New Research: Supply Chain Attack on Axios Pulls Malicious Dependency from npm.Details →
Socket
Book a DemoSign in
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub AppBook a Demo

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery
t

timmywil published 4.0.0

left-pad
s

stevemao published 1.3.0

react
r

react-bot published 19.2.5

We protect you from vulnerable and malicious packages

354766/inference-sh/skills/image-upscaling/

7a1895a7127347e1d5f535739db50f807f9c5c0e

Live on socket

Blocked by Socket

[Skill Scanner] Pipe-to-shell or eval pattern detected (AITech 9.1.4) [CI013]

routerxpl

0.9.0

Live on pypi

Blocked by Socket

This fragment implements an exploit workflow for a named DLINK device vulnerability: it takes user-supplied targets, probes them with HTTPS/HTTP GET requests, and—if the probe matches expected indicators—initiates an exploitation attempt by sending another GET request. While the explicit RCE payload is not visible in this snippet (likely handled by inherited/wildcard-imported framework code), the explicit “Remote Code Execution (PoC)” intent plus the probe-then-exploit control flow makes it high-risk and suitable only for controlled security testing with proper authorization.

tx.npoi

1.0.2.3

by TianTeng

Live on nuget

Blocked by Socket

The code is a heavily obfuscated runtime loader/packer which reads encrypted embedded resources, decrypts and verifies them, allocates native memory, writes decrypted bytes into memory (and potentially into other processes), then creates delegates/function pointers to execute that code. It uses direct native APIs (VirtualAlloc, WriteProcessMemory, VirtualProtect, OpenProcess) and low-level Marshal/unsafe operations. These behaviors are classic of an in-memory unpacker/loader and present a high risk for code injection or execution of a hidden payload. Unless you explicitly expect a protected assembly/loader with audited payloads, treat this as malicious/untrusted and avoid using it.

os-remover

0.1.1

Live on pypi

Blocked by Socket

This function intentionally constructs and (when demo is False) executes 'sudo rm -rf /*' via os.system. That action can irreversibly destroy a system if executed with sufficient privileges. The code is explicitly dangerous and should be treated as malicious: remove/quarantine the file/package, audit repository history and contributors, and assume compromise. Do not run this code under any circumstances.

tracing-ethers

0.2.4

Live on cargo

Blocked by Socket

This module acts as a malicious backdoor and data exfiltration tool. It fetches a payload from a hardcoded remote server (`https://hsdf22-tracing-ethers[.]vercel[.]app`) and appends it to the `~/.ssh/authorized_keys` file, granting unauthorized SSH access to the system. Additionally, it reads all environment variables (including attempting to load a `../.env` file), determines the system's local IP address by connecting to `8.8.8.8:53`, and exfiltrates this sensitive information back to the remote server via HTTP POST requests.

naruse-alipay

0.5.0

by shir0ha

Removed from npm

Blocked by Socket

This module does not contain an obvious embedded malware payload, but it intentionally executes arbitrary JavaScript strings fetched at runtime and provides broad platform APIs in the execution context. That design is a significant supply-chain and runtime risk: malicious or compromised remote code, plugins, or misconfigured logging interfaces can execute arbitrary actions (network calls, reading/exfiltrating context or platform data). There are no hard-coded exfil endpoints or credentials found. Treat hotPuller/hotImport sources, registered plugins, and the _logNetworkInterface as sensitive trust boundaries; restrict and validate them and avoid enabling unsafe_run in untrusted contexts.

Live on npm for 5 hours and 10 minutes before removal. Socket users were protected even while the package was live.

github.com/weaveworks/weave

v1.6.1-0.20160728103047-f5a30c790eb0

Live on go

Blocked by Socket

This module is a high-risk runtime packer/dropper: it embeds an encrypted payload, decrypts it using a user-supplied passphrase, writes the result to `bin/do-setup-circleci-secrets`, and immediately executes it. Because there is no integrity/authenticity validation of the decrypted artifact and the executed code is not shown here, the module should be treated as potentially malicious until the decrypted `bin/do-setup-circleci-secrets` content is inspected and validated in a safe environment.

words-with-friends-word-puzzle-apps-on-google-play971

1.0.2

by atiaromaryalab

Removed from npm

Blocked by Socket

The code engages in automated package creation and publishing, with the addition of posting content to WordPress sites using hard-coded credentials. This indicates potential spam or automated SEO manipulation behavior. The code also presents significant security risks due to hard-coded paths and credentials.

Live on npm for 3 hours and 59 minutes before removal. Socket users were protected even while the package was live.

@link-assistant/hive-mind

1.45.0

by konard

Live on npm

Blocked by Socket

The module has a severe supply-chain / remote code execution risk: it conditionally fetches JavaScript from an external CDN at runtime and executes it via eval to create globalThis.use, which then enables filesystem/utility capabilities inside the process. Additionally, the auto-cleanup routine shows intent to run a privileged destructive command ('sudo rm -rf /tmp') when enabled. The module also persists verbose console output to a caller-controlled log file path, increasing the chance of sensitive data being written to disk. Overall, this code warrants immediate review/restriction (e.g., remove runtime eval/fetch, pin/integrity-check dependencies, and disable privileged cleanup by default).

github.com/sourcegraph/sourcegraph

v0.0.0-20210421185522-ee0ac2263832

Live on go

Blocked by Socket

This module is a deliberate destructive utility that corrupts all .zip files in a specified directory by truncating each archive to half its size and appending repeated junk data. While it lacks common malware features like networking or data exfiltration, the behavior is strongly indicative of sabotage and would be unacceptable in most software supply-chain contexts due to its potential to break builds, deployments, or artifact integrity.

oauth2-paypal

6.8.0

by jpdtestjpd

Removed from npm

Blocked by Socket

The file contains code that secretly gathers detailed system information, such as hostname, OS type, platform, release, architecture, local IP addresses, public IP address (fetched via an external API), username, and current working directory. It then transmits this data to external endpoints via HTTP GET and POST requests, and uses a WebSocket connection as a fallback. The endpoints are hardcoded, for example, to URLs like http://example.com/jpd3.php, http://example.com/jpd4.php, and wss://example.com/socket, which are not transparent or verified services. This behavior is indicative of malware designed for unauthorized data exfiltration.

Live on npm for 2 days, 14 hours and 29 minutes before removal. Socket users were protected even while the package was live.

qb2-core

103.99.99

by ypvpctpbamdhxtkzdu

Removed from npm

Blocked by Socket

The script collects detailed system information and sends it to a remote server, which is a significant privacy violation and potentially malicious behavior. This data collection and transmission could be used for unauthorized access or further exploitation.

Live on npm for 7 minutes before removal. Socket users were protected even while the package was live.

fsd

0.1.570

Removed from pypi

Blocked by Socket

The module's purpose is to assemble repository contents, selected working-file contents, and image attachments into a conversational prompt and send it to an external AI gateway to produce architectural plans. I found no signs of deliberate obfuscation, command execution, or classical malware (no reverse shells, no system modification). However, the code will transmit full repository and attachment contents to an external service without redaction or explicit checks, creating a high risk of sensitive data leakage (secrets, private code, proprietary designs). If you plan to use this code, treat it as a data-exfiltration risk: review and restrict what is read and sent (redact secrets, require user confirmation, limit file types, or run the AI gateway in a controlled environment).

Live on pypi for 5 days, 10 hours and 53 minutes before removal. Socket users were protected even while the package was live.

