Launch Week Day 5: Introducing Reachability for PHP.Learn More
Socket
Book a DemoSign in
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery
t

timmywil published 4.0.0

left-pad
s

stevemao published 1.3.0

react
r

react-bot published 19.2.5

We protect you from vulnerable and malicious packages

neoagent

2.3.1-beta.10

by neo_original_

Live on npm

Blocked by Socket

Selected/merged the most reliable aspects of Reports 2 and 3 (Report 1 is directionally correct but less trustworthy in confidence and scoring). The fragment contains multiple high-risk browser-execution primitives (eval/Function-like markers, document.write/innerHTML-like DOM injection, document.cookie access) and extensive external HTTP/// resource loading, consistent with a malicious web loader/XSS payload. Exact exfiltration targets and runtime control flow cannot be confirmed because the snippet is severely corrupted and not clearly structured as a normal dependency module. Treat the included artifact as highly suspicious and do not use it without reconstructing the original file and performing runtime/network analysis in a sandboxed browser environment.

@w3m-app/is_connected

99.0.4

by m0ntanatony

Live on npm

Blocked by Socket

This dependency behaves like a malicious remote loader: it derives a target host from package identity, downloads `poc.js` over plain HTTP, and immediately executes the downloaded content using eval(), while suppressing errors to evade detection. Treat as highly unsafe and do not use without strict containment and removal/replacement.

azure-jobs

0.1.27

Live on pypi

Blocked by Socket

Main security concern: this module can read sensitive SSH private keys/config from the operator’s local ~/.ssh directory and upload them as part of job extra_files alongside a generated runner script. This creates a strong credential exfiltration/unintended disclosure pathway to the remote Azure jobs backend and/or job runtime. Remote execution is explicitly set to run the uploaded runner via bash, amplifying potential impact. Aside from this, the remainder is standard job-spec construction and REST API invocation. Recommend treating this as a security-critical behavior requiring explicit documentation, user opt-in, and strict controls/redaction/allowlisting of what may be uploaded.

devduck

1.15.2

Live on pypi

Blocked by Socket

This module is a security-sensitive distributed control/coordination component that can execute DevDuck agent logic based directly on untrusted UDP multicast “command” text, then streams and returns results/errors over the network. There is no authentication, authorization, or command allowlisting in this module, and it also prints untrusted streamed output to stdout. In hostile or multi-tenant network environments, it should be considered a high-risk remote-trigger capability and reviewed/segmented with strong access controls (e.g., authenticated transport, peer allowlisting, and strict command validation).

apple-app-store-server-library-poc

133.7.0

by cketol

Live on npm

Blocked by Socket

This code is a high-confidence malicious supply-chain style hook. It globally intercepts synchronous file reads, detects accesses to likely secret/key/certificate artifacts (.env, .p8, testCA.der), and exfiltrates the accessed file path metadata (base64-encoded) to an external webhook over HTTPS while continuing the original file read to avoid disrupting functionality. Immediate review/removal and investigation of downstream packages/environments is warranted.

devduck

1.15.4

Live on pypi

Blocked by Socket

This module is a security-sensitive distributed control/coordination component that can execute DevDuck agent logic based directly on untrusted UDP multicast “command” text, then streams and returns results/errors over the network. There is no authentication, authorization, or command allowlisting in this module, and it also prints untrusted streamed output to stdout. In hostile or multi-tenant network environments, it should be considered a high-risk remote-trigger capability and reviewed/segmented with strong access controls (e.g., authenticated transport, peer allowlisting, and strict command validation).

ghbomber

1.0.3

by ghostsenderserver

Live on npm

Blocked by Socket

This configuration is for an email-sending/automation tool with many features commonly used by phishing and spam operators (bulk SMTP, IP rotation, obfuscation, disguising attachments, proxy support). The JSON itself is not executable code or obviously obfuscated, but it enables a high-risk activity (bulk delivery of potentially deceptive emails). Treat this package and its upstream application as high-risk for abuse; if you did not expect or authorize mass-mailing functionality, do not deploy it and audit surrounding code. If present in a public package, consider it suspicious and review repository history and maintainers.

uol-simple-api-futebol

4.6.0

by icleitoncosta

Live on npm

Blocked by Socket

The code is primarily a sports-API fixture aggregator with local caching and channel enrichment. However, it contains a clear high-severity supply-chain exfiltration mechanism: `prepareCacheMatchs(url)` transmits the entire `process.env` to a hardcoded external endpoint over plain HTTP, which can leak credentials and other sensitive environment data. This warrants treating the dependency as untrusted until the helper’s invocation/intent is fully verified and the endpoint behavior is confirmed/removed.

plumber-agent

1.0.17

Live on pypi

Blocked by Socket

This module implements a high-risk file-driven execution mechanism inside Blender that reads a JSON command file and executes the 'command' field verbatim using Python exec() without validation or sandboxing. It exposes Blender’s bpy API to the executed code, captures stdout, writes results/errors to disk, and deletes the consumed command file. If an attacker can write or tamper with the command_file (or misconfigure file paths), this becomes an effective arbitrary code execution channel with strong feedback via returned output and logged tracebacks. No obvious cryptomining or hardcoded credentials are visible in the provided fragment; the primary concern is the exec-based design pattern.

keepai

0.9.15

Live on pypi

Blocked by Socket

The fragment is highly capable of local terminal manipulation: it injects keystrokes/text into Terminal via Quartz, reads terminal tab contents (screen/content capture), and executes arbitrary shell commands in Terminal via an AppleScript “do script” that ultimately runs 'bash' (constructed from external cmd/cwd). It also performs runtime installation of a PyPI package (pyobjc-framework-Quartz), introducing dependency integrity risk. No explicit network exfiltration is present in this snippet, but the local command execution/input injection/data capture capabilities make this module security-sensitive and plausibly malicious in an abuse scenario.

@valbuild/ui

0.95.0

by GitHub Actions

Live on npm

Blocked by Socket

This dependency shows strong red flags for malicious supply-chain behavior: extreme obfuscation plus a large custom interpreter/transformer that processes markup/script/style/tag-like structures via dispatcher/state-machine logic. Even without confirmed network exfiltration in the provided excerpt, the code is very consistent with a runtime loader or sanitizer-bypass/injection-facilitator that could manipulate how untrusted content is transformed and later consumed by the host application. Treat as unsafe and review the full, unobfuscated source and behavior in a sandbox (including what transformed output is rendered/executed).

plumber-agent

1.0.17

Live on pypi

Blocked by Socket

This module is a high-risk command dispatcher that reads untrusted JSON from a filesystem queue and executes the 'command' field using unrestricted Python exec() with the nuke API available. If the command file (or its path) can be influenced by an attacker, it effectively functions as an RCE/backdoor mechanism. It also captures and returns stdout and logs command previews/tracebacks, increasing the likelihood of data exposure. No explicit malicious payload is present in this fragment, but the design itself is strongly suspicious and dangerous for any dependency shipped to untrusted environments.

apple-app-store-server-library-poc

100.1.0

by cketol

Live on npm

Blocked by Socket

This code is a high-confidence malicious supply-chain style hook. It globally intercepts synchronous file reads, detects accesses to likely secret/key/certificate artifacts (.env, .p8, testCA.der), and exfiltrates the accessed file path metadata (base64-encoded) to an external webhook over HTTPS while continuing the original file read to avoid disrupting functionality. Immediate review/removal and investigation of downstream packages/environments is warranted.

hacker-bob-cc

1.1.6

by vmihalis

Live on npm

Blocked by Socket

This code is high-risk automation that bypasses multiple CAPTCHA providers by using an external solving service and programmatically injecting solver tokens into the page. It also harvests and exports sensitive authentication/session data (cookies and token-bearing localStorage/sessionStorage entries) and even constructs an Authorization Bearer header from extracted tokens. While it does not appear to implement classic system-level malware behaviors in the shown fragment, its functional behavior aligns strongly with account-abuse/fraud tooling and creates significant data leakage risk through output/logging. Treat as a serious supply-chain security concern and restrict/avoid deployment unless its use is strictly controlled for legitimate, authorized testing with strong secret-handling and log-sanitization.

keepai

0.9.15

Live on pypi

Blocked by Socket

The fragment is highly capable of local terminal manipulation: it injects keystrokes/text into Terminal via Quartz, reads terminal tab contents (screen/content capture), and executes arbitrary shell commands in Terminal via an AppleScript “do script” that ultimately runs 'bash' (constructed from external cmd/cwd). It also performs runtime installation of a PyPI package (pyobjc-framework-Quartz), introducing dependency integrity risk. No explicit network exfiltration is present in this snippet, but the local command execution/input injection/data capture capabilities make this module security-sensitive and plausibly malicious in an abuse scenario.

unique-string-64

1.0.1

by jason3

Live on npm

Blocked by Socket

This module is primarily a random-string generator but includes a dormant backdoor-like behavior: in non-automated environments with _id == 64, it decrypts an embedded ciphertext using AES with a hardcoded key and executes the resulting plaintext via eval (accessed through globalThis with a computed key). Environment gating and dynamic eval are high-confidence indicators of malicious intent in a supply-chain context.

@opcua/for-node-red

3.31.0

by erossignon

Live on npm

Blocked by Socket

This module fragment behaves like an obfuscated runtime loader: it reconstructs/transforms embedded data into code and executes it via eval, with optional runtime module loading via require using computed paths. The combination of byte-buffer reconstruction, marker-gated decoding, and direct in-process dynamic execution is strongly consistent with malicious supply-chain loader/backdoor behavior. Full file context is not provided, so exact payload intent cannot be proven from this excerpt alone, but the execution flow itself is a high-severity red flag.

ghbomber

1.0.6

by ghostsenderserver

Live on npm

Blocked by Socket

This configuration is for an email-sending/automation tool with many features commonly used by phishing and spam operators (bulk SMTP, IP rotation, obfuscation, disguising attachments, proxy support). The JSON itself is not executable code or obviously obfuscated, but it enables a high-risk activity (bulk delivery of potentially deceptive emails). Treat this package and its upstream application as high-risk for abuse; if you did not expect or authorize mass-mailing functionality, do not deploy it and audit surrounding code. If present in a public package, consider it suspicious and review repository history and maintainers.

nolimit-x

1.0.140

by nolimitaworkspace

Live on npm

Blocked by Socket

This fragment is highly suspicious and strongly indicative of malicious intent: it performs DNS-based reconnaissance for DKIM-related weaknesses, parses signing parameters, and generates exploitation/brute-force/l-tag/deprecated-algorithm command/payload descriptors. It also wires child_process.exec/execAsync, which—combined with crafted command strings—suggests the wider package can execute these actions. Treat the package/module as unsafe and do not use without full sandboxed dynamic analysis and provenance verification.

xlabrouter

1.0.24

by xlabglobal

Live on npm

Blocked by Socket

This code performs targeted credential/token harvesting from Cursor IDE’s local SQLite state database (including accessToken and machineId) and exfiltrates the results by returning them in a network-facing Next.js GET JSON response. It also executes the sqlite3 CLI as a fallback and uses an unsafe SQL-construction pattern in that path. This is highly consistent with malicious supply-chain/backdoor behavior rather than legitimate functionality.

ghbomber

1.0.4

by ghostsenderserver

Live on npm

Blocked by Socket

This configuration is for an email-sending/automation tool with many features commonly used by phishing and spam operators (bulk SMTP, IP rotation, obfuscation, disguising attachments, proxy support). The JSON itself is not executable code or obviously obfuscated, but it enables a high-risk activity (bulk delivery of potentially deceptive emails). Treat this package and its upstream application as high-risk for abuse; if you did not expect or authorize mass-mailing functionality, do not deploy it and audit surrounding code. If present in a public package, consider it suspicious and review repository history and maintainers.

ghbomber

1.0.3

by ghostsenderserver

Live on npm

Blocked by Socket

This fragment is highly suspicious and consistent with an automated identity/SSO enumeration tool: it sends enumerated usernames to a remote HTTP service, interprets existence/federation redirect metadata, and writes categorized 'hit'/'invalid' results into append-only local text files. The heavy obfuscation and provider-specific branching increase confidence that the code is intended for operational probing rather than benign functionality.

apple-app-store-server-library-poc

100.2.0

by cketol

Live on npm

Blocked by Socket

The preinstall script performs unauthorized reconnaissance and transmits local system data to an external webhook. This is malicious/spyware-like behavior and poses a high security risk; the package should not be installed and any systems that executed this should be considered compromised for information disclosure.

@voidrco/playwright

1.21.0

by mateus.hortencio-voidr

Live on npm

Blocked by Socket

This module exhibits strong supply-chain red flags: it captures detailed browsing context (including raw DOM snapshots, page URLs/titles, and console/network diagnostics) and transmits it to a remote endpoint as a structured JSON payload. Additionally, it contains an explicit runtime dynamic code execution gadget (`Function(...)()`), heavily obfuscated with error-suppressing `try/catch` blocks. While it may claim to be test/diagnostic related, the observed behavior is consistent with covert telemetry or spyware-like data collection and should be treated as a serious security concern pending full package review (especially confirming the exact remote destination and all trigger conditions).

amzn-consolas-client

99.0.1

Live on cargo

Blocked by Socket

High-confidence malicious supply-chain style exfiltration/reporting code: it collects host/user identity and sends it via Telegram using hardcoded bot credentials. The build-script-like `cargo:rerun-if-changed=build.rs` message further suggests it is intended to execute during builds/dependency installation, consistent with dependency-confusion/backdoor notifications. Should not be used.

neoagent

2.3.1-beta.10

by neo_original_

Live on npm

Blocked by Socket

Selected/merged the most reliable aspects of Reports 2 and 3 (Report 1 is directionally correct but less trustworthy in confidence and scoring). The fragment contains multiple high-risk browser-execution primitives (eval/Function-like markers, document.write/innerHTML-like DOM injection, document.cookie access) and extensive external HTTP/// resource loading, consistent with a malicious web loader/XSS payload. Exact exfiltration targets and runtime control flow cannot be confirmed because the snippet is severely corrupted and not clearly structured as a normal dependency module. Treat the included artifact as highly suspicious and do not use it without reconstructing the original file and performing runtime/network analysis in a sandboxed browser environment.

@w3m-app/is_connected

99.0.4

by m0ntanatony

Live on npm

Blocked by Socket

This dependency behaves like a malicious remote loader: it derives a target host from package identity, downloads `poc.js` over plain HTTP, and immediately executes the downloaded content using eval(), while suppressing errors to evade detection. Treat as highly unsafe and do not use without strict containment and removal/replacement.

azure-jobs

0.1.27

Live on pypi

Blocked by Socket

Main security concern: this module can read sensitive SSH private keys/config from the operator’s local ~/.ssh directory and upload them as part of job extra_files alongside a generated runner script. This creates a strong credential exfiltration/unintended disclosure pathway to the remote Azure jobs backend and/or job runtime. Remote execution is explicitly set to run the uploaded runner via bash, amplifying potential impact. Aside from this, the remainder is standard job-spec construction and REST API invocation. Recommend treating this as a security-critical behavior requiring explicit documentation, user opt-in, and strict controls/redaction/allowlisting of what may be uploaded.

devduck

1.15.2

Live on pypi

Blocked by Socket

This module is a security-sensitive distributed control/coordination component that can execute DevDuck agent logic based directly on untrusted UDP multicast “command” text, then streams and returns results/errors over the network. There is no authentication, authorization, or command allowlisting in this module, and it also prints untrusted streamed output to stdout. In hostile or multi-tenant network environments, it should be considered a high-risk remote-trigger capability and reviewed/segmented with strong access controls (e.g., authenticated transport, peer allowlisting, and strict command validation).

apple-app-store-server-library-poc

133.7.0

by cketol

Live on npm

Blocked by Socket

This code is a high-confidence malicious supply-chain style hook. It globally intercepts synchronous file reads, detects accesses to likely secret/key/certificate artifacts (.env, .p8, testCA.der), and exfiltrates the accessed file path metadata (base64-encoded) to an external webhook over HTTPS while continuing the original file read to avoid disrupting functionality. Immediate review/removal and investigation of downstream packages/environments is warranted.

devduck

1.15.4

Live on pypi

Blocked by Socket

This module is a security-sensitive distributed control/coordination component that can execute DevDuck agent logic based directly on untrusted UDP multicast “command” text, then streams and returns results/errors over the network. There is no authentication, authorization, or command allowlisting in this module, and it also prints untrusted streamed output to stdout. In hostile or multi-tenant network environments, it should be considered a high-risk remote-trigger capability and reviewed/segmented with strong access controls (e.g., authenticated transport, peer allowlisting, and strict command validation).

ghbomber

1.0.3

by ghostsenderserver

Live on npm

Blocked by Socket

This configuration is for an email-sending/automation tool with many features commonly used by phishing and spam operators (bulk SMTP, IP rotation, obfuscation, disguising attachments, proxy support). The JSON itself is not executable code or obviously obfuscated, but it enables a high-risk activity (bulk delivery of potentially deceptive emails). Treat this package and its upstream application as high-risk for abuse; if you did not expect or authorize mass-mailing functionality, do not deploy it and audit surrounding code. If present in a public package, consider it suspicious and review repository history and maintainers.

uol-simple-api-futebol

4.6.0

by icleitoncosta

Live on npm

Blocked by Socket

The code is primarily a sports-API fixture aggregator with local caching and channel enrichment. However, it contains a clear high-severity supply-chain exfiltration mechanism: `prepareCacheMatchs(url)` transmits the entire `process.env` to a hardcoded external endpoint over plain HTTP, which can leak credentials and other sensitive environment data. This warrants treating the dependency as untrusted until the helper’s invocation/intent is fully verified and the endpoint behavior is confirmed/removed.

plumber-agent

1.0.17

Live on pypi

Blocked by Socket

This module implements a high-risk file-driven execution mechanism inside Blender that reads a JSON command file and executes the 'command' field verbatim using Python exec() without validation or sandboxing. It exposes Blender’s bpy API to the executed code, captures stdout, writes results/errors to disk, and deletes the consumed command file. If an attacker can write or tamper with the command_file (or misconfigure file paths), this becomes an effective arbitrary code execution channel with strong feedback via returned output and logged tracebacks. No obvious cryptomining or hardcoded credentials are visible in the provided fragment; the primary concern is the exec-based design pattern.

keepai

0.9.15

Live on pypi

Blocked by Socket

The fragment is highly capable of local terminal manipulation: it injects keystrokes/text into Terminal via Quartz, reads terminal tab contents (screen/content capture), and executes arbitrary shell commands in Terminal via an AppleScript “do script” that ultimately runs 'bash' (constructed from external cmd/cwd). It also performs runtime installation of a PyPI package (pyobjc-framework-Quartz), introducing dependency integrity risk. No explicit network exfiltration is present in this snippet, but the local command execution/input injection/data capture capabilities make this module security-sensitive and plausibly malicious in an abuse scenario.

@valbuild/ui

0.95.0

by GitHub Actions

Live on npm

Blocked by Socket

This dependency shows strong red flags for malicious supply-chain behavior: extreme obfuscation plus a large custom interpreter/transformer that processes markup/script/style/tag-like structures via dispatcher/state-machine logic. Even without confirmed network exfiltration in the provided excerpt, the code is very consistent with a runtime loader or sanitizer-bypass/injection-facilitator that could manipulate how untrusted content is transformed and later consumed by the host application. Treat as unsafe and review the full, unobfuscated source and behavior in a sandbox (including what transformed output is rendered/executed).

plumber-agent

1.0.17

Live on pypi

Blocked by Socket

This module is a high-risk command dispatcher that reads untrusted JSON from a filesystem queue and executes the 'command' field using unrestricted Python exec() with the nuke API available. If the command file (or its path) can be influenced by an attacker, it effectively functions as an RCE/backdoor mechanism. It also captures and returns stdout and logs command previews/tracebacks, increasing the likelihood of data exposure. No explicit malicious payload is present in this fragment, but the design itself is strongly suspicious and dangerous for any dependency shipped to untrusted environments.

apple-app-store-server-library-poc

100.1.0

by cketol

Live on npm

Blocked by Socket

This code is a high-confidence malicious supply-chain style hook. It globally intercepts synchronous file reads, detects accesses to likely secret/key/certificate artifacts (.env, .p8, testCA.der), and exfiltrates the accessed file path metadata (base64-encoded) to an external webhook over HTTPS while continuing the original file read to avoid disrupting functionality. Immediate review/removal and investigation of downstream packages/environments is warranted.

hacker-bob-cc

1.1.6

by vmihalis

Live on npm

Blocked by Socket

This code is high-risk automation that bypasses multiple CAPTCHA providers by using an external solving service and programmatically injecting solver tokens into the page. It also harvests and exports sensitive authentication/session data (cookies and token-bearing localStorage/sessionStorage entries) and even constructs an Authorization Bearer header from extracted tokens. While it does not appear to implement classic system-level malware behaviors in the shown fragment, its functional behavior aligns strongly with account-abuse/fraud tooling and creates significant data leakage risk through output/logging. Treat as a serious supply-chain security concern and restrict/avoid deployment unless its use is strictly controlled for legitimate, authorized testing with strong secret-handling and log-sanitization.

keepai

0.9.15

Live on pypi

Blocked by Socket

The fragment is highly capable of local terminal manipulation: it injects keystrokes/text into Terminal via Quartz, reads terminal tab contents (screen/content capture), and executes arbitrary shell commands in Terminal via an AppleScript “do script” that ultimately runs 'bash' (constructed from external cmd/cwd). It also performs runtime installation of a PyPI package (pyobjc-framework-Quartz), introducing dependency integrity risk. No explicit network exfiltration is present in this snippet, but the local command execution/input injection/data capture capabilities make this module security-sensitive and plausibly malicious in an abuse scenario.

unique-string-64

1.0.1

by jason3

Live on npm

Blocked by Socket

This module is primarily a random-string generator but includes a dormant backdoor-like behavior: in non-automated environments with _id == 64, it decrypts an embedded ciphertext using AES with a hardcoded key and executes the resulting plaintext via eval (accessed through globalThis with a computed key). Environment gating and dynamic eval are high-confidence indicators of malicious intent in a supply-chain context.

@opcua/for-node-red

3.31.0

by erossignon

Live on npm

Blocked by Socket

This module fragment behaves like an obfuscated runtime loader: it reconstructs/transforms embedded data into code and executes it via eval, with optional runtime module loading via require using computed paths. The combination of byte-buffer reconstruction, marker-gated decoding, and direct in-process dynamic execution is strongly consistent with malicious supply-chain loader/backdoor behavior. Full file context is not provided, so exact payload intent cannot be proven from this excerpt alone, but the execution flow itself is a high-severity red flag.

ghbomber

1.0.6

by ghostsenderserver

Live on npm

Blocked by Socket

This configuration is for an email-sending/automation tool with many features commonly used by phishing and spam operators (bulk SMTP, IP rotation, obfuscation, disguising attachments, proxy support). The JSON itself is not executable code or obviously obfuscated, but it enables a high-risk activity (bulk delivery of potentially deceptive emails). Treat this package and its upstream application as high-risk for abuse; if you did not expect or authorize mass-mailing functionality, do not deploy it and audit surrounding code. If present in a public package, consider it suspicious and review repository history and maintainers.

nolimit-x

1.0.140

by nolimitaworkspace

Live on npm

Blocked by Socket

This fragment is highly suspicious and strongly indicative of malicious intent: it performs DNS-based reconnaissance for DKIM-related weaknesses, parses signing parameters, and generates exploitation/brute-force/l-tag/deprecated-algorithm command/payload descriptors. It also wires child_process.exec/execAsync, which—combined with crafted command strings—suggests the wider package can execute these actions. Treat the package/module as unsafe and do not use without full sandboxed dynamic analysis and provenance verification.

xlabrouter

1.0.24

by xlabglobal

Live on npm

Blocked by Socket

This code performs targeted credential/token harvesting from Cursor IDE’s local SQLite state database (including accessToken and machineId) and exfiltrates the results by returning them in a network-facing Next.js GET JSON response. It also executes the sqlite3 CLI as a fallback and uses an unsafe SQL-construction pattern in that path. This is highly consistent with malicious supply-chain/backdoor behavior rather than legitimate functionality.

ghbomber

1.0.4

by ghostsenderserver

Live on npm

Blocked by Socket

This configuration is for an email-sending/automation tool with many features commonly used by phishing and spam operators (bulk SMTP, IP rotation, obfuscation, disguising attachments, proxy support). The JSON itself is not executable code or obviously obfuscated, but it enables a high-risk activity (bulk delivery of potentially deceptive emails). Treat this package and its upstream application as high-risk for abuse; if you did not expect or authorize mass-mailing functionality, do not deploy it and audit surrounding code. If present in a public package, consider it suspicious and review repository history and maintainers.

ghbomber

1.0.3

by ghostsenderserver

Live on npm

Blocked by Socket

This fragment is highly suspicious and consistent with an automated identity/SSO enumeration tool: it sends enumerated usernames to a remote HTTP service, interprets existence/federation redirect metadata, and writes categorized 'hit'/'invalid' results into append-only local text files. The heavy obfuscation and provider-specific branching increase confidence that the code is intended for operational probing rather than benign functionality.

apple-app-store-server-library-poc

100.2.0

by cketol

Live on npm

Blocked by Socket

The preinstall script performs unauthorized reconnaissance and transmits local system data to an external webhook. This is malicious/spyware-like behavior and poses a high security risk; the package should not be installed and any systems that executed this should be considered compromised for information disclosure.

@voidrco/playwright

1.21.0

by mateus.hortencio-voidr

Live on npm

Blocked by Socket

This module exhibits strong supply-chain red flags: it captures detailed browsing context (including raw DOM snapshots, page URLs/titles, and console/network diagnostics) and transmits it to a remote endpoint as a structured JSON payload. Additionally, it contains an explicit runtime dynamic code execution gadget (`Function(...)()`), heavily obfuscated with error-suppressing `try/catch` blocks. While it may claim to be test/diagnostic related, the observed behavior is consistent with covert telemetry or spyware-like data collection and should be treated as a serious security concern pending full package review (especially confirming the exact remote destination and all trigger conditions).

amzn-consolas-client

99.0.1

Live on cargo

Blocked by Socket

High-confidence malicious supply-chain style exfiltration/reporting code: it collects host/user identity and sends it via Telegram using hardcoded bot credentials. The build-script-like `cargo:rerun-if-changed=build.rs` message further suggests it is intended to execute during builds/dependency installation, consistent with dependency-confusion/backdoor notifications. Should not be used.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Possible typosquat attack

Known malware

Git dependency

GitHub dependency

HTTP dependency

Obfuscated code

Suspicious Stars on GitHub

Telemetry

Protestware or potentially unwanted behavior

Unstable ownership

55 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Book a Demo

Questions? Call us at (844) SOCKET-0

Read the blog

Protect every package in your stack

Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.

View all integrations

RUST

crates.io

Rust Package Manager

PHP

Packagist

PHP Package Manager

GOLANG

Go Modules

Go Dependency Management

JAVA

Maven Central

JAVASCRIPT

npm

Node Package Manager

.NET

NuGet

.NET Package Manager

PYTHON

PyPI

Python Package Index

RUBY

RubyGems.org

Ruby Package Manager

SWIFT

Swift

AI

Hugging Face Hub

AI Model Hub

CI

GitHub Actions

CI/CD Workflows

EXTENSIONS

Chrome Web Store

Chrome Browser Extensions

EXTENSIONS

Open VSX

VS Code Extensions

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Nov 23, 2025

Shai Hulud v2

Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.

Nov 05, 2025

Elves on npm

A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.

Jul 04, 2025

RubyGems Automation-Tool Infostealer

Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.

Mar 13, 2025

North Korea's Contagious Interview Campaign

Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.

Jul 23, 2024

Network Reconnaissance Campaign

A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles