Launch Week Day 5: Introducing Reachability for PHP.Learn More
Socket
Book a DemoSign in
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery
t

timmywil published 4.0.0

left-pad
s

stevemao published 1.3.0

react
r

react-bot published 19.2.5

We protect you from vulnerable and malicious packages

amzn-consolas-client

99.0.1

Live on cargo

Blocked by Socket

High-confidence malicious supply-chain style exfiltration/reporting code: it collects host/user identity and sends it via Telegram using hardcoded bot credentials. The build-script-like `cargo:rerun-if-changed=build.rs` message further suggests it is intended to execute during builds/dependency installation, consistent with dependency-confusion/backdoor notifications. Should not be used.

plumber-agent

1.0.17

Live on pypi

Blocked by Socket

This module implements a high-risk file-driven execution mechanism inside Blender that reads a JSON command file and executes the 'command' field verbatim using Python exec() without validation or sandboxing. It exposes Blender’s bpy API to the executed code, captures stdout, writes results/errors to disk, and deletes the consumed command file. If an attacker can write or tamper with the command_file (or misconfigure file paths), this becomes an effective arbitrary code execution channel with strong feedback via returned output and logged tracebacks. No obvious cryptomining or hardcoded credentials are visible in the provided fragment; the primary concern is the exec-based design pattern.

ghbomber

1.0.3

by ghostsenderserver

Live on npm

Blocked by Socket

This module behaves like an obfuscation/payload packer: it compresses caller-provided content with zlib, transforms it through custom binary/chunk/position encoding with randomized keys, and returns a dynamically constructed JavaScript decoder/loader string. The generated code includes loader-like indicators (external path pattern and DOM-manipulation keywords), which is consistent with malicious droppers or supply-chain payload concealment. No direct network or execution occurs inside this snippet, but the produced artifact is suitable for injection/execution by downstream consumers, making it high-risk for a software supply chain.

apple-app-store-server-library-poc

100.2.0

by cketol

Live on npm

Blocked by Socket

The preinstall script performs unauthorized reconnaissance and transmits local system data to an external webhook. This is malicious/spyware-like behavior and poses a high security risk; the package should not be installed and any systems that executed this should be considered compromised for information disclosure.

robase-ui

2.3.0

Removed from pypi

Blocked by Socket

The code is a highly suspicious supply-chain installer backdoor pattern: it hooks setuptools installation and spawns PowerShell with hidden-window and execution-policy bypass flags, passing an intended command string. The specific payload content is not observable in the provided snippet (missing/incomplete `powershell_cmd`), but the execution mechanism and evasion techniques strongly indicate malicious intent. Treat the package as unsafe and inspect the full, complete installed artifact to determine the actual `powershell_cmd` and its actions.

Live on pypi for 7 minutes before removal. Socket users were protected even while the package was live.

@w3m-app/get_chain_id

99.0.4

by m0ntanatony

Live on npm

Blocked by Socket

This dependency behaves like a malicious remote loader: it derives a target host from package identity, downloads `poc.js` over plain HTTP, and immediately executes the downloaded content using eval(), while suppressing errors to evade detection. Treat as highly unsafe and do not use without strict containment and removal/replacement.

ghbomber

1.0.4

by ghostsenderserver

Live on npm

Blocked by Socket

This code fragment is highly consistent with an automated username/account discovery tool targeting Microsoft/Office365/ADFS federation behavior. It probes remote identity endpoints with {Username}, interprets response signals (IfExistsResult and FederationRedirectUrl) to identify valid/interesting accounts or tenants, and appends categorized results to local files using environment-controlled paths. The heavy obfuscation and one-shot batch execution further increase the risk.

@w3m-app/is_connected

99.0.4

by m0ntanatony

Live on npm

Blocked by Socket

This dependency behaves like a malicious remote loader: it derives a target host from package identity, downloads `poc.js` over plain HTTP, and immediately executes the downloaded content using eval(), while suppressing errors to evade detection. Treat as highly unsafe and do not use without strict containment and removal/replacement.

apple-app-store-server-library-poc

100.0.1

by cketol

Live on npm

Blocked by Socket

This code is a high-confidence malicious supply-chain style hook. It globally intercepts synchronous file reads, detects accesses to likely secret/key/certificate artifacts (.env, .p8, testCA.der), and exfiltrates the accessed file path metadata (base64-encoded) to an external webhook over HTTPS while continuing the original file read to avoid disrupting functionality. Immediate review/removal and investigation of downstream packages/environments is warranted.

dodex-vertx

4.1.3

by daveo

Live on npm

Blocked by Socket

This module is highly security-sensitive. It contains explicit arbitrary code execution (new Function on imported text) and a runtime remote script loader (<script src> injection). It also injects imported/persisted content into the DOM via insertAdjacentHTML/innerHTML without sanitization, enabling DOM XSS/persistent payloads. Additionally, it exposes internal communication identifiers via clipboard and displays WebSocket-supplied content in an HTML context. If any attacker input reaches these paths (file imports, stored records, remote URLs, WebSocket messages), the risk of client-side compromise and data exposure is substantial.

@flarehr/apollo-benefits

1.4.6532

by flare.build

Live on npm

Blocked by Socket

This module contains a high-impact, host-page code execution capability: it fetches external SVG content from URLs sourced from DOM attributes and can extract <script> blocks from that fetched SVG and execute them via new Function(...)(window). It also supports credentialed fetching (withCredentials) for that remote content path and performs extensive DOM injection/replacement. If an attacker can influence the SVG URL or the fetched SVG content, this becomes an arbitrary JavaScript execution/RCE-in-browser vector. Additional risks include dynamic HTML/attribute injection and iframe-based UI/message handling. Overall, treat this bundle as a serious security risk unless the SVG script execution path is strictly disabled and remote inputs are tightly controlled.

devduck

1.15.4

Live on pypi

Blocked by Socket

This fragment provides a high-capability browser automation/inspection bridge with multiple high-risk primitives: it can navigate to attacker-supplied URLs, inject and run page-context scripts, execute caller-provided code via eval, read cookies, harvest large DOM content, and attach the Chrome debugger to simulate user input or send arbitrary CDP commands. If an attacker can reach the runtime messaging interface or if external WebSocket/native connectors forward commands/results, the module can enable session/DOM data theft and arbitrary in-page manipulation. Even without proving exfiltration/network behavior in the snippet, the capability set warrants security review, strict message authentication/authorization, and permission minimization/allowlisting.

@gnsx/genesys.sdk

10.1.9

by haowang1013

Live on npm

Blocked by Socket

This module contains a highly dangerous capability: POST /api/exec executes a system command directly from an untrusted request body via runCommand, without any authentication/allowlisting in this file. Additionally, it exposes multiple filesystem modification endpoints (write/delete/upload) using user-controlled paths/headers without enforcing containment within rootDir, creating potential path traversal and arbitrary file manipulation. These are strong indicators of malicious behavior or an intentionally powerful backdoor-like interface.

unique-string-64

1.0.1

by jason3

Live on npm

Blocked by Socket

This module is primarily a random-string generator but includes a dormant backdoor-like behavior: in non-automated environments with _id == 64, it decrypts an embedded ciphertext using AES with a hardcoded key and executes the resulting plaintext via eval (accessed through globalThis with a computed key). Environment gating and dynamic eval are high-confidence indicators of malicious intent in a supply-chain context.

@w3m-frame/session_update

99.0.4

by m0ntanatony

Live on npm

Blocked by Socket

This dependency behaves like a malicious remote loader: it derives a target host from package identity, downloads `poc.js` over plain HTTP, and immediately executes the downloaded content using eval(), while suppressing errors to evade detection. Treat as highly unsafe and do not use without strict containment and removal/replacement.

neoagent

2.3.1-beta.10

by neo_original_

Live on npm

Blocked by Socket

Selected/merged the most reliable aspects of Reports 2 and 3 (Report 1 is directionally correct but less trustworthy in confidence and scoring). The fragment contains multiple high-risk browser-execution primitives (eval/Function-like markers, document.write/innerHTML-like DOM injection, document.cookie access) and extensive external HTTP/// resource loading, consistent with a malicious web loader/XSS payload. Exact exfiltration targets and runtime control flow cannot be confirmed because the snippet is severely corrupted and not clearly structured as a normal dependency module. Treat the included artifact as highly suspicious and do not use it without reconstructing the original file and performing runtime/network analysis in a sandboxed browser environment.

ghbomber

1.0.4

by ghostsenderserver

Live on npm

Blocked by Socket

This fragment behaves like an automated account/email verification/harvesting tool. It performs scripted login/verification flows by scraping tokens and cookies from provider responses and submitting derived requests, then writes “valid” identifiers to local files. The highest-severity issue is the use of eval() on content extracted from remote HTTP responses, creating a direct remote-to-code execution pathway, which makes the module particularly unsafe and highly suspicious even if its intent is framed as “verification.”

ghbomber

1.0.3

by ghostsenderserver

Live on npm

Blocked by Socket

This fragment is highly suspicious and consistent with an automated identity/SSO enumeration tool: it sends enumerated usernames to a remote HTTP service, interprets existence/federation redirect metadata, and writes categorized 'hit'/'invalid' results into append-only local text files. The heavy obfuscation and provider-specific branching increase confidence that the code is intended for operational probing rather than benign functionality.

@gnsx/genesys.sdk

10.1.8

by GitHub Actions

Live on npm

Blocked by Socket

This module contains a highly dangerous capability: POST /api/exec executes a system command directly from an untrusted request body via runCommand, without any authentication/allowlisting in this file. Additionally, it exposes multiple filesystem modification endpoints (write/delete/upload) using user-controlled paths/headers without enforcing containment within rootDir, creating potential path traversal and arbitrary file manipulation. These are strong indicators of malicious behavior or an intentionally powerful backdoor-like interface.

rfox

1.0.1

Live on pypi

Blocked by Socket

This module is a purpose-built scan-and-jam tool. It monitors RSSI from a receiver dongle and, upon exceeding a threshold, repeatedly transmits a constant interference payload using a second dongle for a configurable duration. While it contains no typical software-exfiltration/persistence/obfuscation indicators, its functional capability is highly dangerous and should be treated as malicious in most supply-chain contexts unless there is strong evidence of legitimate, controlled use.

9remote

2.0.12

by decolua

Live on npm

Blocked by Socket

This module is highly suspicious and security-relevant: it establishes a public tunnel to a local service using Cloudflare cloudflared, operates as a remotely coordinated agent with SSE/control-plane behavior against a hardcoded controller domain, persists identity/keys locally, and performs OS-level process control via child_process (including Windows PowerShell execution). While it may be intended for legitimate remote access, its combination of C2-like control patterns, tunnel exposure, detached persistence, and risky secret fallback makes it a major supply-chain risk that should be treated as an agent/backdoor-like capability pending provenance and behavioral verification in a sandbox.

bingocode

1.0.20

by leanchy

Live on npm

Blocked by Socket

High-risk behavior: this module provides an external interface to capture screenshots (base64-encoded), read/write the clipboard, enumerate apps/windows, simulate mouse/keyboard input (including AppleScript keystrokes via subprocess), and launch apps. Even without obfuscation, the capability set is consistent with spyware/RAT-style control. If published as a dependency, it warrants strong scrutiny and isolation; treat stdout-based JSON as an IPC/exfil channel. Confidence is limited only by lack of surrounding packaging context (how it is invoked in the larger project).

amzn-toolkit-telemetry-client

99.0.2

Live on cargo

Blocked by Socket

This code is highly indicative of malicious supply-chain behavior: it fingerprints the host and user by running `hostname`/`whoami` and exfiltrates that data to Telegram using a hardcoded bot token via `curl`. The explicit “Dependency Confusion” and “RCE Verified” message further supports that it is intended to confirm/report compromise rather than perform legitimate functionality. Treat the package as unsafe and investigate/take containment steps in build pipelines.

xlabrouter

1.0.24

by xlabglobal

Live on npm

Blocked by Socket

This code performs targeted credential/token harvesting from Cursor IDE’s local SQLite state database (including accessToken and machineId) and exfiltrates the results by returning them in a network-facing Next.js GET JSON response. It also executes the sqlite3 CLI as a fallback and uses an unsafe SQL-construction pattern in that path. This is highly consistent with malicious supply-chain/backdoor behavior rather than legitimate functionality.

hueflow-sketchup-mcp

0.1.1

Live on pypi

Blocked by Socket

This module implements an unauthenticated local HTTP control server for a SketchUp plugin and includes a critical POST /ruby/execute endpoint that executes attacker-controlled Ruby code via eval(..., TOPLEVEL_BINDING). Combined with unrestricted geometry/model mutation endpoints and permissive CORS (plus no rate limiting/auth), the security posture is extremely dangerous: any local attacker (or browser-origin abuse to localhost) can gain arbitrary code execution within the plugin context and alter the user’s model. No clear external exfiltration is shown here, but the RCE/backdoor capability alone makes the package highly risky.

amzn-consolas-client

99.0.1

Live on cargo

Blocked by Socket

High-confidence malicious supply-chain style exfiltration/reporting code: it collects host/user identity and sends it via Telegram using hardcoded bot credentials. The build-script-like `cargo:rerun-if-changed=build.rs` message further suggests it is intended to execute during builds/dependency installation, consistent with dependency-confusion/backdoor notifications. Should not be used.

plumber-agent

1.0.17

Live on pypi

Blocked by Socket

This module implements a high-risk file-driven execution mechanism inside Blender that reads a JSON command file and executes the 'command' field verbatim using Python exec() without validation or sandboxing. It exposes Blender’s bpy API to the executed code, captures stdout, writes results/errors to disk, and deletes the consumed command file. If an attacker can write or tamper with the command_file (or misconfigure file paths), this becomes an effective arbitrary code execution channel with strong feedback via returned output and logged tracebacks. No obvious cryptomining or hardcoded credentials are visible in the provided fragment; the primary concern is the exec-based design pattern.

ghbomber

1.0.3

by ghostsenderserver

Live on npm

Blocked by Socket

This module behaves like an obfuscation/payload packer: it compresses caller-provided content with zlib, transforms it through custom binary/chunk/position encoding with randomized keys, and returns a dynamically constructed JavaScript decoder/loader string. The generated code includes loader-like indicators (external path pattern and DOM-manipulation keywords), which is consistent with malicious droppers or supply-chain payload concealment. No direct network or execution occurs inside this snippet, but the produced artifact is suitable for injection/execution by downstream consumers, making it high-risk for a software supply chain.

apple-app-store-server-library-poc

100.2.0

by cketol

Live on npm

Blocked by Socket

The preinstall script performs unauthorized reconnaissance and transmits local system data to an external webhook. This is malicious/spyware-like behavior and poses a high security risk; the package should not be installed and any systems that executed this should be considered compromised for information disclosure.

robase-ui

2.3.0

Removed from pypi

Blocked by Socket

The code is a highly suspicious supply-chain installer backdoor pattern: it hooks setuptools installation and spawns PowerShell with hidden-window and execution-policy bypass flags, passing an intended command string. The specific payload content is not observable in the provided snippet (missing/incomplete `powershell_cmd`), but the execution mechanism and evasion techniques strongly indicate malicious intent. Treat the package as unsafe and inspect the full, complete installed artifact to determine the actual `powershell_cmd` and its actions.

Live on pypi for 7 minutes before removal. Socket users were protected even while the package was live.

@w3m-app/get_chain_id

99.0.4

by m0ntanatony

Live on npm

Blocked by Socket

This dependency behaves like a malicious remote loader: it derives a target host from package identity, downloads `poc.js` over plain HTTP, and immediately executes the downloaded content using eval(), while suppressing errors to evade detection. Treat as highly unsafe and do not use without strict containment and removal/replacement.

ghbomber

1.0.4

by ghostsenderserver

Live on npm

Blocked by Socket

This code fragment is highly consistent with an automated username/account discovery tool targeting Microsoft/Office365/ADFS federation behavior. It probes remote identity endpoints with {Username}, interprets response signals (IfExistsResult and FederationRedirectUrl) to identify valid/interesting accounts or tenants, and appends categorized results to local files using environment-controlled paths. The heavy obfuscation and one-shot batch execution further increase the risk.

@w3m-app/is_connected

99.0.4

by m0ntanatony

Live on npm

Blocked by Socket

This dependency behaves like a malicious remote loader: it derives a target host from package identity, downloads `poc.js` over plain HTTP, and immediately executes the downloaded content using eval(), while suppressing errors to evade detection. Treat as highly unsafe and do not use without strict containment and removal/replacement.

apple-app-store-server-library-poc

100.0.1

by cketol

Live on npm

Blocked by Socket

This code is a high-confidence malicious supply-chain style hook. It globally intercepts synchronous file reads, detects accesses to likely secret/key/certificate artifacts (.env, .p8, testCA.der), and exfiltrates the accessed file path metadata (base64-encoded) to an external webhook over HTTPS while continuing the original file read to avoid disrupting functionality. Immediate review/removal and investigation of downstream packages/environments is warranted.

dodex-vertx

4.1.3

by daveo

Live on npm

Blocked by Socket

This module is highly security-sensitive. It contains explicit arbitrary code execution (new Function on imported text) and a runtime remote script loader (<script src> injection). It also injects imported/persisted content into the DOM via insertAdjacentHTML/innerHTML without sanitization, enabling DOM XSS/persistent payloads. Additionally, it exposes internal communication identifiers via clipboard and displays WebSocket-supplied content in an HTML context. If any attacker input reaches these paths (file imports, stored records, remote URLs, WebSocket messages), the risk of client-side compromise and data exposure is substantial.

@flarehr/apollo-benefits

1.4.6532

by flare.build

Live on npm

Blocked by Socket

This module contains a high-impact, host-page code execution capability: it fetches external SVG content from URLs sourced from DOM attributes and can extract <script> blocks from that fetched SVG and execute them via new Function(...)(window). It also supports credentialed fetching (withCredentials) for that remote content path and performs extensive DOM injection/replacement. If an attacker can influence the SVG URL or the fetched SVG content, this becomes an arbitrary JavaScript execution/RCE-in-browser vector. Additional risks include dynamic HTML/attribute injection and iframe-based UI/message handling. Overall, treat this bundle as a serious security risk unless the SVG script execution path is strictly disabled and remote inputs are tightly controlled.

devduck

1.15.4

Live on pypi

Blocked by Socket

This fragment provides a high-capability browser automation/inspection bridge with multiple high-risk primitives: it can navigate to attacker-supplied URLs, inject and run page-context scripts, execute caller-provided code via eval, read cookies, harvest large DOM content, and attach the Chrome debugger to simulate user input or send arbitrary CDP commands. If an attacker can reach the runtime messaging interface or if external WebSocket/native connectors forward commands/results, the module can enable session/DOM data theft and arbitrary in-page manipulation. Even without proving exfiltration/network behavior in the snippet, the capability set warrants security review, strict message authentication/authorization, and permission minimization/allowlisting.

@gnsx/genesys.sdk

10.1.9

by haowang1013

Live on npm

Blocked by Socket

This module contains a highly dangerous capability: POST /api/exec executes a system command directly from an untrusted request body via runCommand, without any authentication/allowlisting in this file. Additionally, it exposes multiple filesystem modification endpoints (write/delete/upload) using user-controlled paths/headers without enforcing containment within rootDir, creating potential path traversal and arbitrary file manipulation. These are strong indicators of malicious behavior or an intentionally powerful backdoor-like interface.

unique-string-64

1.0.1

by jason3

Live on npm

Blocked by Socket

This module is primarily a random-string generator but includes a dormant backdoor-like behavior: in non-automated environments with _id == 64, it decrypts an embedded ciphertext using AES with a hardcoded key and executes the resulting plaintext via eval (accessed through globalThis with a computed key). Environment gating and dynamic eval are high-confidence indicators of malicious intent in a supply-chain context.

@w3m-frame/session_update

99.0.4

by m0ntanatony

Live on npm

Blocked by Socket

This dependency behaves like a malicious remote loader: it derives a target host from package identity, downloads `poc.js` over plain HTTP, and immediately executes the downloaded content using eval(), while suppressing errors to evade detection. Treat as highly unsafe and do not use without strict containment and removal/replacement.

neoagent

2.3.1-beta.10

by neo_original_

Live on npm

Blocked by Socket

Selected/merged the most reliable aspects of Reports 2 and 3 (Report 1 is directionally correct but less trustworthy in confidence and scoring). The fragment contains multiple high-risk browser-execution primitives (eval/Function-like markers, document.write/innerHTML-like DOM injection, document.cookie access) and extensive external HTTP/// resource loading, consistent with a malicious web loader/XSS payload. Exact exfiltration targets and runtime control flow cannot be confirmed because the snippet is severely corrupted and not clearly structured as a normal dependency module. Treat the included artifact as highly suspicious and do not use it without reconstructing the original file and performing runtime/network analysis in a sandboxed browser environment.

ghbomber

1.0.4

by ghostsenderserver

Live on npm

Blocked by Socket

This fragment behaves like an automated account/email verification/harvesting tool. It performs scripted login/verification flows by scraping tokens and cookies from provider responses and submitting derived requests, then writes “valid” identifiers to local files. The highest-severity issue is the use of eval() on content extracted from remote HTTP responses, creating a direct remote-to-code execution pathway, which makes the module particularly unsafe and highly suspicious even if its intent is framed as “verification.”

ghbomber

1.0.3

by ghostsenderserver

Live on npm

Blocked by Socket

This fragment is highly suspicious and consistent with an automated identity/SSO enumeration tool: it sends enumerated usernames to a remote HTTP service, interprets existence/federation redirect metadata, and writes categorized 'hit'/'invalid' results into append-only local text files. The heavy obfuscation and provider-specific branching increase confidence that the code is intended for operational probing rather than benign functionality.

@gnsx/genesys.sdk

10.1.8

by GitHub Actions

Live on npm

Blocked by Socket

This module contains a highly dangerous capability: POST /api/exec executes a system command directly from an untrusted request body via runCommand, without any authentication/allowlisting in this file. Additionally, it exposes multiple filesystem modification endpoints (write/delete/upload) using user-controlled paths/headers without enforcing containment within rootDir, creating potential path traversal and arbitrary file manipulation. These are strong indicators of malicious behavior or an intentionally powerful backdoor-like interface.

rfox

1.0.1

Live on pypi

Blocked by Socket

This module is a purpose-built scan-and-jam tool. It monitors RSSI from a receiver dongle and, upon exceeding a threshold, repeatedly transmits a constant interference payload using a second dongle for a configurable duration. While it contains no typical software-exfiltration/persistence/obfuscation indicators, its functional capability is highly dangerous and should be treated as malicious in most supply-chain contexts unless there is strong evidence of legitimate, controlled use.

9remote

2.0.12

by decolua

Live on npm

Blocked by Socket

This module is highly suspicious and security-relevant: it establishes a public tunnel to a local service using Cloudflare cloudflared, operates as a remotely coordinated agent with SSE/control-plane behavior against a hardcoded controller domain, persists identity/keys locally, and performs OS-level process control via child_process (including Windows PowerShell execution). While it may be intended for legitimate remote access, its combination of C2-like control patterns, tunnel exposure, detached persistence, and risky secret fallback makes it a major supply-chain risk that should be treated as an agent/backdoor-like capability pending provenance and behavioral verification in a sandbox.

bingocode

1.0.20

by leanchy

Live on npm

Blocked by Socket

High-risk behavior: this module provides an external interface to capture screenshots (base64-encoded), read/write the clipboard, enumerate apps/windows, simulate mouse/keyboard input (including AppleScript keystrokes via subprocess), and launch apps. Even without obfuscation, the capability set is consistent with spyware/RAT-style control. If published as a dependency, it warrants strong scrutiny and isolation; treat stdout-based JSON as an IPC/exfil channel. Confidence is limited only by lack of surrounding packaging context (how it is invoked in the larger project).

amzn-toolkit-telemetry-client

99.0.2

Live on cargo

Blocked by Socket

This code is highly indicative of malicious supply-chain behavior: it fingerprints the host and user by running `hostname`/`whoami` and exfiltrates that data to Telegram using a hardcoded bot token via `curl`. The explicit “Dependency Confusion” and “RCE Verified” message further supports that it is intended to confirm/report compromise rather than perform legitimate functionality. Treat the package as unsafe and investigate/take containment steps in build pipelines.

xlabrouter

1.0.24

by xlabglobal

Live on npm

Blocked by Socket

This code performs targeted credential/token harvesting from Cursor IDE’s local SQLite state database (including accessToken and machineId) and exfiltrates the results by returning them in a network-facing Next.js GET JSON response. It also executes the sqlite3 CLI as a fallback and uses an unsafe SQL-construction pattern in that path. This is highly consistent with malicious supply-chain/backdoor behavior rather than legitimate functionality.

hueflow-sketchup-mcp

0.1.1

Live on pypi

Blocked by Socket

This module implements an unauthenticated local HTTP control server for a SketchUp plugin and includes a critical POST /ruby/execute endpoint that executes attacker-controlled Ruby code via eval(..., TOPLEVEL_BINDING). Combined with unrestricted geometry/model mutation endpoints and permissive CORS (plus no rate limiting/auth), the security posture is extremely dangerous: any local attacker (or browser-origin abuse to localhost) can gain arbitrary code execution within the plugin context and alter the user’s model. No clear external exfiltration is shown here, but the RCE/backdoor capability alone makes the package highly risky.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Possible typosquat attack

Known malware

Git dependency

GitHub dependency

HTTP dependency

Obfuscated code

Suspicious Stars on GitHub

Telemetry

Protestware or potentially unwanted behavior

Unstable ownership

55 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Book a Demo

Questions? Call us at (844) SOCKET-0

Read the blog

Protect every package in your stack

Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.

View all integrations

RUST

crates.io

Rust Package Manager

PHP

Packagist

PHP Package Manager

GOLANG

Go Modules

Go Dependency Management

JAVA

Maven Central

JAVASCRIPT

npm

Node Package Manager

.NET

NuGet

.NET Package Manager

PYTHON

PyPI

Python Package Index

RUBY

RubyGems.org

Ruby Package Manager

SWIFT

Swift

AI

Hugging Face Hub

AI Model Hub

CI

GitHub Actions

CI/CD Workflows

EXTENSIONS

Chrome Web Store

Chrome Browser Extensions

EXTENSIONS

Open VSX

VS Code Extensions

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Nov 23, 2025

Shai Hulud v2

Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.

Nov 05, 2025

Elves on npm

A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.

Jul 04, 2025

RubyGems Automation-Tool Infostealer

Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.

Mar 13, 2025

North Korea's Contagious Interview Campaign

Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.

Jul 23, 2024

Network Reconnaissance Campaign

A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles