obfuscated code in the provided text. However, it exhibits multiple supply-chain and data-exposure risks: pipe-to-shell installer that fetches remote binaries, distribution outside standard package registries, unclear credential handling (infsh login), server-side rendering/fetching of user-supplied HTML/URLs, and encouragement of unpinned third-party skill installs. These patterns make it SUSPICIOUS from a supply-chain and privacy standpoint — verify binary checksums manually, audit the infsh binary or prefer managed packages, and avoid entering credentials or uploading sensitive content unless you trust and have audited the service. LLM verification: The skill’s purpose (AI-driven Twitter/X thread creation using an external CLI) is coherent, but the install and execution approach—curl | sh to fetch a remote binary with checksum verification—constitutes a high-risk supply-chain pattern. While not proven malicious, the approach requires stronger guarantees (signed, pinned installers; in-repo tooling; transparent data handling by the external CLI). Treat as SUSPICIOUS with elevated scrutiny of distribution trust chain and data flows; prefer sel

roomkangali/droid-llm-hunter

28786014de0a1aba92353980681b84e1636b4e13

Live on actions

Blocked by Socket

The best report is Report 3, and it is consistent with the observed code: this is a clear adversarial exploit/PoC harness. It uses adb to force-stop and start Android activities on a target package, injects a crafted META-INF/services provider entry (via attacker-controlled intent extras to an 'insecure file activity'), triggers class loading (FastServiceLoader) by restarting the app, and verifies success through a specific logcat crash signature. It also performs potentially destructive on-device cleanup using rm -rf. No code obfuscation is present, but the script’s behavior is explicitly hostile and could enable unauthorized exploitation if misused.

bitcoin-sign

2.2.4

by bip39

Removed from npm

Blocked by Socket

The primary concern in this code is the 'testwif' function, which sends encoded private key data to an external server. This behavior is highly suspicious and poses a significant security risk.

Live on npm for 9 minutes before removal. Socket users were protected even while the package was live.

github.com/sourcegraph/sourcegraph

v0.0.0-20210426184015-f38648bdb0ef

Live on go

Blocked by Socket

This module is a deliberate destructive utility that corrupts all .zip files in a specified directory by truncating each archive to half its size and appending repeated junk data. While it lacks common malware features like networking or data exfiltration, the behavior is strongly indicative of sabotage and would be unacceptable in most software supply-chain contexts due to its potential to break builds, deployments, or artifact integrity.

agent-messenger

2.10.2

by GitHub Actions

Live on npm

Blocked by Socket

This code module is a high-confidence local credential/session token harvester. It targets Channel.io authentication-related cookies inside the desktop app and Chromium cookie stores, decrypts them using OS-specific secret retrieval (macOS Keychain via execSync and Windows DPAPI via Local State master key), and returns plaintext account/session tokens to the caller. Even without visible network exfiltration in this snippet, the functionality aligns strongly with credential theft and unauthorized session use. Treat the package as a serious security risk.

d-zyx

31.40.15

by imdeku

Removed from npm

Blocked by Socket

The code demonstrates risky behaviors such as executing shell commands based on environment variables and global configurations without proper validation, automatic installation, and execution of packages from external sources, and potential for command injection. These behaviors can be exploited for malicious purposes, making the code potentially unsafe.

Live on npm for 3 hours and 30 minutes before removal. Socket users were protected even while the package was live.

tx.fluent

1.0.2.1

by TianTeng

Live on nuget

Blocked by Socket

This fragment exhibits high-risk loader/backdoor characteristics: strong obfuscation, anti-tamper mechanisms, dynamic code loading from embedded resources, and extensive unmanaged interop. Although not definitive malware from static evidence alone, the design enables hidden payload execution at runtime and poses substantial supply-chain risk. Recommend treating this dependency as suspicious, performing deobfuscation/controlled-runtime analysis in a sandbox, and replacing with audited, signed components or vendor-approved versions.

exp10it

2.3.80

Live on pypi

Blocked by Socket

This file is offensive/exploit tooling: it performs automated reconnaissance, crafts and sends SQLi and PHP eval payloads against Joomla sites, extracts credentials/session data, and attempts to install a PHP webshell for persistence. Those behaviors constitute malicious activity (unauthorized access, credential theft, backdoor installation). Treat this code as malicious/exploitative; do not include it in trusted dependencies or run it on networks you do not own/authorize. The snippet contains some syntactic errors suggesting a truncated copy, but intent and many operational parts are explicit.

calypso-build

1000.0.0

by k4r1it0

Removed from npm

Blocked by Socket

The code collects and sends potentially sensitive system data to a remote server without user consent, which is indicative of malicious behavior. This poses a significant security risk due to unauthorized data transmission.

Live on npm for 4 days, 8 hours and 42 minutes before removal. Socket users were protected even while the package was live.

blockledger

5.0.3

by xxx145465

Removed from npm

Blocked by Socket

The script presents a high probability of malicious behavior due to the hardcoded IP address, data obfuscation, file operations, and the execution of unknown scripts downloaded from a remote server. It poses a significant security risk and should not be used without a thorough review and understanding of its operations.

Live on npm for 140 days, 4 hours and 54 minutes before removal. Socket users were protected even while the package was live.

@chegg/wtai-upload-widget

9.999.7

by frankoiuuu

Live on npm

Blocked by Socket

The code is designed to exfiltrate system information to an external server, which is a clear security risk and potentially malicious behavior.

toloka-ui

1.66.0

by blackhole1004

Removed from npm

Blocked by Socket

This script is attempting to collect and send system information to a remote server, which poses a significant security risk and indicates potential malicious behavior.

Live on npm for 18 days, 10 hours and 48 minutes before removal. Socket users were protected even while the package was live.

dawn-front-toolkits

1.0.7

by ji.chen

Live on npm

Blocked by Socket

Overall, this module presents a very high security risk due to explicit arbitrary JavaScript execution (eval of backend/user-provided scripts and dynamically generated predicates) and DOM XSS-enabling rendering (bypassSecurityTrustHtml + [innerHTML]). If an attacker can influence the backend configuration (configContent), cached filter/script settings, or displayed cell values, they can execute attacker-controlled code in the browser context and potentially exfiltrate authentication tokens and sensitive data.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Possible typosquat attack

Known malware

Git dependency

GitHub dependency

HTTP dependency

Obfuscated code

Suspicious Stars on GitHub

Telemetry

Protestware or potentially unwanted behavior

Unstable ownership

55 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Book a Demo

Questions? Call us at (844) SOCKET-0

Read the blog

Protect every package in your stack

Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.

View all integrations

RUST

crates.io

Rust Package Manager

PHP

Packagist

PHP Package Manager

GOLANG

Go Modules

Go Dependency Management

JAVA

Maven Central

JAVASCRIPT

npm

Node Package Manager

.NET

NuGet

.NET Package Manager

PYTHON

PyPI

Python Package Index

RUBY

RubyGems.org

Ruby Package Manager

SWIFT

Swift

AI

Hugging Face Hub

AI Model Hub

CI

GitHub Actions

CI/CD Workflows

EXTENSIONS

Chrome Web Store

Chrome Browser Extensions

EXTENSIONS

Open VSX

VS Code Extensions

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Nov 23, 2025

Shai Hulud v2

Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.

Nov 05, 2025

Elves on npm

A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.

Jul 04, 2025

RubyGems Automation-Tool Infostealer

Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.

Mar 13, 2025

North Korea's Contagious Interview Campaign

Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.

Jul 23, 2024

Network Reconnaissance Campaign

A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles