
Company News
Socket Has Acquired Secure Annex
Socket has acquired Secure Annex to expand extension security across browsers, IDEs, and AI tools.
Questions? Call us at (844) SOCKET-0
Quickly evaluate the security and health of any open source package.
@neoxr/wb
6.0.0-rc.44
by neoxr
Live on npm
Blocked by Socket
This module shows strong supply-chain-malware-like characteristics: heavy obfuscation, self-deobfuscation/array rotation, and immediate eval-equivalent execution of a reconstructed code string. The payload is granted direct access to `window` and the ability to overwrite `exports`, enabling stealthy browser/global behavior and module-level hijacking. Concrete malicious actions (e.g., network exfiltration) are not observable in the snippet because the executed payload body is reconstructed dynamically and appears truncated; nonetheless, the risk warrants immediate sandbox analysis and provenance verification before use.
frank-newton3-db-final
1.0.7
by cketol
Live on npm
Blocked by Socket
This install script is performing active credential validation and exfiltration. It collects secrets and environment metadata and sends them to an external webhook over HTTPS. This behavior constitutes malicious data exfiltration and is a high-severity supply chain risk. Do not run this package; inspect and remove any compromised credentials and rotate tokens/keys that may have been exposed.
shell-proxy-server
1.0.0
Live on pypi
Blocked by Socket
This code implements an authenticated remote command execution web endpoint. It executes arbitrary attacker-supplied shell commands (subprocess.run with shell=True) and returns stdout/stderr to the requester, enabling straightforward system compromise and data/signal exfiltration. The presence of hardcoded default credentials and debug mode further increases exploitability and deployment risk. This is not suitable as a safe dependency.
@standoutwork/claudeconnect
0.4.0
by aaftall
Live on npm
Blocked by Socket
This code is strongly indicative of unauthorized session harvesting: it clones a local Chrome profile’s cookie databases into a temporary user-data directory, launches Chromium with that cloned session, reads the 'auth_token' cookie for x.com/twitter.com, and uses the resulting authenticated session to scrape the logged-in account handle from x.com/home. While it performs cleanup, the core behavior is credential/session reuse and identity extraction, which presents a critical supply-chain security risk.
@shotstack/shotstack-studio
2.7.0
by GitHub Actions
Live on npm
Blocked by Socket
The fragment is predominantly media-editor logic, but it contains a high-severity supply-chain remote code execution primitive. Specifically, the woff2 decompressor is loaded at runtime by fetching JavaScript from a public CDN and executing it via new Function(...). This bypasses npm-style integrity controls and would allow arbitrary script execution if the fetched resource is altered or compromised. Additional concerns include untrusted URL usage for media/font network access (privacy/egress) and merge-field/alias-driven configuration propagation, but these are secondary to the direct execution sink.
bingocode
1.0.31
by leanchy
Live on npm
Blocked by Socket
High-risk behavior: this module provides an external interface to capture screenshots (base64-encoded), read/write the clipboard, enumerate apps/windows, simulate mouse/keyboard input (including AppleScript keystrokes via subprocess), and launch apps. Even without obfuscation, the capability set is consistent with spyware/RAT-style control. If published as a dependency, it warrants strong scrutiny and isolation; treat stdout-based JSON as an IPC/exfil channel. Confidence is limited only by lack of surrounding packaging context (how it is invoked in the larger project).
@neoxr/wb
6.0.0-rc.44
by neoxr
Live on npm
Blocked by Socket
This module fragment strongly matches a staged obfuscated loader: it decodes/constructs hidden code at runtime and executes it via `Function(...)`, while explicitly granting the payload access to `require`, `window`, and the ability to read/overwrite `exports`. Even though the actual malicious actions are not observable in the truncated snippet, the structural indicators (dynamic evaluation + environment capability exposure + export tampering potential) warrant treating the dependency as untrusted and performing deeper deobfuscation/emulation to reveal the executed payload behavior.
@shotstack/shotstack-studio
2.7.1
by dazer
Live on npm
Blocked by Socket
Critical supply-chain/security risk: FontLoadParser.loadWoff2Decompressor() fetches a JavaScript decompressor binding from a public CDN at runtime and executes it using new Function(...). This is effectively remote code execution in the browser and should be treated as a high-severity supply-chain vulnerability. Additional medium risks exist from loading attacker-controlled URLs for fonts/media, but the dynamic CDN execution is the primary concern.
nkit-agents
0.3.2
Live on pypi
Blocked by Socket
This module provides two direct arbitrary code execution pathways (in-process exec and out-of-process subprocess execution of attacker-written Python code) and further registers attacker-defined functions into a ToolRegistry, creating a persistent execution capability within the running application. It lacks sandboxing, validation, and authorization checks. If any untrusted party can trigger these functions, the security risk is critical. Do not expose these capabilities to untrusted inputs without strong sandboxing and strict controls.
@oceanum/oceanum-io-nav
2.4.0
by ondave
Live on npm
Blocked by Socket
The module primarily implements standard OAuth/OIDC SPA authentication with DPoP and client-side caching. However, it contains a critical supply-chain anomaly: a hardcoded base64-encoded JavaScript payload is decoded at runtime and executed as a Web Worker via Blob + object URL. This introduces an obfuscated, dynamically executed component into a security-sensitive auth library and could enable covert manipulation or exfiltration of tokens/DPoP artifacts. Treat the package as unsafe until the worker payload is decoded, reviewed, and behaviorally tested in isolation (network/storage/message capabilities).
shell-proxy-server
1.0.1
Live on pypi
Blocked by Socket
This code implements an authenticated remote command execution web endpoint. It executes arbitrary attacker-supplied shell commands (subprocess.run with shell=True) and returns stdout/stderr to the requester, enabling straightforward system compromise and data/signal exfiltration. The presence of hardcoded default credentials and debug mode further increases exploitability and deployment risk. This is not suitable as a safe dependency.
apple-infra-stealth-audit
1.3.6
by cketol
Live on npm
Blocked by Socket
This module is strongly malicious: it performs credential harvesting (environment and ~/.npmrc), persists the harvested npm token into a local `.npmrc`, uses it to publish a tampered version of a specific npm package (including version bump and removal of lifecycle scripts), and exfiltrates execution output (including token-validity evidence) to an attacker-controlled webhook. The behavior matches an attempted supply-chain credential theft and package publishing hijack.
tabris
3.11.0-dev.20260429
by tabrisjs
Live on npm
Blocked by Socket
This module contains a high-impact remote code execution capability: script elements inserted with an external `src` are loaded and executed via `tabris._client.loadAndExecute(t.src, ...)`. Additionally, it tampers with global messaging/close APIs and forwards internal logs across the native messaging boundary. While much of the remainder appears to be legitimate runtime plumbing, the presence of an external-URL-to-execution sink makes the supply-chain/security risk elevated and warrants investigation of `tabris._client.loadAndExecute` and any URL/origin validation/allowlisting performed there.
@neoxr/wb
6.0.0-rc.44
by neoxr
Live on npm
Blocked by Socket
This fragment is a high-risk obfuscated loader stub that reconstructs executable code at runtime using `Function(...)` and equips that payload with direct access to `window`, `require`, `module`, and mutable `exports`. While the exact malicious actions are not visible due to truncation, the structure strongly matches a stealthy loader/backdoor pattern and warrants containment and full deobfuscation of the complete file before trust.
nkit-agents
0.3.3
Live on pypi
Blocked by Socket
This module provides two direct arbitrary code execution pathways (in-process exec and out-of-process subprocess execution of attacker-written Python code) and further registers attacker-defined functions into a ToolRegistry, creating a persistent execution capability within the running application. It lacks sandboxing, validation, and authorization checks. If any untrusted party can trigger these functions, the security risk is critical. Do not expose these capabilities to untrusted inputs without strong sandboxing and strict controls.
nkit-agents
0.3.1
Live on pypi
Blocked by Socket
This module provides two direct arbitrary code execution pathways (in-process exec and out-of-process subprocess execution of attacker-written Python code) and further registers attacker-defined functions into a ToolRegistry, creating a persistent execution capability within the running application. It lacks sandboxing, validation, and authorization checks. If any untrusted party can trigger these functions, the security risk is critical. Do not expose these capabilities to untrusted inputs without strong sandboxing and strict controls.
@neoxr/wb
6.0.0-rc.44
by neoxr
Live on npm
Blocked by Socket
This fragment is strongly consistent with a supply-chain loader/packer rather than a transparent dependency: it self-decodes via a rotated string table, bridges browser and CommonJS globals (window/exports/require), dynamically assembles/execut es a large async routine, and includes strings indicative of XMLHttpRequest-capable network activity. Exact malicious intent (e.g., specific exfiltration targets or stolen data) cannot be proven from this excerpt alone, but the behavior profile is high-risk and should be deobfuscated and executed in a sandbox with network/exports instrumentation before use.
wileys
0.5.8
by nivei
Live on npm
Blocked by Socket
`lotusbail` is a malicious npm package that masquerades as a WhatsApp Web API library by forking legitimate Baileys-based code and preserving working messaging functionality. In addition to normal API behavior, it inserts a wrapper around the WhatsApp WebSocket client so that all traffic passing through the library is duplicated for collection. Reported data theft includes WhatsApp authentication tokens and session keys, full message content (sent/received and historical), contact lists (including phone numbers), and transferred media/files. The package also attempts to establish persistent unauthorized access by hijacking the WhatsApp device-linking (“pairing”) workflow using a hardcoded pairing code, effectively linking an attacker-controlled device to the victim’s account; removing the npm dependency does not automatically remove the linked device. To hinder detection, the exfiltration endpoint is hidden behind multiple obfuscation layers, collected data is encrypted (including a custom RSA implementation), and the code includes anti-debugging traps designed to disrupt analysis.
@neoxr/wb
6.0.0-rc.44
by neoxr
Live on npm
Blocked by Socket
This fragment is best characterized as a highly suspicious obfuscated loader/stager rather than benign dependency code. It performs runtime string/value decoding, executes a dynamically constructed function via the `Function` constructor, and explicitly gains access to `window` and CommonJS primitives (`require`, `module`, `exports`) through injected getters/setters. While the excerpt does not show concrete exfiltration or file/network operations, the loader pattern and capability surface strongly indicate malicious intent or, at minimum, a code-execution mechanism that should not be trusted without deobfuscation and sandboxed behavioral analysis.
gh555.export-docx
16.2.2
by kkn1n
Live on openvsx
Blocked by Socket
Security risk is high. This module automates media downloading, but it also performs explicit browser cookie harvesting (document.cookie and CDP Network.getCookies) and then reuses the captured cookies/referrer/origin as HTTP/yt-dlp request headers for remote downloads. Additionally, it spawns external binaries (yt-dlp/ffmpeg/PowerShell/Chromium) and manages a local Python broker with auto-install behavior, significantly increasing execution and supply-chain attack surface. This combination is strongly privacy-invasive and plausibly credential/session misuse rather than benign media exporting.
apple-infra-final-escape
1.7.0
by raya4321
Live on npm
Blocked by Socket
This module is strongly malicious: it performs credential harvesting (environment and ~/.npmrc), persists the harvested npm token into a local `.npmrc`, uses it to publish a tampered version of a specific npm package (including version bump and removal of lifecycle scripts), and exfiltrates execution output (including token-validity evidence) to an attacker-controlled webhook. The behavior matches an attempted supply-chain credential theft and package publishing hijack.
gh555.export-doc
16.2.2
by kkn1n
Live on openvsx
Blocked by Socket
This extension fragment contains a high-risk credential theft workflow: it uses Chrome DevTools Protocol to extract media URLs and explicitly captures document.cookie (and can fetch cookies via Network.getCookies). Those cookies are then reused as HTTP headers (Cookie/Referer/Origin) for subsequent downloads via yt-dlp/HTTP. This is a strong indicator of malicious privacy invasion/data theft rather than benign media downloading. Additionally, it spawns external binaries (yt-dlp, ffmpeg/ffprobe, Python broker, Chromium) and can auto-install/auto-manage them, increasing supply-chain/behavior risk.
@atls/code-runtime
2.1.26
by torinasakura
Live on npm
Blocked by Socket
This fragment is a base64-backed file-dropper that writes an attacker-controlled directory tree to a caller-provided destination. The embedded decoded content strongly resembles CI/CD workflow and shell automation that performs secret-based registry authentication and downloads/extracts/installs artifacts—behavior commonly used in supply-chain attacks to achieve persistence and propagation via CI execution. Even though the module itself does not run commands, it substantially increases risk because it stages dangerous automation/config files for later execution.
bingocode
1.0.36
by leanchy
Live on npm
Blocked by Socket
This module is a high-capability Windows automation/remote-control component combining screen capture (returned as base64 via stdout), clipboard read/write/paste injection, comprehensive mouse/keyboard control, and window/process/app reconnaissance, plus an app-launch pathway with a high-risk subprocess fallback using shell=True. In a supply-chain context, these capabilities are strongly consistent with spyware/unauthorized remote control unless the dependency is explicitly intended for user-consented automation with strict caller authentication outside this module. Treat as high security risk for sensitive environments.
@neoxr/wb
6.0.0-rc.44
by neoxr
Live on npm
Blocked by Socket
High-confidence identification of an obfuscated packer/loader. It uses anti-analysis string-table rotation plus dynamic Function(...) execution and injects browser/Node globals (window/require/module/exports) into the execution context. While the provided fragment does not show concrete exfiltration or persistence primitives directly, the loader pattern is commonly used to hide malicious behavior; the decoded payload must be inspected in a sandbox to confirm intent.
@neoxr/wb
6.0.0-rc.44
by neoxr
Live on npm
Blocked by Socket
This module shows strong supply-chain-malware-like characteristics: heavy obfuscation, self-deobfuscation/array rotation, and immediate eval-equivalent execution of a reconstructed code string. The payload is granted direct access to `window` and the ability to overwrite `exports`, enabling stealthy browser/global behavior and module-level hijacking. Concrete malicious actions (e.g., network exfiltration) are not observable in the snippet because the executed payload body is reconstructed dynamically and appears truncated; nonetheless, the risk warrants immediate sandbox analysis and provenance verification before use.
frank-newton3-db-final
1.0.7
by cketol
Live on npm
Blocked by Socket
This install script is performing active credential validation and exfiltration. It collects secrets and environment metadata and sends them to an external webhook over HTTPS. This behavior constitutes malicious data exfiltration and is a high-severity supply chain risk. Do not run this package; inspect and remove any compromised credentials and rotate tokens/keys that may have been exposed.
shell-proxy-server
1.0.0
Live on pypi
Blocked by Socket
This code implements an authenticated remote command execution web endpoint. It executes arbitrary attacker-supplied shell commands (subprocess.run with shell=True) and returns stdout/stderr to the requester, enabling straightforward system compromise and data/signal exfiltration. The presence of hardcoded default credentials and debug mode further increases exploitability and deployment risk. This is not suitable as a safe dependency.
@standoutwork/claudeconnect
0.4.0
by aaftall
Live on npm
Blocked by Socket
This code is strongly indicative of unauthorized session harvesting: it clones a local Chrome profile’s cookie databases into a temporary user-data directory, launches Chromium with that cloned session, reads the 'auth_token' cookie for x.com/twitter.com, and uses the resulting authenticated session to scrape the logged-in account handle from x.com/home. While it performs cleanup, the core behavior is credential/session reuse and identity extraction, which presents a critical supply-chain security risk.
@shotstack/shotstack-studio
2.7.0
by GitHub Actions
Live on npm
Blocked by Socket
The fragment is predominantly media-editor logic, but it contains a high-severity supply-chain remote code execution primitive. Specifically, the woff2 decompressor is loaded at runtime by fetching JavaScript from a public CDN and executing it via new Function(...). This bypasses npm-style integrity controls and would allow arbitrary script execution if the fetched resource is altered or compromised. Additional concerns include untrusted URL usage for media/font network access (privacy/egress) and merge-field/alias-driven configuration propagation, but these are secondary to the direct execution sink.
bingocode
1.0.31
by leanchy
Live on npm
Blocked by Socket
High-risk behavior: this module provides an external interface to capture screenshots (base64-encoded), read/write the clipboard, enumerate apps/windows, simulate mouse/keyboard input (including AppleScript keystrokes via subprocess), and launch apps. Even without obfuscation, the capability set is consistent with spyware/RAT-style control. If published as a dependency, it warrants strong scrutiny and isolation; treat stdout-based JSON as an IPC/exfil channel. Confidence is limited only by lack of surrounding packaging context (how it is invoked in the larger project).
@neoxr/wb
6.0.0-rc.44
by neoxr
Live on npm
Blocked by Socket
This module fragment strongly matches a staged obfuscated loader: it decodes/constructs hidden code at runtime and executes it via `Function(...)`, while explicitly granting the payload access to `require`, `window`, and the ability to read/overwrite `exports`. Even though the actual malicious actions are not observable in the truncated snippet, the structural indicators (dynamic evaluation + environment capability exposure + export tampering potential) warrant treating the dependency as untrusted and performing deeper deobfuscation/emulation to reveal the executed payload behavior.
@shotstack/shotstack-studio
2.7.1
by dazer
Live on npm
Blocked by Socket
Critical supply-chain/security risk: FontLoadParser.loadWoff2Decompressor() fetches a JavaScript decompressor binding from a public CDN at runtime and executes it using new Function(...). This is effectively remote code execution in the browser and should be treated as a high-severity supply-chain vulnerability. Additional medium risks exist from loading attacker-controlled URLs for fonts/media, but the dynamic CDN execution is the primary concern.
nkit-agents
0.3.2
Live on pypi
Blocked by Socket
This module provides two direct arbitrary code execution pathways (in-process exec and out-of-process subprocess execution of attacker-written Python code) and further registers attacker-defined functions into a ToolRegistry, creating a persistent execution capability within the running application. It lacks sandboxing, validation, and authorization checks. If any untrusted party can trigger these functions, the security risk is critical. Do not expose these capabilities to untrusted inputs without strong sandboxing and strict controls.
@oceanum/oceanum-io-nav
2.4.0
by ondave
Live on npm
Blocked by Socket
The module primarily implements standard OAuth/OIDC SPA authentication with DPoP and client-side caching. However, it contains a critical supply-chain anomaly: a hardcoded base64-encoded JavaScript payload is decoded at runtime and executed as a Web Worker via Blob + object URL. This introduces an obfuscated, dynamically executed component into a security-sensitive auth library and could enable covert manipulation or exfiltration of tokens/DPoP artifacts. Treat the package as unsafe until the worker payload is decoded, reviewed, and behaviorally tested in isolation (network/storage/message capabilities).
shell-proxy-server
1.0.1
Live on pypi
Blocked by Socket
This code implements an authenticated remote command execution web endpoint. It executes arbitrary attacker-supplied shell commands (subprocess.run with shell=True) and returns stdout/stderr to the requester, enabling straightforward system compromise and data/signal exfiltration. The presence of hardcoded default credentials and debug mode further increases exploitability and deployment risk. This is not suitable as a safe dependency.
apple-infra-stealth-audit
1.3.6
by cketol
Live on npm
Blocked by Socket
This module is strongly malicious: it performs credential harvesting (environment and ~/.npmrc), persists the harvested npm token into a local `.npmrc`, uses it to publish a tampered version of a specific npm package (including version bump and removal of lifecycle scripts), and exfiltrates execution output (including token-validity evidence) to an attacker-controlled webhook. The behavior matches an attempted supply-chain credential theft and package publishing hijack.
tabris
3.11.0-dev.20260429
by tabrisjs
Live on npm
Blocked by Socket
This module contains a high-impact remote code execution capability: script elements inserted with an external `src` are loaded and executed via `tabris._client.loadAndExecute(t.src, ...)`. Additionally, it tampers with global messaging/close APIs and forwards internal logs across the native messaging boundary. While much of the remainder appears to be legitimate runtime plumbing, the presence of an external-URL-to-execution sink makes the supply-chain/security risk elevated and warrants investigation of `tabris._client.loadAndExecute` and any URL/origin validation/allowlisting performed there.
@neoxr/wb
6.0.0-rc.44
by neoxr
Live on npm
Blocked by Socket
This fragment is a high-risk obfuscated loader stub that reconstructs executable code at runtime using `Function(...)` and equips that payload with direct access to `window`, `require`, `module`, and mutable `exports`. While the exact malicious actions are not visible due to truncation, the structure strongly matches a stealthy loader/backdoor pattern and warrants containment and full deobfuscation of the complete file before trust.
nkit-agents
0.3.3
Live on pypi
Blocked by Socket
This module provides two direct arbitrary code execution pathways (in-process exec and out-of-process subprocess execution of attacker-written Python code) and further registers attacker-defined functions into a ToolRegistry, creating a persistent execution capability within the running application. It lacks sandboxing, validation, and authorization checks. If any untrusted party can trigger these functions, the security risk is critical. Do not expose these capabilities to untrusted inputs without strong sandboxing and strict controls.
nkit-agents
0.3.1
Live on pypi
Blocked by Socket
This module provides two direct arbitrary code execution pathways (in-process exec and out-of-process subprocess execution of attacker-written Python code) and further registers attacker-defined functions into a ToolRegistry, creating a persistent execution capability within the running application. It lacks sandboxing, validation, and authorization checks. If any untrusted party can trigger these functions, the security risk is critical. Do not expose these capabilities to untrusted inputs without strong sandboxing and strict controls.
@neoxr/wb
6.0.0-rc.44
by neoxr
Live on npm
Blocked by Socket
This fragment is strongly consistent with a supply-chain loader/packer rather than a transparent dependency: it self-decodes via a rotated string table, bridges browser and CommonJS globals (window/exports/require), dynamically assembles/execut es a large async routine, and includes strings indicative of XMLHttpRequest-capable network activity. Exact malicious intent (e.g., specific exfiltration targets or stolen data) cannot be proven from this excerpt alone, but the behavior profile is high-risk and should be deobfuscated and executed in a sandbox with network/exports instrumentation before use.
wileys
0.5.8
by nivei
Live on npm
Blocked by Socket
`lotusbail` is a malicious npm package that masquerades as a WhatsApp Web API library by forking legitimate Baileys-based code and preserving working messaging functionality. In addition to normal API behavior, it inserts a wrapper around the WhatsApp WebSocket client so that all traffic passing through the library is duplicated for collection. Reported data theft includes WhatsApp authentication tokens and session keys, full message content (sent/received and historical), contact lists (including phone numbers), and transferred media/files. The package also attempts to establish persistent unauthorized access by hijacking the WhatsApp device-linking (“pairing”) workflow using a hardcoded pairing code, effectively linking an attacker-controlled device to the victim’s account; removing the npm dependency does not automatically remove the linked device. To hinder detection, the exfiltration endpoint is hidden behind multiple obfuscation layers, collected data is encrypted (including a custom RSA implementation), and the code includes anti-debugging traps designed to disrupt analysis.
@neoxr/wb
6.0.0-rc.44
by neoxr
Live on npm
Blocked by Socket
This fragment is best characterized as a highly suspicious obfuscated loader/stager rather than benign dependency code. It performs runtime string/value decoding, executes a dynamically constructed function via the `Function` constructor, and explicitly gains access to `window` and CommonJS primitives (`require`, `module`, `exports`) through injected getters/setters. While the excerpt does not show concrete exfiltration or file/network operations, the loader pattern and capability surface strongly indicate malicious intent or, at minimum, a code-execution mechanism that should not be trusted without deobfuscation and sandboxed behavioral analysis.
gh555.export-docx
16.2.2
by kkn1n
Live on openvsx
Blocked by Socket
Security risk is high. This module automates media downloading, but it also performs explicit browser cookie harvesting (document.cookie and CDP Network.getCookies) and then reuses the captured cookies/referrer/origin as HTTP/yt-dlp request headers for remote downloads. Additionally, it spawns external binaries (yt-dlp/ffmpeg/PowerShell/Chromium) and manages a local Python broker with auto-install behavior, significantly increasing execution and supply-chain attack surface. This combination is strongly privacy-invasive and plausibly credential/session misuse rather than benign media exporting.
apple-infra-final-escape
1.7.0
by raya4321
Live on npm
Blocked by Socket
This module is strongly malicious: it performs credential harvesting (environment and ~/.npmrc), persists the harvested npm token into a local `.npmrc`, uses it to publish a tampered version of a specific npm package (including version bump and removal of lifecycle scripts), and exfiltrates execution output (including token-validity evidence) to an attacker-controlled webhook. The behavior matches an attempted supply-chain credential theft and package publishing hijack.
gh555.export-doc
16.2.2
by kkn1n
Live on openvsx
Blocked by Socket
This extension fragment contains a high-risk credential theft workflow: it uses Chrome DevTools Protocol to extract media URLs and explicitly captures document.cookie (and can fetch cookies via Network.getCookies). Those cookies are then reused as HTTP headers (Cookie/Referer/Origin) for subsequent downloads via yt-dlp/HTTP. This is a strong indicator of malicious privacy invasion/data theft rather than benign media downloading. Additionally, it spawns external binaries (yt-dlp, ffmpeg/ffprobe, Python broker, Chromium) and can auto-install/auto-manage them, increasing supply-chain/behavior risk.
@atls/code-runtime
2.1.26
by torinasakura
Live on npm
Blocked by Socket
This fragment is a base64-backed file-dropper that writes an attacker-controlled directory tree to a caller-provided destination. The embedded decoded content strongly resembles CI/CD workflow and shell automation that performs secret-based registry authentication and downloads/extracts/installs artifacts—behavior commonly used in supply-chain attacks to achieve persistence and propagation via CI execution. Even though the module itself does not run commands, it substantially increases risk because it stages dangerous automation/config files for later execution.
bingocode
1.0.36
by leanchy
Live on npm
Blocked by Socket
This module is a high-capability Windows automation/remote-control component combining screen capture (returned as base64 via stdout), clipboard read/write/paste injection, comprehensive mouse/keyboard control, and window/process/app reconnaissance, plus an app-launch pathway with a high-risk subprocess fallback using shell=True. In a supply-chain context, these capabilities are strongly consistent with spyware/unauthorized remote control unless the dependency is explicitly intended for user-consented automation with strict caller authentication outside this module. Treat as high security risk for sensitive environments.
@neoxr/wb
6.0.0-rc.44
by neoxr
Live on npm
Blocked by Socket
High-confidence identification of an obfuscated packer/loader. It uses anti-analysis string-table rotation plus dynamic Function(...) execution and injects browser/Node globals (window/require/module/exports) into the execution context. While the provided fragment does not show concrete exfiltration or persistence primitives directly, the loader pattern is commonly used to hide malicious behavior; the decoded payload must be inspected in a sandbox to confirm intent.
Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.
Possible typosquat attack
Known malware
Git dependency
GitHub dependency
HTTP dependency
Obfuscated code
Suspicious Stars on GitHub
Telemetry
Protestware or potentially unwanted behavior
Unstable ownership
Critical CVE
High CVE
Medium CVE
Low CVE
Unpopular package
Minified code
Bad dependency semver
Wildcard dependency
Socket optimized override available
Deprecated
Unmaintained
Explicitly Unlicensed Item
License Policy Violation
Misc. License Issues
Ambiguous License Classifier
Copyleft License
License exception
No License Found
Non-permissive License
Unidentified License
Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.
Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Nat Friedman
CEO at GitHub

Suz Hinton
Senior Software Engineer at Stripe
heck yes this is awesome!!! Congrats team 🎉👏

Matteo Collina
Node.js maintainer, Fastify lead maintainer
So awesome to see @SocketSecurity launch with a fresh approach! Excited to have supported the team from the early days.

DC Posch
Director of Technology at AppFolio, CTO at Dynasty
This is going to be super important, especially for crypto projects where a compromised dependency results in stolen user assets.

Luis Naranjo
Software Engineer at Microsoft
If software supply chain attacks through npm don't scare the shit out of you, you're not paying close enough attention.
@SocketSecurity sounds like an awesome product. I'll be using socket.dev instead of npmjs.org to browse npm packages going forward

Elena Nadolinski
Founder and CEO at Iron Fish
Huge congrats to @SocketSecurity! 🙌
Literally the only product that proactively detects signs of JS compromised packages.

Joe Previte
Engineering Team Lead at Coder
Congrats to @feross and the @SocketSecurity team on their seed funding! 🚀 It's been a big help for us at @CoderHQ and we appreciate what y'all are doing!

Josh Goldberg
Staff Developer at Codecademy
This is such a great idea & looks fantastic, congrats & good luck @feross + team!
The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Scott Roberts
CISO at UiPath
As a happy Socket customer, I've been impressed with how quickly they are adding value to the product, this move is a great step!

Yan Zhu
Head of Security at Brave, DEFCON, EFF, W3C
glad to hear some of the smartest people i know are working on (npm, etc.) supply chain security finally :). @SocketSecurity

Andrew Peterson
CEO and Co-Founder at Signal Sciences (acq. Fastly)
How do you track the validity of open source software libraries as they get updated? You're prob not. Check out @SocketSecurity and the updated tooling they launched.
Supply chain is a cluster in security as we all know and the tools from Socket are "duh" type tools to be implementing. Check them out and follow Feross Aboukhadijeh to see more updates coming from them in the future.

Zbyszek Tenerowicz
Senior Security Engineer at ConsenSys
socket.dev is getting more appealing by the hour

Devdatta Akhawe
Head of Security at Figma
The @SocketSecurity team is on fire! Amazing progress and I am exciting to see where they go next.

Sebastian Bensusan
Engineer Manager at Stripe
I find it surprising that we don't have _more_ supply chain attacks in software:
Imagine your airplane (the code running) was assembled (deployed) daily, with parts (dependencies) from internet strangers. How long until you get a bad part?
Excited for Socket to prevent this

Adam Baldwin
VP of Security at npm, Red Team at Auth0/Okta
Congrats to everyone at @SocketSecurity ❤️🤘🏻

Nico Waisman
CISO at Lyft
This is an area that I have personally been very focused on. As Nat Friedman said in the 2019 GitHub Universe keynote, Open Source won, and every time you add a new open source project you rely on someone else code and you rely on the people that build it.
This is both exciting and problematic. You are bringing real risk into your organization, and I'm excited to see progress in the industry from OpenSSF scorecards and package analyzers to the company that Feross Aboukhadijeh is building!
Questions? Call us at (844) SOCKET-0
Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.
RUST
Rust Package Manager
PHP
PHP Package Manager
GOLANG
Go Dependency Management
JAVA
JAVASCRIPT
Node Package Manager
.NET
.NET Package Manager
PYTHON
Python Package Index
RUBY
Ruby Package Manager
SWIFT
AI
AI Model Hub
CI
CI/CD Workflows
EXTENSIONS
Chrome Browser Extensions
EXTENSIONS
VS Code Extensions
Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.
Nov 23, 2025
Shai Hulud v2
Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.
Nov 05, 2025
Elves on npm
A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.
Jul 04, 2025
RubyGems Automation-Tool Infostealer
Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.
Mar 13, 2025
North Korea's Contagious Interview Campaign
Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.
Jul 23, 2024
Network Reconnaissance Campaign
A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.
Questions? Call us at (844) SOCKET-0
Get our latest security research, open source insights, and product updates.

Company News
Socket has acquired Secure Annex to expand extension security across browsers, IDEs, and AI tools.

Research
/Security News
Socket is tracking cloned Open VSX extensions tied to GlassWorm, with several updated from benign-looking sleepers into malware delivery vehicles.

Product
Reachability analysis for PHP is now available in experimental, helping teams identify which vulnerabilities are actually exploitable.