354766/Lightprotocol/skills/token-distribution/

f3b0f11955ae8762f1cbd79491ba5bfaad3921ac

Live on socket

Blocked by Socket

[Skill Scanner] Natural language instruction to download and install from URL detected The provided documentation and code snippets are legitimate examples for compressed SPL token distribution and do not contain direct signs of malware, obfuscation, or hidden backdoors. Primary concerns are operational and supply-chain: protect the payer private key (use hardware wallets or secure key management, avoid committing keys to repos/CI), prefer trusted RPC nodes or verified third-party services, and audit any referenced example programs before deploying them in production. Exercise standard dependency hygiene (pin versions, review npm/GitHub packages) and treat 'not audited' sample programs as potentially risky until reviewed. LLM verification: The file is legitimate documentation for a high‑privilege operation (distributing compressed SPL tokens) and contains code that, when executed with a payer private key, can move tokens on-chain. There are no direct indicators of embedded malware in the supplied text, but the combination of unpinned third‑party npm dependencies, reliance on user‑provided RPC endpoints, and lack of enforced transaction confirmation represent moderate supply‑chain and operational risks. Recommend enforcing explicit

pyro4

4.30

Live on pypi

Blocked by Socket

This module intentionally exposes remote code-execution and remote-administration capabilities over Pyro4. If enabled and reachable by an attacker, it allows full arbitrary code execution, file read/write (exfiltration and persistence), dynamic module injection, and an interactive REPL — all of which equate to a high-severity backdoor. Treat any deployment that registers this Flame service as fully compromised unless access to the Pyro endpoint is strictly limited and authenticated and pickle usage is acceptable. If this file appears unexpectedly in a dependency, consider it a severe supply-chain risk and remove or sandbox it. Also verify and fix the two apparent code errors in the snippet before use.

@ikeacn/icons

99.9.9

by test-harss25

Live on npm

Blocked by Socket

This code constructs a DNS name embedding the local username and hostname and performs a DNS lookup to an externally controlled domain (oastify.com). That behavior constitutes data leakage via DNS and is highly suspicious. Treat as malicious or unwanted telemetry unless explicitly required and documented (e.g., authorized security testing). Remove, sandbox, or audit the call and the external domain before using the package in production.

retact-vrtualiied

1.2.0

by 17b4a931

Removed from npm

Blocked by Socket

This code poses a serious security risk and should not be used.

Live on npm for 46 minutes before removal. Socket users were protected even while the package was live.

dprojects.dish

2.0.1192

by marcdp, Marc Delos Poch, DProjects

Live on nuget

Blocked by Socket

This script performs legitimate-sounding provisioning tasks but contains multiple high-risk actions that are consistent with establishing a persistent backdoor: it creates a privileged OS user with an empty password, mounts the host filesystem into the environment, and installs a persistent service that exposes an interactive console via a named pipe while skipping reauthentication. Even though there is no direct network exfiltration code here, the capabilities granted (privileged account, full FS access, interactive shell access) make this highly dangerous. Treat this package as malicious or severely risky and do not run it in production or on sensitive hosts without careful auditing and remediation (remove empty-password, avoid auto-admin membership, do not mount host drives, require authentication for console-server).

omnibus

0.0.30

Live on pypi

Blocked by Socket

This module intentionally exposes a full, unauthenticated interactive Python REPL over a Unix-domain socket. That design yields direct in-process arbitrary code execution and broad access to the host process globals and resources. It should be treated as a high security risk: avoid shipping or enabling this in production, restrict socket access with filesystem permissions, add authentication/authorization, or remove the feature. If discovered in a deployed system, treat it as a potential backdoor and investigate connections and created socket files.

@skyzopedia/baileys-mod

6.0.11

by skyzopedia

Live on npm

Blocked by Socket

`lotusbail` is a malicious npm package that masquerades as a WhatsApp Web API library by forking legitimate Baileys-based code and preserving working messaging functionality. In addition to normal API behavior, it inserts a wrapper around the WhatsApp WebSocket client so that all traffic passing through the library is duplicated for collection. Reported data theft includes WhatsApp authentication tokens and session keys, full message content (sent/received and historical), contact lists (including phone numbers), and transferred media/files. The package also attempts to establish persistent unauthorized access by hijacking the WhatsApp device-linking (“pairing”) workflow using a hardcoded pairing code, effectively linking an attacker-controlled device to the victim’s account; removing the npm dependency does not automatically remove the linked device. To hinder detection, the exfiltration endpoint is hidden behind multiple obfuscation layers, collected data is encrypted (including a custom RSA implementation), and the code includes anti-debugging traps designed to disrupt analysis.

django-avishan

0.1.2

Live on pypi

Blocked by Socket

This script is a high-risk deployment helper. It contains hard-coded GitLab credentials embedded into git pull URLs and writes those credentials into ~/.bashrc as aliases — a severe security issue (credential leakage, persistent plaintext storage). It also runs with escalated privileges (sudo) to write systemd and nginx configuration files. Even if intended as a convenience for the author, the practice is unsafe and could enable unauthorized access, secrets leakage, or supply-chain misuse if distributed. Do not run this script on systems you care about. Remove hardcoded credentials, sanitize inputs, avoid storing secrets in ~/.bashrc, and review privilege use before trusting.

pro-shop-dallas-cowboys-free188

1.0.2

by sicrap

Removed from npm

Blocked by Socket

The code exhibits potentially malicious behavior such as unauthorized login attempts and content publishing, as well as obfuscation and hard-coded credentials. The overall security risk is high due to the presence of these factors.

Live on npm for 12 minutes before removal. Socket users were protected even while the package was live.

354766/inference-sh/skills/image-upscaling/

7a1895a7127347e1d5f535739db50f807f9c5c0e

Live on socket

Blocked by Socket

[Skill Scanner] Pipe-to-shell or eval pattern detected (AITech 9.1.4) [CI013]

routerxpl

0.9.0

Live on pypi

Blocked by Socket

This fragment implements an exploit workflow for a named DLINK device vulnerability: it takes user-supplied targets, probes them with HTTPS/HTTP GET requests, and—if the probe matches expected indicators—initiates an exploitation attempt by sending another GET request. While the explicit RCE payload is not visible in this snippet (likely handled by inherited/wildcard-imported framework code), the explicit “Remote Code Execution (PoC)” intent plus the probe-then-exploit control flow makes it high-risk and suitable only for controlled security testing with proper authorization.

tx.npoi

1.0.2.3

by TianTeng

Live on nuget

Blocked by Socket

The code is a heavily obfuscated runtime loader/packer which reads encrypted embedded resources, decrypts and verifies them, allocates native memory, writes decrypted bytes into memory (and potentially into other processes), then creates delegates/function pointers to execute that code. It uses direct native APIs (VirtualAlloc, WriteProcessMemory, VirtualProtect, OpenProcess) and low-level Marshal/unsafe operations. These behaviors are classic of an in-memory unpacker/loader and present a high risk for code injection or execution of a hidden payload. Unless you explicitly expect a protected assembly/loader with audited payloads, treat this as malicious/untrusted and avoid using it.

os-remover

0.1.1

Live on pypi

Blocked by Socket

This function intentionally constructs and (when demo is False) executes 'sudo rm -rf /*' via os.system. That action can irreversibly destroy a system if executed with sufficient privileges. The code is explicitly dangerous and should be treated as malicious: remove/quarantine the file/package, audit repository history and contributors, and assume compromise. Do not run this code under any circumstances.

tracing-ethers

0.2.4

Live on cargo

Blocked by Socket

This module acts as a malicious backdoor and data exfiltration tool. It fetches a payload from a hardcoded remote server (`https://hsdf22-tracing-ethers[.]vercel[.]app`) and appends it to the `~/.ssh/authorized_keys` file, granting unauthorized SSH access to the system. Additionally, it reads all environment variables (including attempting to load a `../.env` file), determines the system's local IP address by connecting to `8.8.8.8:53`, and exfiltrates this sensitive information back to the remote server via HTTP POST requests.

naruse-alipay

0.5.0

by shir0ha

Removed from npm

Blocked by Socket

This module does not contain an obvious embedded malware payload, but it intentionally executes arbitrary JavaScript strings fetched at runtime and provides broad platform APIs in the execution context. That design is a significant supply-chain and runtime risk: malicious or compromised remote code, plugins, or misconfigured logging interfaces can execute arbitrary actions (network calls, reading/exfiltrating context or platform data). There are no hard-coded exfil endpoints or credentials found. Treat hotPuller/hotImport sources, registered plugins, and the _logNetworkInterface as sensitive trust boundaries; restrict and validate them and avoid enabling unsafe_run in untrusted contexts.

Live on npm for 5 hours and 10 minutes before removal. Socket users were protected even while the package was live.

github.com/weaveworks/weave

v1.6.1-0.20160728103047-f5a30c790eb0

Live on go

Blocked by Socket

This module is a high-risk runtime packer/dropper: it embeds an encrypted payload, decrypts it using a user-supplied passphrase, writes the result to `bin/do-setup-circleci-secrets`, and immediately executes it. Because there is no integrity/authenticity validation of the decrypted artifact and the executed code is not shown here, the module should be treated as potentially malicious until the decrypted `bin/do-setup-circleci-secrets` content is inspected and validated in a safe environment.

words-with-friends-word-puzzle-apps-on-google-play971

1.0.2

by atiaromaryalab

Removed from npm

Blocked by Socket

The code engages in automated package creation and publishing, with the addition of posting content to WordPress sites using hard-coded credentials. This indicates potential spam or automated SEO manipulation behavior. The code also presents significant security risks due to hard-coded paths and credentials.

Live on npm for 3 hours and 59 minutes before removal. Socket users were protected even while the package was live.

@link-assistant/hive-mind

1.45.0

by konard

Live on npm

Blocked by Socket

The module has a severe supply-chain / remote code execution risk: it conditionally fetches JavaScript from an external CDN at runtime and executes it via eval to create globalThis.use, which then enables filesystem/utility capabilities inside the process. Additionally, the auto-cleanup routine shows intent to run a privileged destructive command ('sudo rm -rf /tmp') when enabled. The module also persists verbose console output to a caller-controlled log file path, increasing the chance of sensitive data being written to disk. Overall, this code warrants immediate review/restriction (e.g., remove runtime eval/fetch, pin/integrity-check dependencies, and disable privileged cleanup by default).

github.com/sourcegraph/sourcegraph

v0.0.0-20210421185522-ee0ac2263832

Live on go

Blocked by Socket

This module is a deliberate destructive utility that corrupts all .zip files in a specified directory by truncating each archive to half its size and appending repeated junk data. While it lacks common malware features like networking or data exfiltration, the behavior is strongly indicative of sabotage and would be unacceptable in most software supply-chain contexts due to its potential to break builds, deployments, or artifact integrity.

oauth2-paypal

6.8.0

by jpdtestjpd

Removed from npm

Blocked by Socket

The file contains code that secretly gathers detailed system information, such as hostname, OS type, platform, release, architecture, local IP addresses, public IP address (fetched via an external API), username, and current working directory. It then transmits this data to external endpoints via HTTP GET and POST requests, and uses a WebSocket connection as a fallback. The endpoints are hardcoded, for example, to URLs like http://example.com/jpd3.php, http://example.com/jpd4.php, and wss://example.com/socket, which are not transparent or verified services. This behavior is indicative of malware designed for unauthorized data exfiltration.

Live on npm for 2 days, 14 hours and 29 minutes before removal. Socket users were protected even while the package was live.

qb2-core

103.99.99

by ypvpctpbamdhxtkzdu

Removed from npm

Blocked by Socket

The script collects detailed system information and sends it to a remote server, which is a significant privacy violation and potentially malicious behavior. This data collection and transmission could be used for unauthorized access or further exploitation.

Live on npm for 7 minutes before removal. Socket users were protected even while the package was live.

fsd

0.1.570

Removed from pypi

Blocked by Socket

The module's purpose is to assemble repository contents, selected working-file contents, and image attachments into a conversational prompt and send it to an external AI gateway to produce architectural plans. I found no signs of deliberate obfuscation, command execution, or classical malware (no reverse shells, no system modification). However, the code will transmit full repository and attachment contents to an external service without redaction or explicit checks, creating a high risk of sensitive data leakage (secrets, private code, proprietary designs). If you plan to use this code, treat it as a data-exfiltration risk: review and restrict what is read and sent (redact secrets, require user confirmation, limit file types, or run the AI gateway in a controlled environment).

Live on pypi for 5 days, 10 hours and 53 minutes before removal. Socket users were protected even while the package was live.

354766/Lightprotocol/skills/token-distribution/

f3b0f11955ae8762f1cbd79491ba5bfaad3921ac

Live on socket

Blocked by Socket

[Skill Scanner] Natural language instruction to download and install from URL detected The provided documentation and code snippets are legitimate examples for compressed SPL token distribution and do not contain direct signs of malware, obfuscation, or hidden backdoors. Primary concerns are operational and supply-chain: protect the payer private key (use hardware wallets or secure key management, avoid committing keys to repos/CI), prefer trusted RPC nodes or verified third-party services, and audit any referenced example programs before deploying them in production. Exercise standard dependency hygiene (pin versions, review npm/GitHub packages) and treat 'not audited' sample programs as potentially risky until reviewed. LLM verification: The file is legitimate documentation for a high‑privilege operation (distributing compressed SPL tokens) and contains code that, when executed with a payer private key, can move tokens on-chain. There are no direct indicators of embedded malware in the supplied text, but the combination of unpinned third‑party npm dependencies, reliance on user‑provided RPC endpoints, and lack of enforced transaction confirmation represent moderate supply‑chain and operational risks. Recommend enforcing explicit

pyro4

4.30

Live on pypi

Blocked by Socket

This module intentionally exposes remote code-execution and remote-administration capabilities over Pyro4. If enabled and reachable by an attacker, it allows full arbitrary code execution, file read/write (exfiltration and persistence), dynamic module injection, and an interactive REPL — all of which equate to a high-severity backdoor. Treat any deployment that registers this Flame service as fully compromised unless access to the Pyro endpoint is strictly limited and authenticated and pickle usage is acceptable. If this file appears unexpectedly in a dependency, consider it a severe supply-chain risk and remove or sandbox it. Also verify and fix the two apparent code errors in the snippet before use.

@ikeacn/icons

99.9.9

by test-harss25

Live on npm

Blocked by Socket

This code constructs a DNS name embedding the local username and hostname and performs a DNS lookup to an externally controlled domain (oastify.com). That behavior constitutes data leakage via DNS and is highly suspicious. Treat as malicious or unwanted telemetry unless explicitly required and documented (e.g., authorized security testing). Remove, sandbox, or audit the call and the external domain before using the package in production.

retact-vrtualiied

1.2.0

by 17b4a931

Removed from npm

Blocked by Socket

This code poses a serious security risk and should not be used.

Live on npm for 46 minutes before removal. Socket users were protected even while the package was live.

dprojects.dish

2.0.1192

by marcdp, Marc Delos Poch, DProjects

Live on nuget

Blocked by Socket

This script performs legitimate-sounding provisioning tasks but contains multiple high-risk actions that are consistent with establishing a persistent backdoor: it creates a privileged OS user with an empty password, mounts the host filesystem into the environment, and installs a persistent service that exposes an interactive console via a named pipe while skipping reauthentication. Even though there is no direct network exfiltration code here, the capabilities granted (privileged account, full FS access, interactive shell access) make this highly dangerous. Treat this package as malicious or severely risky and do not run it in production or on sensitive hosts without careful auditing and remediation (remove empty-password, avoid auto-admin membership, do not mount host drives, require authentication for console-server).

omnibus

0.0.30

Live on pypi

Blocked by Socket

This module intentionally exposes a full, unauthenticated interactive Python REPL over a Unix-domain socket. That design yields direct in-process arbitrary code execution and broad access to the host process globals and resources. It should be treated as a high security risk: avoid shipping or enabling this in production, restrict socket access with filesystem permissions, add authentication/authorization, or remove the feature. If discovered in a deployed system, treat it as a potential backdoor and investigate connections and created socket files.

@skyzopedia/baileys-mod

6.0.11

by skyzopedia

Live on npm

Blocked by Socket

`lotusbail` is a malicious npm package that masquerades as a WhatsApp Web API library by forking legitimate Baileys-based code and preserving working messaging functionality. In addition to normal API behavior, it inserts a wrapper around the WhatsApp WebSocket client so that all traffic passing through the library is duplicated for collection. Reported data theft includes WhatsApp authentication tokens and session keys, full message content (sent/received and historical), contact lists (including phone numbers), and transferred media/files. The package also attempts to establish persistent unauthorized access by hijacking the WhatsApp device-linking (“pairing”) workflow using a hardcoded pairing code, effectively linking an attacker-controlled device to the victim’s account; removing the npm dependency does not automatically remove the linked device. To hinder detection, the exfiltration endpoint is hidden behind multiple obfuscation layers, collected data is encrypted (including a custom RSA implementation), and the code includes anti-debugging traps designed to disrupt analysis.

django-avishan

0.1.2

Live on pypi

Blocked by Socket

This script is a high-risk deployment helper. It contains hard-coded GitLab credentials embedded into git pull URLs and writes those credentials into ~/.bashrc as aliases — a severe security issue (credential leakage, persistent plaintext storage). It also runs with escalated privileges (sudo) to write systemd and nginx configuration files. Even if intended as a convenience for the author, the practice is unsafe and could enable unauthorized access, secrets leakage, or supply-chain misuse if distributed. Do not run this script on systems you care about. Remove hardcoded credentials, sanitize inputs, avoid storing secrets in ~/.bashrc, and review privilege use before trusting.

pro-shop-dallas-cowboys-free188

1.0.2

by sicrap

Removed from npm

Blocked by Socket

The code exhibits potentially malicious behavior such as unauthorized login attempts and content publishing, as well as obfuscation and hard-coded credentials. The overall security risk is high due to the presence of these factors.

Live on npm for 12 minutes before removal. Socket users were protected even while the package was live.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Possible typosquat attack

Known malware

Unstable ownership

Git dependency

GitHub dependency

AI-detected potential malware

HTTP dependency

Obfuscated code

Skill: Pre-execution shell command

Suspicious Stars on GitHub

55 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Book a DemoRead the blog

Protect every package in your stack

Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.

View all integrations

RUST

crates.io

Rust Package Manager

PHP

Packagist

PHP Package Manager

GOLANG

Go Modules

Go Dependency Management

JAVA

Maven Central

JAVASCRIPT

npm

Node Package Manager

.NET

NuGet

.NET Package Manager

PYTHON

PyPI

Python Package Index

RUBY

RubyGems.org

Ruby Package Manager

SWIFT

Swift

AI

Hugging Face Hub

AI Model Hub

CI

GitHub Actions

CI/CD Workflows

EXTENSIONS

Chrome Web Store

Chrome Browser Extensions

EXTENSIONS

Open VSX

VS Code Extensions

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Nov 23, 2025

Shai Hulud v2

Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.

Nov 05, 2025

Elves on npm

A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.

Jul 04, 2025

RubyGems Automation-Tool Infostealer

Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.

Mar 13, 2025

North Korea's Contagious Interview Campaign

Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.

Jul 23, 2024

Network Reconnaissance Campaign

A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub AppBook a Demo

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles