🚀 Big News:Socket Has Acquired Secure Annex.Learn More
Socket
Book a DemoSign in
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery
t

timmywil published 4.0.0

left-pad
s

stevemao published 1.3.0

react
r

react-bot published 19.2.5

We protect you from vulnerable and malicious packages

nexus-omni-agent

3.0.871

by baguscrypto321

Live on npm

Blocked by Socket

The /hack endpoint provides remote, user-controlled execution of recon/exploitation tooling and includes a critical bash -c fallback that evaluates attacker-controlled strings, turning the service into a remote command execution mechanism (even if containerized). Additionally, /leak returns hardcoded breach results marked as pwned=True without verification, suggesting deceptive/social-engineering intent. Overall, this module is high-risk and should be treated as unsafe to deploy; remove the bash -c fallback, enforce strict authentication/authorization, and restrict execution to a narrowly validated allowlist without returning raw stderr/stdout to clients.

r3f-mcp

0.4.0

by louannemur

Live on npm

Blocked by Socket

This module is highly dangerous due to an explicit remote runtime code injection mechanism (attacker-controlled code is dynamically evaluated and rendered as a React component), combined with additional data exfiltration capabilities (base64 screenshot capture and transmission) and broad remote introspection/control of scene/physics/performance. If the bridge is not strictly authenticated/authorized and production injection is not disabled, the security risk is severe.

@tscircuit/schematic-viewer

2.0.60

by seveibar

Live on npm

Blocked by Socket

This module has a high supply-chain/execution risk due to a runtime-decoded base64 Web Worker that performs a remote CDN import before simulation. Additionally, it injects circuit-derived SVG using dangerouslySetInnerHTML without visible sanitization, which can create an XSS-like risk if circuitJson is attacker-influenced. Treat this dependency/module as requiring urgent review, integrity pinning, removal of remote runtime imports, and strict sanitization/validation of any SVG derived from untrusted inputs.

@link-assistant/hive-mind

1.62.0

by GitHub Actions

Live on npm

Blocked by Socket

This code contains a critical supply-chain/runtime-compromise pattern: it fetches JavaScript from a public CDN at runtime and executes it with eval(), storing the resulting loader in globalThis.use. That yields a direct remote-to-local code execution pathway that can fully compromise the CLI process before any other logic runs. Other functions mostly handle validation and logging, but they inherit the risk because the runtime may already be attacker-controlled.

nexus-omni-agent

3.0.894

by baguscrypto321

Live on npm

Blocked by Socket

The /hack endpoint provides remote, user-controlled execution of recon/exploitation tooling and includes a critical bash -c fallback that evaluates attacker-controlled strings, turning the service into a remote command execution mechanism (even if containerized). Additionally, /leak returns hardcoded breach results marked as pwned=True without verification, suggesting deceptive/social-engineering intent. Overall, this module is high-risk and should be treated as unsafe to deploy; remove the bash -c fallback, enforce strict authentication/authorization, and restrict execution to a narrowly validated allowlist without returning raw stderr/stdout to clients.

blue-tap

2.6.5

Live on pypi

Blocked by Socket

This module is overtly designed to execute BLE exploitation/denial-of-service workflows (malformed SMP Pairing Request and repeated/double ATT MTU exchange) against a specified remote target. No stealth, credential theft, persistence, or data exfiltration is evident in the snippet; however, its explicit destructive offensive purpose makes it materially risky in a supply-chain context where it could be misused or invoked unintentionally. Review and restrict deployment to authorized security testing contexts, and consider dependency governance to prevent accidental inclusion in production tooling.

nexus-omni-agent

3.0.853

by baguscrypto321

Live on npm

Blocked by Socket

The /hack endpoint provides remote, user-controlled execution of recon/exploitation tooling and includes a critical bash -c fallback that evaluates attacker-controlled strings, turning the service into a remote command execution mechanism (even if containerized). Additionally, /leak returns hardcoded breach results marked as pwned=True without verification, suggesting deceptive/social-engineering intent. Overall, this module is high-risk and should be treated as unsafe to deploy; remove the bash -c fallback, enforce strict authentication/authorization, and restrict execution to a narrowly validated allowlist without returning raw stderr/stdout to clients.

nexus-omni-agent

3.0.917

by baguscrypto321

Live on npm

Blocked by Socket

The /hack endpoint provides remote, user-controlled execution of recon/exploitation tooling and includes a critical bash -c fallback that evaluates attacker-controlled strings, turning the service into a remote command execution mechanism (even if containerized). Additionally, /leak returns hardcoded breach results marked as pwned=True without verification, suggesting deceptive/social-engineering intent. Overall, this module is high-risk and should be treated as unsafe to deploy; remove the bash -c fallback, enforce strict authentication/authorization, and restrict execution to a narrowly validated allowlist without returning raw stderr/stdout to clients.

stardeploy

1.0.2026.501-beta0737

by 新生命开发团队

Live on nuget

Blocked by Socket

No definitive proof of stealthy malware (e.g., keylogging/reverse shell) is present in the provided fragment. However, it contains a clear high-impact remote update pipeline: server-provided upgrade metadata (Source, Preinstall, Executor, Force) drives download, extraction, script/command execution, file updating, and restart/self-termination. This creates a strong supply-chain/code-execution risk if upgrade authenticity and command/script constraints are not cryptographically enforced and strictly validated. Additionally, the framework’s action-driven reflection dispatch and potential token/system-info exposure increase overall risk and warrant hardening (authZ for RPC actions, signature verification for upgrades, strict URL allowlisting, and redaction of sensitive fields in logs/responses).

9router

0.4.12

by decolua

Live on npm

Blocked by Socket

This code defines an API for controlling a likely MITM/DNS interception tool (startServer/stopServer, enable/disable DNS, trustCert) using sensitive inputs (apiKey/sudoPassword) and exposing MITM state (running/pid/certTrusted/dnsStatus). It also executes a system command on Windows to detect admin status. Although some logic is in external modules not shown, the call sites and endpoint naming strongly indicate potential malicious traffic interception capabilities. Recommend treating the dependency as high-risk and auditing the implementations of startServer/enableToolDNS/trustCert.

9router

0.4.12

by decolua

Live on npm

Blocked by Socket

This dependency fragment is a high-confidence malicious MITM and targeted redirection component. It loads a custom root CA and forges per-domain TLS certificates via SNICallback, proxies/relays HTTPS traffic with upstream TLS verification disabled, modifies system hosts/DNS and flushes caches to route selected domains to the local proxy, and attempts to hijack port 443 by killing existing listeners. Even without seeing interceptor payload handling code, the infrastructure is sufficient to enable interception and manipulation of sensitive HTTPS traffic.

reincarnation

1.2.7

Live on pypi

Blocked by Socket

This code fragment is best classified as highly malicious/backdoor-like: it includes multiple exec/compile paths for arbitrary code execution, a clear remote download-and-exec primitive, unsafe dill deserialization, and import system hijacking via sys.meta_path/sys.modules manipulation, plus concealment (process title spoofing) and sabotage (pip uninstall). Treat the package as unsafe and do not install or execute without comprehensive sandboxing and full-package behavioral verification.

@evomap/evolver

1.78.0

by autogame-17

Live on npm

Blocked by Socket

This code fragment exhibits strong supply-chain “agent” characteristics: it is heavily obfuscated, derives hash/signature-based credential material from caller inputs, executes a local subprocess to obtain/validate token-like data, and sends authenticated requests to a configurable remote hub. It also persists offline state to disk and uses environment variables to gate/alter behavior. Even without proof of classic malware behaviors (e.g., reverse shell), the combination of subprocess staging + authenticated remote communication + persistent token/offline management represents a significant security risk and is suspicious in a dependency context.

nerv-viper

3.6.8

by angshurpita777

Live on npm

Blocked by Socket

This module is strongly oriented toward offensive exploitation planning: it converts vulnerability evidence into structured, multi-stage attack paths with explicit attacker actions (session/token theft, credential exfiltration, SSRF to cloud metadata/IAM credential harvesting, and RCE-to-persistence/backdoor descriptions) and provides a static 'confirmation' heuristic suitable for automation. While actual execution/payload delivery is not present in the shown fragment, the exported/related execution-oriented functions referenced by the module indicate likely end-to-end exploit workflow support elsewhere in the package. Overall, the security risk is high for any production or third-party environment integration.

tianlong-toolkit

1.7.0

Live on pypi

Blocked by Socket

This fragment contains multiple high-risk primitives commonly seen in malicious tooling: arbitrary Python execution (exec), arbitrary shell execution (subprocess with shell=True), uncontrolled filesystem reads from a user-influenced path component (/data/{filename}), and caller-controlled outbound HTTP requests plus internal localhost probing. Combined with a hardcoded credential-like secret, the overall capability set is strongly consistent with backdoor-like behavior. Even though one line in fetch_url appears syntactically/semantically incorrect (requests.get(url).tex), the dangerous intent and core execution/network/filesystem primitives are present.

@antglobal/antom-web-sdk-simpler

0.0.1777452876-dev.5

by marmot.antgroup

Live on npm

Blocked by Socket

This code fragment is highly consistent with an obfuscated browser fingerprinting/telemetry collector that gathers extensive client environment signals (navigator/screen/DOM/canvas/WebGL/WebRTC/fonts/media/storage/events) and then encrypts/packages that data for network reporting (fetch/POST to a report endpoint like '/report.js'). The heavy obfuscation and crypto/WASM pipeline strongly suggest non-benign behavior (privacy-invasive tracking/spyware-like telemetry) rather than a typical JS dependency.

nexus-omni-agent

3.0.916

by baguscrypto321

Live on npm

Blocked by Socket

The /hack endpoint provides remote, user-controlled execution of recon/exploitation tooling and includes a critical bash -c fallback that evaluates attacker-controlled strings, turning the service into a remote command execution mechanism (even if containerized). Additionally, /leak returns hardcoded breach results marked as pwned=True without verification, suggesting deceptive/social-engineering intent. Overall, this module is high-risk and should be treated as unsafe to deploy; remove the bash -c fallback, enforce strict authentication/authorization, and restrict execution to a narrowly validated allowlist without returning raw stderr/stdout to clients.

@link-assistant/hive-mind

1.62.0

by GitHub Actions

Live on npm

Blocked by Socket

High security alert. The module performs a runtime fetch of remote JavaScript from a public CDN and immediately executes it via eval to obtain a global loader, creating a direct supply-chain/RCE path. It then uses the dynamically obtained command runner to execute OS commands for starting and querying isolated sessions, with caller-controlled command/args interpolated into a command line (potential command injection depending on runner escaping). No explicit credential theft or data exfiltration is visible in this snippet, but the presence of eval+remote code execution makes the effective malware risk substantial and warrants urgent review/replacement with integrity-checked, statically imported dependencies and strict argv handling.

nexus-omni-agent

3.0.968

by baguscrypto321

Live on npm

Blocked by Socket

The /hack endpoint provides remote, user-controlled execution of recon/exploitation tooling and includes a critical bash -c fallback that evaluates attacker-controlled strings, turning the service into a remote command execution mechanism (even if containerized). Additionally, /leak returns hardcoded breach results marked as pwned=True without verification, suggesting deceptive/social-engineering intent. Overall, this module is high-risk and should be treated as unsafe to deploy; remove the bash -c fallback, enforce strict authentication/authorization, and restrict execution to a narrowly validated allowlist without returning raw stderr/stdout to clients.

@sleep2agi/agent-network

2.0.0-preview.48

by vansin

Live on npm

Blocked by Socket

Suspicious high-risk agent/orchestration pattern. The code implements a resilient, long-lived, SSE/JSON-RPC communication hub with optional Bearer-token authentication, heartbeats, resume handling, and server-driven event parsing that triggers further remote RPC actions (ack/inbox/status/reply). It also imports high-risk local capabilities (child_process exec/spawn and filesystem write/remove/rename/chmod helpers), which commonly accompany agent malware in full-package context. Malware intent is not proven from this truncated fragment alone, but the design strongly warrants security review, provenance verification, and sandboxed analysis of the remaining file/module paths.

@a5c-ai/babysitter-openclaw

5.0.1-staging.05a8c224

by tmuskal

Live on npm

Blocked by Socket

This code establishes a strong supply-chain/sandbox-break capability by executing a local bash hook at session start and directly passing both serialized caller context (stdin) and essentially the full parent environment (env) to that script, while also suppressing errors. While the snippet itself shows no explicit malicious behavior beyond delegation, the data exposure (context + process.env) and silent error handling make this pattern high-risk and warrant review of the hooks/babysitter-proxied-session-start.sh behavior.

nexus-omni-agent

3.0.905

by baguscrypto321

Live on npm

Blocked by Socket

The /hack endpoint provides remote, user-controlled execution of recon/exploitation tooling and includes a critical bash -c fallback that evaluates attacker-controlled strings, turning the service into a remote command execution mechanism (even if containerized). Additionally, /leak returns hardcoded breach results marked as pwned=True without verification, suggesting deceptive/social-engineering intent. Overall, this module is high-risk and should be treated as unsafe to deploy; remove the bash -c fallback, enforce strict authentication/authorization, and restrict execution to a narrowly validated allowlist without returning raw stderr/stdout to clients.

stardeploy

1.0.2026.501

by 新生命开发团队

Live on nuget

Blocked by Socket

No definitive proof of stealthy malware (e.g., keylogging/reverse shell) is present in the provided fragment. However, it contains a clear high-impact remote update pipeline: server-provided upgrade metadata (Source, Preinstall, Executor, Force) drives download, extraction, script/command execution, file updating, and restart/self-termination. This creates a strong supply-chain/code-execution risk if upgrade authenticity and command/script constraints are not cryptographically enforced and strictly validated. Additionally, the framework’s action-driven reflection dispatch and potential token/system-info exposure increase overall risk and warrant hardening (authZ for RPC actions, signature verification for upgrades, strict URL allowlisting, and redaction of sensitive fields in logs/responses).

@aerostack/gateway

0.24.7

by aerostack

Live on npm

Blocked by Socket

This code primarily implements macOS persistence: it generates LaunchAgent plist files and uses launchctl to bootstrap/load them immediately, with RunAtLoad and KeepAlive (crash restart) for two Node scripts. While the snippet itself shows no direct exfiltration or overt malicious payloads, the persistence/auto-execution capability is high impact and becomes potentially malicious if the provided nodeBin/connectorJs/execDaemonJs are attacker-controlled or can be swapped/tampered with. Additionally, it constructs plist XML via unescaped template interpolation, which can increase configuration/argument manipulation risk if inputs are not fully trusted.

uefn-mcp

0.1.6

Live on pypi

Blocked by Socket

This module is a high-impact backdoor-like service: it runs attacker-supplied Python code over an unauthenticated localhost HTTP endpoint using exec(code, ctx) in the Unreal/UEFN editor process context, while also exposing logs/events/selection data over HTTP. The combination of arbitrary in-process execution, privileged API access, and unauthenticated network surface presents an extremely serious security risk. Malware intent is highly likely given the explicit RCE mechanism and telemetry forwarding.

nexus-omni-agent

3.0.871

by baguscrypto321

Live on npm

Blocked by Socket

The /hack endpoint provides remote, user-controlled execution of recon/exploitation tooling and includes a critical bash -c fallback that evaluates attacker-controlled strings, turning the service into a remote command execution mechanism (even if containerized). Additionally, /leak returns hardcoded breach results marked as pwned=True without verification, suggesting deceptive/social-engineering intent. Overall, this module is high-risk and should be treated as unsafe to deploy; remove the bash -c fallback, enforce strict authentication/authorization, and restrict execution to a narrowly validated allowlist without returning raw stderr/stdout to clients.

r3f-mcp

0.4.0

by louannemur

Live on npm

Blocked by Socket

This module is highly dangerous due to an explicit remote runtime code injection mechanism (attacker-controlled code is dynamically evaluated and rendered as a React component), combined with additional data exfiltration capabilities (base64 screenshot capture and transmission) and broad remote introspection/control of scene/physics/performance. If the bridge is not strictly authenticated/authorized and production injection is not disabled, the security risk is severe.

@tscircuit/schematic-viewer

2.0.60

by seveibar

Live on npm

Blocked by Socket

This module has a high supply-chain/execution risk due to a runtime-decoded base64 Web Worker that performs a remote CDN import before simulation. Additionally, it injects circuit-derived SVG using dangerouslySetInnerHTML without visible sanitization, which can create an XSS-like risk if circuitJson is attacker-influenced. Treat this dependency/module as requiring urgent review, integrity pinning, removal of remote runtime imports, and strict sanitization/validation of any SVG derived from untrusted inputs.

@link-assistant/hive-mind

1.62.0

by GitHub Actions

Live on npm

Blocked by Socket

This code contains a critical supply-chain/runtime-compromise pattern: it fetches JavaScript from a public CDN at runtime and executes it with eval(), storing the resulting loader in globalThis.use. That yields a direct remote-to-local code execution pathway that can fully compromise the CLI process before any other logic runs. Other functions mostly handle validation and logging, but they inherit the risk because the runtime may already be attacker-controlled.

nexus-omni-agent

3.0.894

by baguscrypto321

Live on npm

Blocked by Socket

The /hack endpoint provides remote, user-controlled execution of recon/exploitation tooling and includes a critical bash -c fallback that evaluates attacker-controlled strings, turning the service into a remote command execution mechanism (even if containerized). Additionally, /leak returns hardcoded breach results marked as pwned=True without verification, suggesting deceptive/social-engineering intent. Overall, this module is high-risk and should be treated as unsafe to deploy; remove the bash -c fallback, enforce strict authentication/authorization, and restrict execution to a narrowly validated allowlist without returning raw stderr/stdout to clients.

blue-tap

2.6.5

Live on pypi

Blocked by Socket

This module is overtly designed to execute BLE exploitation/denial-of-service workflows (malformed SMP Pairing Request and repeated/double ATT MTU exchange) against a specified remote target. No stealth, credential theft, persistence, or data exfiltration is evident in the snippet; however, its explicit destructive offensive purpose makes it materially risky in a supply-chain context where it could be misused or invoked unintentionally. Review and restrict deployment to authorized security testing contexts, and consider dependency governance to prevent accidental inclusion in production tooling.

nexus-omni-agent

3.0.853

by baguscrypto321

Live on npm

Blocked by Socket

The /hack endpoint provides remote, user-controlled execution of recon/exploitation tooling and includes a critical bash -c fallback that evaluates attacker-controlled strings, turning the service into a remote command execution mechanism (even if containerized). Additionally, /leak returns hardcoded breach results marked as pwned=True without verification, suggesting deceptive/social-engineering intent. Overall, this module is high-risk and should be treated as unsafe to deploy; remove the bash -c fallback, enforce strict authentication/authorization, and restrict execution to a narrowly validated allowlist without returning raw stderr/stdout to clients.

nexus-omni-agent

3.0.917

by baguscrypto321

Live on npm

Blocked by Socket

The /hack endpoint provides remote, user-controlled execution of recon/exploitation tooling and includes a critical bash -c fallback that evaluates attacker-controlled strings, turning the service into a remote command execution mechanism (even if containerized). Additionally, /leak returns hardcoded breach results marked as pwned=True without verification, suggesting deceptive/social-engineering intent. Overall, this module is high-risk and should be treated as unsafe to deploy; remove the bash -c fallback, enforce strict authentication/authorization, and restrict execution to a narrowly validated allowlist without returning raw stderr/stdout to clients.

stardeploy

1.0.2026.501-beta0737

by 新生命开发团队

Live on nuget

Blocked by Socket

No definitive proof of stealthy malware (e.g., keylogging/reverse shell) is present in the provided fragment. However, it contains a clear high-impact remote update pipeline: server-provided upgrade metadata (Source, Preinstall, Executor, Force) drives download, extraction, script/command execution, file updating, and restart/self-termination. This creates a strong supply-chain/code-execution risk if upgrade authenticity and command/script constraints are not cryptographically enforced and strictly validated. Additionally, the framework’s action-driven reflection dispatch and potential token/system-info exposure increase overall risk and warrant hardening (authZ for RPC actions, signature verification for upgrades, strict URL allowlisting, and redaction of sensitive fields in logs/responses).

9router

0.4.12

by decolua

Live on npm

Blocked by Socket

This code defines an API for controlling a likely MITM/DNS interception tool (startServer/stopServer, enable/disable DNS, trustCert) using sensitive inputs (apiKey/sudoPassword) and exposing MITM state (running/pid/certTrusted/dnsStatus). It also executes a system command on Windows to detect admin status. Although some logic is in external modules not shown, the call sites and endpoint naming strongly indicate potential malicious traffic interception capabilities. Recommend treating the dependency as high-risk and auditing the implementations of startServer/enableToolDNS/trustCert.

9router

0.4.12

by decolua

Live on npm

Blocked by Socket

This dependency fragment is a high-confidence malicious MITM and targeted redirection component. It loads a custom root CA and forges per-domain TLS certificates via SNICallback, proxies/relays HTTPS traffic with upstream TLS verification disabled, modifies system hosts/DNS and flushes caches to route selected domains to the local proxy, and attempts to hijack port 443 by killing existing listeners. Even without seeing interceptor payload handling code, the infrastructure is sufficient to enable interception and manipulation of sensitive HTTPS traffic.

reincarnation

1.2.7

Live on pypi

Blocked by Socket

This code fragment is best classified as highly malicious/backdoor-like: it includes multiple exec/compile paths for arbitrary code execution, a clear remote download-and-exec primitive, unsafe dill deserialization, and import system hijacking via sys.meta_path/sys.modules manipulation, plus concealment (process title spoofing) and sabotage (pip uninstall). Treat the package as unsafe and do not install or execute without comprehensive sandboxing and full-package behavioral verification.

@evomap/evolver

1.78.0

by autogame-17

Live on npm

Blocked by Socket

This code fragment exhibits strong supply-chain “agent” characteristics: it is heavily obfuscated, derives hash/signature-based credential material from caller inputs, executes a local subprocess to obtain/validate token-like data, and sends authenticated requests to a configurable remote hub. It also persists offline state to disk and uses environment variables to gate/alter behavior. Even without proof of classic malware behaviors (e.g., reverse shell), the combination of subprocess staging + authenticated remote communication + persistent token/offline management represents a significant security risk and is suspicious in a dependency context.

nerv-viper

3.6.8

by angshurpita777

Live on npm

Blocked by Socket

This module is strongly oriented toward offensive exploitation planning: it converts vulnerability evidence into structured, multi-stage attack paths with explicit attacker actions (session/token theft, credential exfiltration, SSRF to cloud metadata/IAM credential harvesting, and RCE-to-persistence/backdoor descriptions) and provides a static 'confirmation' heuristic suitable for automation. While actual execution/payload delivery is not present in the shown fragment, the exported/related execution-oriented functions referenced by the module indicate likely end-to-end exploit workflow support elsewhere in the package. Overall, the security risk is high for any production or third-party environment integration.

tianlong-toolkit

1.7.0

Live on pypi

Blocked by Socket

This fragment contains multiple high-risk primitives commonly seen in malicious tooling: arbitrary Python execution (exec), arbitrary shell execution (subprocess with shell=True), uncontrolled filesystem reads from a user-influenced path component (/data/{filename}), and caller-controlled outbound HTTP requests plus internal localhost probing. Combined with a hardcoded credential-like secret, the overall capability set is strongly consistent with backdoor-like behavior. Even though one line in fetch_url appears syntactically/semantically incorrect (requests.get(url).tex), the dangerous intent and core execution/network/filesystem primitives are present.

@antglobal/antom-web-sdk-simpler

0.0.1777452876-dev.5

by marmot.antgroup

Live on npm

Blocked by Socket

This code fragment is highly consistent with an obfuscated browser fingerprinting/telemetry collector that gathers extensive client environment signals (navigator/screen/DOM/canvas/WebGL/WebRTC/fonts/media/storage/events) and then encrypts/packages that data for network reporting (fetch/POST to a report endpoint like '/report.js'). The heavy obfuscation and crypto/WASM pipeline strongly suggest non-benign behavior (privacy-invasive tracking/spyware-like telemetry) rather than a typical JS dependency.

nexus-omni-agent

3.0.916

by baguscrypto321

Live on npm

Blocked by Socket

The /hack endpoint provides remote, user-controlled execution of recon/exploitation tooling and includes a critical bash -c fallback that evaluates attacker-controlled strings, turning the service into a remote command execution mechanism (even if containerized). Additionally, /leak returns hardcoded breach results marked as pwned=True without verification, suggesting deceptive/social-engineering intent. Overall, this module is high-risk and should be treated as unsafe to deploy; remove the bash -c fallback, enforce strict authentication/authorization, and restrict execution to a narrowly validated allowlist without returning raw stderr/stdout to clients.

@link-assistant/hive-mind

1.62.0

by GitHub Actions

Live on npm

Blocked by Socket

High security alert. The module performs a runtime fetch of remote JavaScript from a public CDN and immediately executes it via eval to obtain a global loader, creating a direct supply-chain/RCE path. It then uses the dynamically obtained command runner to execute OS commands for starting and querying isolated sessions, with caller-controlled command/args interpolated into a command line (potential command injection depending on runner escaping). No explicit credential theft or data exfiltration is visible in this snippet, but the presence of eval+remote code execution makes the effective malware risk substantial and warrants urgent review/replacement with integrity-checked, statically imported dependencies and strict argv handling.

nexus-omni-agent

3.0.968

by baguscrypto321

Live on npm

Blocked by Socket

The /hack endpoint provides remote, user-controlled execution of recon/exploitation tooling and includes a critical bash -c fallback that evaluates attacker-controlled strings, turning the service into a remote command execution mechanism (even if containerized). Additionally, /leak returns hardcoded breach results marked as pwned=True without verification, suggesting deceptive/social-engineering intent. Overall, this module is high-risk and should be treated as unsafe to deploy; remove the bash -c fallback, enforce strict authentication/authorization, and restrict execution to a narrowly validated allowlist without returning raw stderr/stdout to clients.

@sleep2agi/agent-network

2.0.0-preview.48

by vansin

Live on npm

Blocked by Socket

Suspicious high-risk agent/orchestration pattern. The code implements a resilient, long-lived, SSE/JSON-RPC communication hub with optional Bearer-token authentication, heartbeats, resume handling, and server-driven event parsing that triggers further remote RPC actions (ack/inbox/status/reply). It also imports high-risk local capabilities (child_process exec/spawn and filesystem write/remove/rename/chmod helpers), which commonly accompany agent malware in full-package context. Malware intent is not proven from this truncated fragment alone, but the design strongly warrants security review, provenance verification, and sandboxed analysis of the remaining file/module paths.

@a5c-ai/babysitter-openclaw

5.0.1-staging.05a8c224

by tmuskal

Live on npm

Blocked by Socket

This code establishes a strong supply-chain/sandbox-break capability by executing a local bash hook at session start and directly passing both serialized caller context (stdin) and essentially the full parent environment (env) to that script, while also suppressing errors. While the snippet itself shows no explicit malicious behavior beyond delegation, the data exposure (context + process.env) and silent error handling make this pattern high-risk and warrant review of the hooks/babysitter-proxied-session-start.sh behavior.

nexus-omni-agent

3.0.905

by baguscrypto321

Live on npm

Blocked by Socket

The /hack endpoint provides remote, user-controlled execution of recon/exploitation tooling and includes a critical bash -c fallback that evaluates attacker-controlled strings, turning the service into a remote command execution mechanism (even if containerized). Additionally, /leak returns hardcoded breach results marked as pwned=True without verification, suggesting deceptive/social-engineering intent. Overall, this module is high-risk and should be treated as unsafe to deploy; remove the bash -c fallback, enforce strict authentication/authorization, and restrict execution to a narrowly validated allowlist without returning raw stderr/stdout to clients.

stardeploy

1.0.2026.501

by 新生命开发团队

Live on nuget

Blocked by Socket

No definitive proof of stealthy malware (e.g., keylogging/reverse shell) is present in the provided fragment. However, it contains a clear high-impact remote update pipeline: server-provided upgrade metadata (Source, Preinstall, Executor, Force) drives download, extraction, script/command execution, file updating, and restart/self-termination. This creates a strong supply-chain/code-execution risk if upgrade authenticity and command/script constraints are not cryptographically enforced and strictly validated. Additionally, the framework’s action-driven reflection dispatch and potential token/system-info exposure increase overall risk and warrant hardening (authZ for RPC actions, signature verification for upgrades, strict URL allowlisting, and redaction of sensitive fields in logs/responses).

@aerostack/gateway

0.24.7

by aerostack

Live on npm

Blocked by Socket

This code primarily implements macOS persistence: it generates LaunchAgent plist files and uses launchctl to bootstrap/load them immediately, with RunAtLoad and KeepAlive (crash restart) for two Node scripts. While the snippet itself shows no direct exfiltration or overt malicious payloads, the persistence/auto-execution capability is high impact and becomes potentially malicious if the provided nodeBin/connectorJs/execDaemonJs are attacker-controlled or can be swapped/tampered with. Additionally, it constructs plist XML via unescaped template interpolation, which can increase configuration/argument manipulation risk if inputs are not fully trusted.

uefn-mcp

0.1.6

Live on pypi

Blocked by Socket

This module is a high-impact backdoor-like service: it runs attacker-supplied Python code over an unauthenticated localhost HTTP endpoint using exec(code, ctx) in the Unreal/UEFN editor process context, while also exposing logs/events/selection data over HTTP. The combination of arbitrary in-process execution, privileged API access, and unauthenticated network surface presents an extremely serious security risk. Malware intent is highly likely given the explicit RCE mechanism and telemetry forwarding.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Possible typosquat attack

Known malware

Git dependency

GitHub dependency

HTTP dependency

Obfuscated code

Suspicious Stars on GitHub

Telemetry

Protestware or potentially unwanted behavior

Unstable ownership

56 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Book a Demo

Questions? Call us at (844) SOCKET-0

Read the blog

Protect every package in your stack

Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.

View all integrations

RUST

crates.io

Rust Package Manager

PHP

Packagist

PHP Package Manager

GOLANG

Go Modules

Go Dependency Management

JAVA

Maven Central

JAVASCRIPT

npm

Node Package Manager

.NET

NuGet

.NET Package Manager

PYTHON

PyPI

Python Package Index

RUBY

RubyGems.org

Ruby Package Manager

SWIFT

Swift

AI

Hugging Face Hub

AI Model Hub

CI

GitHub Actions

CI/CD Workflows

EXTENSIONS

Chrome Web Store

Chrome Browser Extensions

EXTENSIONS

Open VSX

VS Code Extensions

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Nov 23, 2025

Shai Hulud v2

Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.

Nov 05, 2025

Elves on npm

A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.

Jul 04, 2025

RubyGems Automation-Tool Infostealer

Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.

Mar 13, 2025

North Korea's Contagious Interview Campaign

Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.

Jul 23, 2024

Network Reconnaissance Campaign

A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles