Launch Week Day 5: Introducing Reachability for PHP.Learn More
Socket
Book a DemoSign in
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery
t

timmywil published 4.0.0

left-pad
s

stevemao published 1.3.0

react
r

react-bot published 19.2.5

We protect you from vulnerable and malicious packages

tailwindcss-animate-plus

4.0.2

by lupus7u7

Removed from npm

Blocked by Socket

The source code contains heavily obfuscated JavaScript that uses a custom character shuffling function (YWG) to decode an encoded payload stored in variable 'fvm'. The obfuscated code manipulates global variables (global['_V'], global['r'], global['m']) to access Node.js internals like the require function and module object. The decoded payload is then dynamically executed through multiple layers of function calls, culminating in XZs(7942). This multi-stage decoding and execution pattern is consistent with supply chain attacks designed to hide malicious behavior such as backdoors, data exfiltration, or remote code execution. The intentional obfuscation and dynamic code evaluation without transparency are strong indicators of malicious intent designed to evade static analysis and detection systems.

Live on npm for 1 hour and 22 minutes before removal. Socket users were protected even while the package was live.

ryry-cli

2.70

Removed from pypi

Blocked by Socket

The code contains risky operations that can enable supply-chain attacks and remote code execution: it downloads remote zip packages and extracts them without validation, and runs pip install/uninstall via shell subprocesses with unverified inputs. It also leaks host identification to an external notify endpoint. There is no evidence of deliberately hidden malware in this fragment (no obfuscation, no hardcoded credentials or reverse shell code), but the behavior (automatic fetching and installing of packages from remote URLs without integrity checks) presents a significant security risk. Recommend treating remote package sources as untrusted, adding integrity checks (hash/signature verification), avoiding shell=True, sanitizing zip entries before extraction, and limiting or requiring user confirmation for installs.

Live on pypi for 2 hours and 33 minutes before removal. Socket users were protected even while the package was live.

ailever

0.2.417

Live on pypi

Blocked by Socket

The code presents a strong supply-chain and remote-execution risk by automatically downloading and executing remote Python payloads without integrity checks or sandboxing. It also creates and runs external services (Jupyter, Visdom, RStudio) based on user inputs, which can amplify impact if the remote payload is malicious. Mitigations include removing remote code execution paths, adding cryptographic verification (signatures or hash checks), isolating execution (sandboxes or containerization), validating inputs, and avoiding untrusted downloads or executions.

imagecomponents.wpf.imaging

4.0.0.4

by Image Components

Live on nuget

Blocked by Socket

This file contains clear indicators of an in-memory loader/packer: it reads an embedded resource, decrypts/validates it, allocates executable memory, writes native bytes into process memory and patches runtime structures to execute them. Those behaviors (VirtualAlloc/mmap, WriteProcessMemory, /proc/self/mem writes, patching method pointers, dynamic code generation) are characteristic of code injection/sideloading and are not appropriate for a UI toolbar library. Treat this package as highly suspicious and likely malicious (trojanized). Do not use it in production; consider removing and scanning systems where it was used.

@fdfe/era-cloud-uploader

0.12.2

by dhasifg

Live on npm

Blocked by Socket

The code is highly obfuscated and is designed to secretly collect and transmit sensitive user and system information to external entities via network calls to suspicious IP addresses. This indicates malicious intent.

n8n-nodes-gg-udhasudsh-hgjkhg-official

0.0.25

Live on npm

Blocked by Socket

No clear malicious behavior is visible in this fragment. It performs a POST to a Google Ads client with a query and maps API response rows to a simple object shape. The code is heavily obfuscated/encoded which reduces auditability; combined with lack of visible input validation this warrants caution and further review of surrounding code (GoogleAdsClient implementation, sources of query and credentials). I assess low probability of malware but moderate concern due to obfuscation and missing context; recommend obtaining the unobfuscated source or the module before trusting or publishing.

carbonorm/carbonphp

11.1.2

Live on composer

Blocked by Socket

The codebase behaves as a migration orchestration tool with legitimate migration capabilities but contains a covert backdoor mechanism in selfHidingFile that can disclose server files under license verification and specific GET parameters. This elevates supply-chain risk and security exposure significantly, warranting removal or a thorough security remediation before any production use. The combination of license-bound backdoor payloads, remote manifest/document handling, and extensive filesystem/network interactions creates strong indicators of potential misuse if exposed to adversarial inputs.

@lamion-libs/api

0.0.10-dev2

by lamion-libs

Live on npm

Blocked by Socket

This function implements straightforward telemetry/telemetry-exfiltration: it collects device and user identifiers, events and errors from the provided data object and POSTs them to a hard-coded HTTP endpoint (150.241.92.62:9000). Key risks: Authorization/accessKey and user/device identifiers are sent in plaintext (no TLS), the destination is a fixed IP:port rather than a configurable/trustable domain, and there is no validation, redaction, error handling, or opt-out — making silent credential/identifier leakage likely if integrated. Treat this code as high-risk for data leakage; block or remove unless you can verify the endpoint and the data being transmitted are explicitly intended to be sent there.

mtsm

0.0.74

Live on pypi

Blocked by Socket

This settings module contains multiple insecure configurations and several hardcoded secrets and keys that create a substantial supply‑chain and operational security risk if this repository is public or shared. There is no direct evidence of active malware in the code fragment itself, but the committed secrets and permissive production flags (DEBUG, ALLOWED_HOSTS, CORS allow all) materially increase risk of compromise and misuse. Treat this as high security risk: remove secrets from source control, rotate exposed credentials, tighten hosts/CORS/DEBUG, and audit dependent apps and configured endpoints.

cl-lite

1.0.952

by michael_tian

Live on npm

Blocked by Socket

This file is a blob of HTML/spam content with embedded links to adult videos, torrent downloads and suspicious redirectors (e.g. https://2023[.]redircdn[.]com/?…, http://rmdown[.]com/link[.]php?hash=…, http://data[.]down2048[.]com/list[.]php?…), plus numerous third-party image URLs. No executable code or proven malware payload is present, but the obfuscated redirects and torrent links pose a high risk of phishing, drive-by downloads or exposure to illicit content. Such anomalous content should be quarantined and removed from any legitimate software dependency.

runbooks

1.1.21

Removed from pypi

Blocked by Socket

The script is a convenience bootstrapper but implements high-risk supply-chain and remote code execution patterns: installing unpinned npm packages (which may run lifecycle scripts) and piping a remote script from raw.githubusercontent.com directly into node without integrity checks. The script itself is not obfuscated and contains no embedded payloads, but it creates a simple, reliable path for arbitrary code execution and potential credential theft/exfiltration if either the remote cfat.js or any installed package is compromised. Do not run this script in sensitive or production environments without first: (1) fetching and auditing the remote cfat.js locally, (2) pinning and auditing exact package versions (use a lockfile), (3) verifying artifact integrity (checksums/signatures/pinned commit SHA), and (4) executing in a constrained environment (sandbox, least-privilege account).

Live on pypi for 118 days, 12 hours and 20 minutes before removal. Socket users were protected even while the package was live.

354766/inference-sh-9/skills/ai-content-pipeline/

c1227702d916245b71cfccc05cece571eb33db6d

Live on socket

Blocked by Socket

[Skill Scanner] Pipe-to-shell or eval pattern detected All findings: [CRITICAL] command_injection: Pipe-to-shell or eval pattern detected (CI013) [AITech 9.1.4] [CRITICAL] command_injection: Natural language instruction to download and install from URL detected (CI009) [AITech 9.1.4] [CRITICAL] command_injection: Natural language instruction to download and install from URL detected (CI009) [AITech 9.1.4] This skill documentation describes a legitimate orchestration workflow for multi-step AI media production and maps capabilities to example remote apps consistently. There are supply-chain and privacy risks: the recommended curl|sh install pattern (download-and-execute), opaque auth (infsh login) that will forward credentials to the inference.sh platform, and broad shell execution permissions (Bash(infsh *)). No direct malicious code or obfuscated payloads appear in the supplied text, but the download-execute pattern and centralized routing of user data to external services justify treating this as a medium security risk. Recommend avoiding piped installer usage, verifying checksums manually from dist.inference.sh, reviewing how infsh stores/transmits credentials, and auditing any CLI binary before execution. LLM verification: The skill's functionality and documentation are coherent with its purpose (content pipelines). The main security concern is the recommended install pattern: curl -fsSL https://cli.inference.sh | sh (download-and-execute), and reliance on a non-standard distribution host (dist.inference.sh). Those supply-chain patterns permit arbitrary remote code execution on users' machines and create a high-risk vector for credential harvesting or malicious binaries if the distribution site is compromised. The

cdp-agentkit-monorepo

1.0.0

by avinashkumaray

Removed from npm

Blocked by Socket

The script is designed to leak sensitive information to a remote server, which is a clear indication of malicious behavior.

Live on npm for 14 days, 12 hours and 26 minutes before removal. Socket users were protected even while the package was live.

typing-extension

95.6

Removed from pypi

Blocked by Socket

The code exhibits malicious behavior by collecting sensitive system information and sending it to suspicious external URLs without user consent. This poses a significant security risk.

Live on pypi for 1 hour and 21 minutes before removal. Socket users were protected even while the package was live.

@bigidea/integration-cli

1.0.13

by ericbigidea

Live on npm

Blocked by Socket

The provided code snippet allows for the execution of arbitrary JavaScript code within a Node.js environment. While it attempts to use `vm.createContext` for sandboxing, it exposes powerful built-in modules like `fs`, `process`, and `require` in the execution context. This significantly weakens the sandbox and creates a high risk of Remote Code Execution (RCE) if the `code` parameter originates from an untrusted source. Malicious code could leverage these exposed modules to read/write files, access environment variables, execute system commands, or establish network connections.

@link-assistant/hive-mind

1.50.4

by konard

Live on npm

Blocked by Socket

The code implements a cross-platform system resource checker (RAM/Disk) with an additional, high-risk remote dynamic loader pattern. The remote fetch and eval step constitutes the principal security vulnerability and supply-chain risk, as it allows arbitrary code execution and potential backdoors. While the local checks themselves appear benign, the trust boundary is broken by remote code injection. To reduce risk, eliminate remote dynamic loading, or replace with pinned, signed dependencies and verifiable integrity checks. If remote loading must remain, implement strict integrity verification (SRI-like), sandboxing, and code-signing guarantees, and remove eval usage.

superblocks.superblocks

0.90.31

Live on openvsx

Blocked by Socket

The code represents a standard, well-scoped implementation of locale-aware era parsing/formatting in Moment.js. There is no evidence of malicious behavior, data exfiltration, or insecure data handling in this fragment. The observable risks are limited to potential side effects from locale data normalization and dynamic regex caching, which are typical for a localization feature. Overall security risk remains low with careful handling of locale data lifecycle.

satriotol/fastcrud

12.7.49

Live on composer

Blocked by Socket

This SweetAlert2 bundle contains a malicious, targeted payload. For Russian-language users on specific TLDs, after an initiation delay tracked in localStorage and only after >3 days, the code disables page pointer interactions, injects an <audio> element pointing to a hard-coded external MP3 URL, and attempts to auto-play it in a loop. This is defacement/sabotage and unrelated to the library's purpose — likely a supply-chain compromise. Do not use this package; remove or patch the injected block, rotate any exposed credentials (if any), audit upstream package sources, and restore from a verified clean release.

mythic-container

0.2.3rc4

Live on pypi

Blocked by Socket

The code presents several potential security risks and suggests the intent of managing a C2 server, which could be used for malicious purposes. Specifically, the handling of subprocesses with shell=True, the lack of proper input validation, and the exposure of sensitive file operations could facilitate unauthorized actions and access to sensitive data. Therefore, this code should be treated with caution and likely indicates malicious intent in its context.

@hansotech/mfair-wsp-mod-mapbox-jssdk

0.1.3

by budblack

Live on npm

Blocked by Socket

Significant supply-chain risk signals are present. This module reconstructs JavaScript from embedded Base64 payloads and executes it in workers with eval enabled (and via Blob/object URLs), then performs authenticated outbound network requests carrying rich metadata/telemetry and uses client-side cached identifiers to influence requests. While it aligns superficially with an SDK that manages map rendering and telemetry, the worker-eval + embedded-code execution pattern is a strong indicator of a malicious loader or covert tracking/exfiltration component and warrants deep review, runtime sandboxing, and egress/network allowlisting.

reasoning-deployment-service

0.2.8

Live on pypi

Blocked by Socket

This module intentionally performs high-risk operations: installing user-specified packages, staging and uploading local code, and executing the agent module in-process. If the provided agent code or requirements are untrusted, they can execute arbitrary actions (data access, exfiltration, spawning processes, network calls). The code is not itself obfuscated or clearly malicious, but it provides functionality that can be abused as a supply-chain or remote-execution vector. Recommendations: only run this with trusted agent code and vetted requirements; avoid executing untrusted modules in-process; consider performing static checks, running the agent code inside a strongly isolated sandbox/container, and preventing upload of sensitive files beyond the explicit excludes.

mtmai

0.3.1140

Live on pypi

Blocked by Socket

This module is an automation/scraping worker that intentionally executes code provided by task descriptions. That design requires trusting the task source. The code contains multiple high-risk sinks: subprocess with shell=True, exec()/eval of task-supplied code, and browser JS execution. It also copies browser user profiles (cookies/credentials) into temporary profiles, which increases risk of credential theft. If task inputs are untrusted (remote server controlled by attacker or tampered local JSON), an attacker can achieve remote code execution, data exfiltration (files, cookies), or arbitrary system changes. Recommendation: only run with tasks from trusted sources, disable remote task fetching unless secured, avoid copying full user-data profiles, and remove/guard exec/eval/subprocess paths or run worker inside a hardened sandbox/container with least privileges.

tailwindcss-animate-plus

4.0.2

by lupus7u7

Removed from npm

Blocked by Socket

The source code contains heavily obfuscated JavaScript that uses a custom character shuffling function (YWG) to decode an encoded payload stored in variable 'fvm'. The obfuscated code manipulates global variables (global['_V'], global['r'], global['m']) to access Node.js internals like the require function and module object. The decoded payload is then dynamically executed through multiple layers of function calls, culminating in XZs(7942). This multi-stage decoding and execution pattern is consistent with supply chain attacks designed to hide malicious behavior such as backdoors, data exfiltration, or remote code execution. The intentional obfuscation and dynamic code evaluation without transparency are strong indicators of malicious intent designed to evade static analysis and detection systems.

Live on npm for 1 hour and 22 minutes before removal. Socket users were protected even while the package was live.

ryry-cli

2.70

Removed from pypi

Blocked by Socket

The code contains risky operations that can enable supply-chain attacks and remote code execution: it downloads remote zip packages and extracts them without validation, and runs pip install/uninstall via shell subprocesses with unverified inputs. It also leaks host identification to an external notify endpoint. There is no evidence of deliberately hidden malware in this fragment (no obfuscation, no hardcoded credentials or reverse shell code), but the behavior (automatic fetching and installing of packages from remote URLs without integrity checks) presents a significant security risk. Recommend treating remote package sources as untrusted, adding integrity checks (hash/signature verification), avoiding shell=True, sanitizing zip entries before extraction, and limiting or requiring user confirmation for installs.

Live on pypi for 2 hours and 33 minutes before removal. Socket users were protected even while the package was live.

ailever

0.2.417

Live on pypi

Blocked by Socket

The code presents a strong supply-chain and remote-execution risk by automatically downloading and executing remote Python payloads without integrity checks or sandboxing. It also creates and runs external services (Jupyter, Visdom, RStudio) based on user inputs, which can amplify impact if the remote payload is malicious. Mitigations include removing remote code execution paths, adding cryptographic verification (signatures or hash checks), isolating execution (sandboxes or containerization), validating inputs, and avoiding untrusted downloads or executions.

imagecomponents.wpf.imaging

4.0.0.4

by Image Components

Live on nuget

Blocked by Socket

This file contains clear indicators of an in-memory loader/packer: it reads an embedded resource, decrypts/validates it, allocates executable memory, writes native bytes into process memory and patches runtime structures to execute them. Those behaviors (VirtualAlloc/mmap, WriteProcessMemory, /proc/self/mem writes, patching method pointers, dynamic code generation) are characteristic of code injection/sideloading and are not appropriate for a UI toolbar library. Treat this package as highly suspicious and likely malicious (trojanized). Do not use it in production; consider removing and scanning systems where it was used.

@fdfe/era-cloud-uploader

0.12.2

by dhasifg

Live on npm

Blocked by Socket

The code is highly obfuscated and is designed to secretly collect and transmit sensitive user and system information to external entities via network calls to suspicious IP addresses. This indicates malicious intent.

n8n-nodes-gg-udhasudsh-hgjkhg-official

0.0.25

Live on npm

Blocked by Socket

No clear malicious behavior is visible in this fragment. It performs a POST to a Google Ads client with a query and maps API response rows to a simple object shape. The code is heavily obfuscated/encoded which reduces auditability; combined with lack of visible input validation this warrants caution and further review of surrounding code (GoogleAdsClient implementation, sources of query and credentials). I assess low probability of malware but moderate concern due to obfuscation and missing context; recommend obtaining the unobfuscated source or the module before trusting or publishing.

carbonorm/carbonphp

11.1.2

Live on composer

Blocked by Socket

The codebase behaves as a migration orchestration tool with legitimate migration capabilities but contains a covert backdoor mechanism in selfHidingFile that can disclose server files under license verification and specific GET parameters. This elevates supply-chain risk and security exposure significantly, warranting removal or a thorough security remediation before any production use. The combination of license-bound backdoor payloads, remote manifest/document handling, and extensive filesystem/network interactions creates strong indicators of potential misuse if exposed to adversarial inputs.

@lamion-libs/api

0.0.10-dev2

by lamion-libs

Live on npm

Blocked by Socket

This function implements straightforward telemetry/telemetry-exfiltration: it collects device and user identifiers, events and errors from the provided data object and POSTs them to a hard-coded HTTP endpoint (150.241.92.62:9000). Key risks: Authorization/accessKey and user/device identifiers are sent in plaintext (no TLS), the destination is a fixed IP:port rather than a configurable/trustable domain, and there is no validation, redaction, error handling, or opt-out — making silent credential/identifier leakage likely if integrated. Treat this code as high-risk for data leakage; block or remove unless you can verify the endpoint and the data being transmitted are explicitly intended to be sent there.

mtsm

0.0.74

Live on pypi

Blocked by Socket

This settings module contains multiple insecure configurations and several hardcoded secrets and keys that create a substantial supply‑chain and operational security risk if this repository is public or shared. There is no direct evidence of active malware in the code fragment itself, but the committed secrets and permissive production flags (DEBUG, ALLOWED_HOSTS, CORS allow all) materially increase risk of compromise and misuse. Treat this as high security risk: remove secrets from source control, rotate exposed credentials, tighten hosts/CORS/DEBUG, and audit dependent apps and configured endpoints.

cl-lite

1.0.952

by michael_tian

Live on npm

Blocked by Socket

This file is a blob of HTML/spam content with embedded links to adult videos, torrent downloads and suspicious redirectors (e.g. https://2023[.]redircdn[.]com/?…, http://rmdown[.]com/link[.]php?hash=…, http://data[.]down2048[.]com/list[.]php?…), plus numerous third-party image URLs. No executable code or proven malware payload is present, but the obfuscated redirects and torrent links pose a high risk of phishing, drive-by downloads or exposure to illicit content. Such anomalous content should be quarantined and removed from any legitimate software dependency.

runbooks

1.1.21

Removed from pypi

Blocked by Socket

The script is a convenience bootstrapper but implements high-risk supply-chain and remote code execution patterns: installing unpinned npm packages (which may run lifecycle scripts) and piping a remote script from raw.githubusercontent.com directly into node without integrity checks. The script itself is not obfuscated and contains no embedded payloads, but it creates a simple, reliable path for arbitrary code execution and potential credential theft/exfiltration if either the remote cfat.js or any installed package is compromised. Do not run this script in sensitive or production environments without first: (1) fetching and auditing the remote cfat.js locally, (2) pinning and auditing exact package versions (use a lockfile), (3) verifying artifact integrity (checksums/signatures/pinned commit SHA), and (4) executing in a constrained environment (sandbox, least-privilege account).

Live on pypi for 118 days, 12 hours and 20 minutes before removal. Socket users were protected even while the package was live.

354766/inference-sh-9/skills/ai-content-pipeline/

c1227702d916245b71cfccc05cece571eb33db6d

Live on socket

Blocked by Socket

[Skill Scanner] Pipe-to-shell or eval pattern detected All findings: [CRITICAL] command_injection: Pipe-to-shell or eval pattern detected (CI013) [AITech 9.1.4] [CRITICAL] command_injection: Natural language instruction to download and install from URL detected (CI009) [AITech 9.1.4] [CRITICAL] command_injection: Natural language instruction to download and install from URL detected (CI009) [AITech 9.1.4] This skill documentation describes a legitimate orchestration workflow for multi-step AI media production and maps capabilities to example remote apps consistently. There are supply-chain and privacy risks: the recommended curl|sh install pattern (download-and-execute), opaque auth (infsh login) that will forward credentials to the inference.sh platform, and broad shell execution permissions (Bash(infsh *)). No direct malicious code or obfuscated payloads appear in the supplied text, but the download-execute pattern and centralized routing of user data to external services justify treating this as a medium security risk. Recommend avoiding piped installer usage, verifying checksums manually from dist.inference.sh, reviewing how infsh stores/transmits credentials, and auditing any CLI binary before execution. LLM verification: The skill's functionality and documentation are coherent with its purpose (content pipelines). The main security concern is the recommended install pattern: curl -fsSL https://cli.inference.sh | sh (download-and-execute), and reliance on a non-standard distribution host (dist.inference.sh). Those supply-chain patterns permit arbitrary remote code execution on users' machines and create a high-risk vector for credential harvesting or malicious binaries if the distribution site is compromised. The

cdp-agentkit-monorepo

1.0.0

by avinashkumaray

Removed from npm

Blocked by Socket

The script is designed to leak sensitive information to a remote server, which is a clear indication of malicious behavior.

Live on npm for 14 days, 12 hours and 26 minutes before removal. Socket users were protected even while the package was live.

typing-extension

95.6

Removed from pypi

Blocked by Socket

The code exhibits malicious behavior by collecting sensitive system information and sending it to suspicious external URLs without user consent. This poses a significant security risk.

Live on pypi for 1 hour and 21 minutes before removal. Socket users were protected even while the package was live.

@bigidea/integration-cli

1.0.13

by ericbigidea

Live on npm

Blocked by Socket

The provided code snippet allows for the execution of arbitrary JavaScript code within a Node.js environment. While it attempts to use `vm.createContext` for sandboxing, it exposes powerful built-in modules like `fs`, `process`, and `require` in the execution context. This significantly weakens the sandbox and creates a high risk of Remote Code Execution (RCE) if the `code` parameter originates from an untrusted source. Malicious code could leverage these exposed modules to read/write files, access environment variables, execute system commands, or establish network connections.

@link-assistant/hive-mind

1.50.4

by konard

Live on npm

Blocked by Socket

The code implements a cross-platform system resource checker (RAM/Disk) with an additional, high-risk remote dynamic loader pattern. The remote fetch and eval step constitutes the principal security vulnerability and supply-chain risk, as it allows arbitrary code execution and potential backdoors. While the local checks themselves appear benign, the trust boundary is broken by remote code injection. To reduce risk, eliminate remote dynamic loading, or replace with pinned, signed dependencies and verifiable integrity checks. If remote loading must remain, implement strict integrity verification (SRI-like), sandboxing, and code-signing guarantees, and remove eval usage.

superblocks.superblocks

0.90.31

Live on openvsx

Blocked by Socket

The code represents a standard, well-scoped implementation of locale-aware era parsing/formatting in Moment.js. There is no evidence of malicious behavior, data exfiltration, or insecure data handling in this fragment. The observable risks are limited to potential side effects from locale data normalization and dynamic regex caching, which are typical for a localization feature. Overall security risk remains low with careful handling of locale data lifecycle.

satriotol/fastcrud

12.7.49

Live on composer

Blocked by Socket

This SweetAlert2 bundle contains a malicious, targeted payload. For Russian-language users on specific TLDs, after an initiation delay tracked in localStorage and only after >3 days, the code disables page pointer interactions, injects an <audio> element pointing to a hard-coded external MP3 URL, and attempts to auto-play it in a loop. This is defacement/sabotage and unrelated to the library's purpose — likely a supply-chain compromise. Do not use this package; remove or patch the injected block, rotate any exposed credentials (if any), audit upstream package sources, and restore from a verified clean release.

mythic-container

0.2.3rc4

Live on pypi

Blocked by Socket

The code presents several potential security risks and suggests the intent of managing a C2 server, which could be used for malicious purposes. Specifically, the handling of subprocesses with shell=True, the lack of proper input validation, and the exposure of sensitive file operations could facilitate unauthorized actions and access to sensitive data. Therefore, this code should be treated with caution and likely indicates malicious intent in its context.

@hansotech/mfair-wsp-mod-mapbox-jssdk

0.1.3

by budblack

Live on npm

Blocked by Socket

Significant supply-chain risk signals are present. This module reconstructs JavaScript from embedded Base64 payloads and executes it in workers with eval enabled (and via Blob/object URLs), then performs authenticated outbound network requests carrying rich metadata/telemetry and uses client-side cached identifiers to influence requests. While it aligns superficially with an SDK that manages map rendering and telemetry, the worker-eval + embedded-code execution pattern is a strong indicator of a malicious loader or covert tracking/exfiltration component and warrants deep review, runtime sandboxing, and egress/network allowlisting.

reasoning-deployment-service

0.2.8

Live on pypi

Blocked by Socket

This module intentionally performs high-risk operations: installing user-specified packages, staging and uploading local code, and executing the agent module in-process. If the provided agent code or requirements are untrusted, they can execute arbitrary actions (data access, exfiltration, spawning processes, network calls). The code is not itself obfuscated or clearly malicious, but it provides functionality that can be abused as a supply-chain or remote-execution vector. Recommendations: only run this with trusted agent code and vetted requirements; avoid executing untrusted modules in-process; consider performing static checks, running the agent code inside a strongly isolated sandbox/container, and preventing upload of sensitive files beyond the explicit excludes.

mtmai

0.3.1140

Live on pypi

Blocked by Socket

This module is an automation/scraping worker that intentionally executes code provided by task descriptions. That design requires trusting the task source. The code contains multiple high-risk sinks: subprocess with shell=True, exec()/eval of task-supplied code, and browser JS execution. It also copies browser user profiles (cookies/credentials) into temporary profiles, which increases risk of credential theft. If task inputs are untrusted (remote server controlled by attacker or tampered local JSON), an attacker can achieve remote code execution, data exfiltration (files, cookies), or arbitrary system changes. Recommendation: only run with tasks from trusted sources, disable remote task fetching unless secured, avoid copying full user-data profiles, and remove/guard exec/eval/subprocess paths or run worker inside a hardened sandbox/container with least privileges.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Possible typosquat attack

Known malware

Git dependency

GitHub dependency

HTTP dependency

Obfuscated code

Suspicious Stars on GitHub

Telemetry

Protestware or potentially unwanted behavior

Unstable ownership

55 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Book a Demo

Questions? Call us at (844) SOCKET-0

Read the blog

Protect every package in your stack

Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.

View all integrations

RUST

crates.io

Rust Package Manager

PHP

Packagist

PHP Package Manager

GOLANG

Go Modules

Go Dependency Management

JAVA

Maven Central

JAVASCRIPT

npm

Node Package Manager

.NET

NuGet

.NET Package Manager

PYTHON

PyPI

Python Package Index

RUBY

RubyGems.org

Ruby Package Manager

SWIFT

Swift

AI

Hugging Face Hub

AI Model Hub

CI

GitHub Actions

CI/CD Workflows

EXTENSIONS

Chrome Web Store

Chrome Browser Extensions

EXTENSIONS

Open VSX

VS Code Extensions

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Nov 23, 2025

Shai Hulud v2

Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.

Nov 05, 2025

Elves on npm

A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.

Jul 04, 2025

RubyGems Automation-Tool Infostealer

Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.

Mar 13, 2025

North Korea's Contagious Interview Campaign

Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.

Jul 23, 2024

Network Reconnaissance Campaign

A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles