New Case Study:See how Anthropic automated 95% of dependency reviews with Socket.Learn More
Socket
Sign inDemoInstall
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub AppBook a Demo

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery


timmywil published 3.7.1

left-pad


stevemao published 1.3.0

react


react-bot published 19.0.0

We protect you from vulnerable and malicious packages

@lbank/lbank-utils

3000.0.0

by descar45

Live on npm

Blocked by Socket

The code appears to have malicious behavior as it collects system information and sends it to a remote server without user consent or encryption. It also executes arbitrary shell commands and deletes a file. The hardcoded URL raises further suspicion. The security risk is high.

security-alert-watcher

0.0.1

by mryayaa

Removed from npm

Blocked by Socket

The package's "package.json" file includes a "preinstall" script that attempts to exfiltrate the "/etc/shadow" file by sending it to a dynamically constructed URL using "curl". The script sends the contents of "/etc/shadow" to "$(hostname)uzbsomiaulpyeqwgzyaurf7k8udsmjrvy[.]oast[.]fun", where "$(hostname)" is replaced with the local system's hostname. This behavior is highly malicious as it attempts to steal sensitive system password hashes.

Live on npm for 26 days, 15 hours and 1 minute before removal. Socket users were protected even while the package was live.

aker-cas-cli

1.0.0

Live on Rubygems

Blocked by Socket

Malicious code in aker-cas-cli (RubyGems)

amazon-analytics

999.9.9

by amigomioteconsidero3

Removed from npm

Blocked by Socket

The code is designed to exfiltrate system information by sending it to an external domain via DNS queries. This is a clear indication of malicious behavior, as it involves unauthorized data transmission without user consent.

Live on npm for 9 hours and 2 minutes before removal. Socket users were protected even while the package was live.

deere-ui-domain-framework

1.0.0

by shaikhyaser

Removed from npm

Blocked by Socket

The script is attempting to perform a DNS lookup to a suspicious domain. This behavior could be indicative of data exfiltration or unauthorized tracking.

Live on npm for 1 minute before removal. Socket users were protected even while the package was live.

iberia-api

999.9.9

by amigomioteconsidero22

Removed from npm

Blocked by Socket

The code is designed to exfiltrate system information by sending it to an external domain via DNS queries. This is a clear indication of malicious behavior, as it involves unauthorized data transmission without user consent.

Live on npm for 2 hours and 59 minutes before removal. Socket users were protected even while the package was live.

react-experimental-builtin

4.1.2

by testfin857

Removed from npm

Blocked by Socket

The code exhibits behavior typical of data exfiltration by collecting and sending sensitive information to an untrusted domain.

Live on npm for 6 days, 7 hours and 44 minutes before removal. Socket users were protected even while the package was live.

underworld-nebula-wsa426

1.0.0

by afifaljafari112

Removed from npm

Blocked by Socket

The provided code imports several modules with unconventional names and invokes a non-standard method `functame` on each. The method names and the number of unrelated modules raise suspicion of potentially obfuscated or malicious behavior. Further inspection of each imported module is necessary to confirm the intent and safety of the code.

Live on npm for 57 days, 6 hours and 23 minutes before removal. Socket users were protected even while the package was live.

lib-comdig

6.6.6

by magicsam666

Removed from npm

Blocked by Socket

This script is attempting to exfiltrate sensitive data (the contents of the /etc/passwd file) to a remote server. This behavior is highly suspicious and poses a significant security risk.

Live on npm for 11 minutes before removal. Socket users were protected even while the package was live.

zunkernel

1.1.2

by asielhv

Removed from npm

Blocked by Socket

This batch script exhibits suspicious behavior, such as modifying the PATHEXT environment variable to remove the .JS extension, running a script from an unknown 'zunkernel' module, and passing unvalidated command line arguments to it. These actions could potentially be used to obscure the execution of malicious JavaScript code. However, without examining the contents of the 'zun-cli.js' script, it is not possible to definitively conclude if this script is malicious or not. Further investigation into the 'zunkernel' module and the 'zun-cli.js' script is recommended to determine the actual risk posed by this script.

Live on npm for 1 hour and 24 minutes before removal. Socket users were protected even while the package was live.

pwn

0.4.526

by 0day Inc.

Live on Rubygems

Blocked by Socket

The script 'packer/provisioners/post_install.sh' exhibits malicious behavior by performing several harmful actions: - **Deletes user and root history files**: Uses secure deletion methods to remove history files, potentially to conceal malicious activities. - **Clears system log files**: Erases log files from '/var/log', hindering the ability to audit and investigate system actions. - **Disables the root account**: Locks the root account password without ensuring alternative secure administrative access, possibly preventing legitimate administrative operations. - **Sets a weak default password ('changeme') for the 'admin' user**: Introduces a significant security risk by using an easily guessable password, facilitating unauthorized access. These actions can be exploited by an attacker to gain unauthorized access, disrupt legitimate operations, and prevent system recovery. The combination of log and history deletion, disabling of root access, and setting weak credentials indicates malicious intent to compromise system security and conceal nefarious activities.

ptrsec_rce_test

0.0.2

Live on Rubygems

Blocked by Socket

Malicious code in ptrsec_rce_test (RubyGems)

vivo-packages

69.69.71

by froyd

Removed from npm

Blocked by Socket

This package was removed from the npm registry for security reasons.

vue-kindeditor-js

2.1.2

by yc6558011

Removed from npm

Blocked by Socket

The provided code is heavily obfuscated, which raises concerns about potential hidden behavior. However, without further details or specific reports, it's difficult to ascertain the presence of vulnerabilities or malicious intent. Further analysis, including deobfuscation, would be necessary for a more accurate assessment.

Live on npm for 31 minutes before removal. Socket users were protected even while the package was live.

freetvg-karjakak

1.2.4

Live on PyPI

Blocked by Socket

The code exhibits clear malicious behavior by collecting and transmitting sensitive user data without consent. This poses a significant security risk, warranting high malware and risk scores.

@zitterorg/laudantium-rerum

2.3.33

by loandinhb931

Live on npm

Blocked by Socket

Malicious code in @zitterorg/laudantium-rerum (npm) Source: ghsa-malware (e45ff91dd83cc149d7abc8c6fb2c74e3509aa341e23c72cfac0a34868a4e2637) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.

bobjoll

5.639.3

by hfrpik

Live on npm

Blocked by Socket

The code appears to be obfuscated and has several unusual patterns and hardcoded values. It sends a POST request to a remote server with data encoded in base64. The purpose of this request is not clear and could potentially be malicious. Further investigation and analysis are recommended.

ac-animation-sequencer

10.999.999

Removed from npm

Blocked by Socket

The code is likely intended for malicious use, specifically data exfiltration. The obfuscation, use of system information gathering, dynamic DNS construction with encoded system data, and sending this data to a remote server via ping command are indicators of malicious intent. The code does not directly damage system files or steal credentials in a traditional sense, but it violates user privacy by leaking system information.

Live on npm for 23 minutes before removal. Socket users were protected even while the package was live.

@ljon/meterpreter-backdoor

1.0.2

by npm

Live on npm

Blocked by Socket

Malicious code in @ljon/meterpreter-backdoor (npm) Source: ghsa-malware (fc8d64a22d47684bee253cf7b8c674edd75ce97c1f420c5bdf550e7fd1e145cc) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.

epicagames-oauth

999.9.9

by amigomioteconsidero17

Removed from npm

Blocked by Socket

The code is designed to exfiltrate system information by sending it to an external domain via DNS queries. This is a clear indication of malicious behavior, as it involves unauthorized data transmission without user consent.

Live on npm for 4 hours and 1 minute before removal. Socket users were protected even while the package was live.

@zva/web

99.50.55

by dummyuser1229

Live on npm

Blocked by Socket

The code is heavily obfuscated and exhibits behaviors typical of malicious software, such as dynamic code execution and network communication to a potentially suspicious URL. This poses a significant security risk.

test-hach

71.32.1

by hach-bug-bounty

Removed from npm

Blocked by Socket

This code is running the 'host' command with a hostname that is generated by base64 encoding the output of two commands: 'hostname' and 'whoami'. This is a clear indication of command injection and could potentially be used to execute arbitrary commands on the system.

Live on npm for 4 minutes before removal. Socket users were protected even while the package was live.

reac6-hintl

1.2.0

by 17b4a931

Removed from npm

Blocked by Socket

This code poses a serious security risk and should not be used.

Live on npm for 17 minutes before removal. Socket users were protected even while the package was live.

jb-rpd-splash

99.10.10

Removed from npm

Blocked by Socket

The code engages in potentially malicious behavior by collecting sensitive system information and sending it to a remote server without clear user consent. The hard-coded domain, data obfuscation, and lack of transparency raise significant privacy and security concerns. The risk score is high due to the invasive nature of the code.

Live on npm for 1 hour and 6 minutes before removal. Socket users were protected even while the package was live.

oj-odcs-common

9.9.9

by n0nce

Removed from npm

Blocked by Socket

The source code is designed to collect and exfiltrate sensitive system and user information to a remote server without user consent. This behavior is indicative of malicious intent and poses a significant security risk.

Live on npm for 17 minutes before removal. Socket users were protected even while the package was live.

@lbank/lbank-utils

3000.0.0

by descar45

Live on npm

Blocked by Socket

The code appears to have malicious behavior as it collects system information and sends it to a remote server without user consent or encryption. It also executes arbitrary shell commands and deletes a file. The hardcoded URL raises further suspicion. The security risk is high.

security-alert-watcher

0.0.1

by mryayaa

Removed from npm

Blocked by Socket

The package's "package.json" file includes a "preinstall" script that attempts to exfiltrate the "/etc/shadow" file by sending it to a dynamically constructed URL using "curl". The script sends the contents of "/etc/shadow" to "$(hostname)uzbsomiaulpyeqwgzyaurf7k8udsmjrvy[.]oast[.]fun", where "$(hostname)" is replaced with the local system's hostname. This behavior is highly malicious as it attempts to steal sensitive system password hashes.

Live on npm for 26 days, 15 hours and 1 minute before removal. Socket users were protected even while the package was live.

aker-cas-cli

1.0.0

Live on Rubygems

Blocked by Socket

Malicious code in aker-cas-cli (RubyGems)

amazon-analytics

999.9.9

by amigomioteconsidero3

Removed from npm

Blocked by Socket

The code is designed to exfiltrate system information by sending it to an external domain via DNS queries. This is a clear indication of malicious behavior, as it involves unauthorized data transmission without user consent.

Live on npm for 9 hours and 2 minutes before removal. Socket users were protected even while the package was live.

deere-ui-domain-framework

1.0.0

by shaikhyaser

Removed from npm

Blocked by Socket

The script is attempting to perform a DNS lookup to a suspicious domain. This behavior could be indicative of data exfiltration or unauthorized tracking.

Live on npm for 1 minute before removal. Socket users were protected even while the package was live.

iberia-api

999.9.9

by amigomioteconsidero22

Removed from npm

Blocked by Socket

The code is designed to exfiltrate system information by sending it to an external domain via DNS queries. This is a clear indication of malicious behavior, as it involves unauthorized data transmission without user consent.

Live on npm for 2 hours and 59 minutes before removal. Socket users were protected even while the package was live.

react-experimental-builtin

4.1.2

by testfin857

Removed from npm

Blocked by Socket

The code exhibits behavior typical of data exfiltration by collecting and sending sensitive information to an untrusted domain.

Live on npm for 6 days, 7 hours and 44 minutes before removal. Socket users were protected even while the package was live.

underworld-nebula-wsa426

1.0.0

by afifaljafari112

Removed from npm

Blocked by Socket

The provided code imports several modules with unconventional names and invokes a non-standard method `functame` on each. The method names and the number of unrelated modules raise suspicion of potentially obfuscated or malicious behavior. Further inspection of each imported module is necessary to confirm the intent and safety of the code.

Live on npm for 57 days, 6 hours and 23 minutes before removal. Socket users were protected even while the package was live.

lib-comdig

6.6.6

by magicsam666

Removed from npm

Blocked by Socket

This script is attempting to exfiltrate sensitive data (the contents of the /etc/passwd file) to a remote server. This behavior is highly suspicious and poses a significant security risk.

Live on npm for 11 minutes before removal. Socket users were protected even while the package was live.

zunkernel

1.1.2

by asielhv

Removed from npm

Blocked by Socket

This batch script exhibits suspicious behavior, such as modifying the PATHEXT environment variable to remove the .JS extension, running a script from an unknown 'zunkernel' module, and passing unvalidated command line arguments to it. These actions could potentially be used to obscure the execution of malicious JavaScript code. However, without examining the contents of the 'zun-cli.js' script, it is not possible to definitively conclude if this script is malicious or not. Further investigation into the 'zunkernel' module and the 'zun-cli.js' script is recommended to determine the actual risk posed by this script.

Live on npm for 1 hour and 24 minutes before removal. Socket users were protected even while the package was live.

pwn

0.4.526

by 0day Inc.

Live on Rubygems

Blocked by Socket

The script 'packer/provisioners/post_install.sh' exhibits malicious behavior by performing several harmful actions: - **Deletes user and root history files**: Uses secure deletion methods to remove history files, potentially to conceal malicious activities. - **Clears system log files**: Erases log files from '/var/log', hindering the ability to audit and investigate system actions. - **Disables the root account**: Locks the root account password without ensuring alternative secure administrative access, possibly preventing legitimate administrative operations. - **Sets a weak default password ('changeme') for the 'admin' user**: Introduces a significant security risk by using an easily guessable password, facilitating unauthorized access. These actions can be exploited by an attacker to gain unauthorized access, disrupt legitimate operations, and prevent system recovery. The combination of log and history deletion, disabling of root access, and setting weak credentials indicates malicious intent to compromise system security and conceal nefarious activities.

ptrsec_rce_test

0.0.2

Live on Rubygems

Blocked by Socket

Malicious code in ptrsec_rce_test (RubyGems)

vivo-packages

69.69.71

by froyd

Removed from npm

Blocked by Socket

This package was removed from the npm registry for security reasons.

vue-kindeditor-js

2.1.2

by yc6558011

Removed from npm

Blocked by Socket

The provided code is heavily obfuscated, which raises concerns about potential hidden behavior. However, without further details or specific reports, it's difficult to ascertain the presence of vulnerabilities or malicious intent. Further analysis, including deobfuscation, would be necessary for a more accurate assessment.

Live on npm for 31 minutes before removal. Socket users were protected even while the package was live.

freetvg-karjakak

1.2.4

Live on PyPI

Blocked by Socket

The code exhibits clear malicious behavior by collecting and transmitting sensitive user data without consent. This poses a significant security risk, warranting high malware and risk scores.

@zitterorg/laudantium-rerum

2.3.33

by loandinhb931

Live on npm

Blocked by Socket

Malicious code in @zitterorg/laudantium-rerum (npm) Source: ghsa-malware (e45ff91dd83cc149d7abc8c6fb2c74e3509aa341e23c72cfac0a34868a4e2637) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.

bobjoll

5.639.3

by hfrpik

Live on npm

Blocked by Socket

The code appears to be obfuscated and has several unusual patterns and hardcoded values. It sends a POST request to a remote server with data encoded in base64. The purpose of this request is not clear and could potentially be malicious. Further investigation and analysis are recommended.

ac-animation-sequencer

10.999.999

Removed from npm

Blocked by Socket

The code is likely intended for malicious use, specifically data exfiltration. The obfuscation, use of system information gathering, dynamic DNS construction with encoded system data, and sending this data to a remote server via ping command are indicators of malicious intent. The code does not directly damage system files or steal credentials in a traditional sense, but it violates user privacy by leaking system information.

Live on npm for 23 minutes before removal. Socket users were protected even while the package was live.

@ljon/meterpreter-backdoor

1.0.2

by npm

Live on npm

Blocked by Socket

Malicious code in @ljon/meterpreter-backdoor (npm) Source: ghsa-malware (fc8d64a22d47684bee253cf7b8c674edd75ce97c1f420c5bdf550e7fd1e145cc) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.

epicagames-oauth

999.9.9

by amigomioteconsidero17

Removed from npm

Blocked by Socket

The code is designed to exfiltrate system information by sending it to an external domain via DNS queries. This is a clear indication of malicious behavior, as it involves unauthorized data transmission without user consent.

Live on npm for 4 hours and 1 minute before removal. Socket users were protected even while the package was live.

@zva/web

99.50.55

by dummyuser1229

Live on npm

Blocked by Socket

The code is heavily obfuscated and exhibits behaviors typical of malicious software, such as dynamic code execution and network communication to a potentially suspicious URL. This poses a significant security risk.

test-hach

71.32.1

by hach-bug-bounty

Removed from npm

Blocked by Socket

This code is running the 'host' command with a hostname that is generated by base64 encoding the output of two commands: 'hostname' and 'whoami'. This is a clear indication of command injection and could potentially be used to execute arbitrary commands on the system.

Live on npm for 4 minutes before removal. Socket users were protected even while the package was live.

reac6-hintl

1.2.0

by 17b4a931

Removed from npm

Blocked by Socket

This code poses a serious security risk and should not be used.

Live on npm for 17 minutes before removal. Socket users were protected even while the package was live.

jb-rpd-splash

99.10.10

Removed from npm

Blocked by Socket

The code engages in potentially malicious behavior by collecting sensitive system information and sending it to a remote server without clear user consent. The hard-coded domain, data obfuscation, and lack of transparency raise significant privacy and security concerns. The risk score is high due to the invasive nature of the code.

Live on npm for 1 hour and 6 minutes before removal. Socket users were protected even while the package was live.

oj-odcs-common

9.9.9

by n0nce

Removed from npm

Blocked by Socket

The source code is designed to collect and exfiltrate sensitive system and user information to a remote server without user consent. This behavior is indicative of malicious intent and poses a significant security risk.

Live on npm for 17 minutes before removal. Socket users were protected even while the package was live.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Known malware

Possible typosquat attack

NPM Shrinkwrap

Git dependency

HTTP dependency

Suspicious Stars on GitHub

Protestware or potentially unwanted behavior

Unstable ownership

AI-detected potential malware

Obfuscated code

20 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Even more security team love
Book a DemoLearn more

Why teams choose Socket

Pro-active security

Depend on Socket to prevent malicious open source dependencies from infiltrating your app.

Easy to install

Install the Socket GitHub App in just 2 clicks and get protected today.

Comprehensive open source protection

Block 70+ issues in open source code, including malware, typo-squatting, hidden code, misleading packages, permission creep, and more.

Develop faster

Reduce work by surfacing actionable security information directly in GitHub. Empower developers to make better decisions.

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Dec 14, 2023

Hijacked cryptocurrency library adds malware

Widely-used library in cryptocurrency frontend was compromised to include wallet-draining code, following the hijacking of NPM account credentials via phishing.

Jan 06, 2022

Maintainer intentionally adds malware

Rogue maintainer sabotages his own open source package with 100M downloads/month, notably breaking Amazon's AWS SDK.

Nov 15, 2021

npm discovers a platform vulnerability allowing unauthorized publishing of any package

Attackers could publish new versions of any npm package without authorization for multiple years.

Oct 22, 2021

Hijacked package adds cryptominers and password-stealing malware

Multiple packages with 30M downloads/month are hijacked and publish malicious versions directly into the software supply chain.

Nov 26, 2018

Package hijacked adding organization specific backdoors

Obfuscated malware added to a dependency which targeted a single company, went undetected for over a week, and made it into their production build.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub AppBook a Demo

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles
SocketSocket SOC 2 Logo

Product

Packages

npm

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc