
Security News
Feross on TBPN: How North Korea Hijacked Axios
Socket CEO Feross Aboukhadijeh breaks down how North Korea hijacked Axios and what it means for the future of software supply chain security.
Quickly evaluate the security and health of any open source package.
354766/inference-sh/skills/image-upscaling/
7a1895a7127347e1d5f535739db50f807f9c5c0e
Live on socket
Blocked by Socket
[Skill Scanner] Pipe-to-shell or eval pattern detected (AITech 9.1.4) [CI013]
routerxpl
0.9.0
Live on pypi
Blocked by Socket
This fragment implements an exploit workflow for a named DLINK device vulnerability: it takes user-supplied targets, probes them with HTTPS/HTTP GET requests, and—if the probe matches expected indicators—initiates an exploitation attempt by sending another GET request. While the explicit RCE payload is not visible in this snippet (likely handled by inherited/wildcard-imported framework code), the explicit “Remote Code Execution (PoC)” intent plus the probe-then-exploit control flow makes it high-risk and suitable only for controlled security testing with proper authorization.
tx.npoi
1.0.2.3
by TianTeng
Live on nuget
Blocked by Socket
The code is a heavily obfuscated runtime loader/packer which reads encrypted embedded resources, decrypts and verifies them, allocates native memory, writes decrypted bytes into memory (and potentially into other processes), then creates delegates/function pointers to execute that code. It uses direct native APIs (VirtualAlloc, WriteProcessMemory, VirtualProtect, OpenProcess) and low-level Marshal/unsafe operations. These behaviors are classic of an in-memory unpacker/loader and present a high risk for code injection or execution of a hidden payload. Unless you explicitly expect a protected assembly/loader with audited payloads, treat this as malicious/untrusted and avoid using it.
os-remover
0.1.1
Live on pypi
Blocked by Socket
This function intentionally constructs and (when demo is False) executes 'sudo rm -rf /*' via os.system. That action can irreversibly destroy a system if executed with sufficient privileges. The code is explicitly dangerous and should be treated as malicious: remove/quarantine the file/package, audit repository history and contributors, and assume compromise. Do not run this code under any circumstances.
tracing-ethers
0.2.4
Live on cargo
Blocked by Socket
This module acts as a malicious backdoor and data exfiltration tool. It fetches a payload from a hardcoded remote server (`https://hsdf22-tracing-ethers[.]vercel[.]app`) and appends it to the `~/.ssh/authorized_keys` file, granting unauthorized SSH access to the system. Additionally, it reads all environment variables (including attempting to load a `../.env` file), determines the system's local IP address by connecting to `8.8.8.8:53`, and exfiltrates this sensitive information back to the remote server via HTTP POST requests.
naruse-alipay
0.5.0
by shir0ha
Removed from npm
Blocked by Socket
This module does not contain an obvious embedded malware payload, but it intentionally executes arbitrary JavaScript strings fetched at runtime and provides broad platform APIs in the execution context. That design is a significant supply-chain and runtime risk: malicious or compromised remote code, plugins, or misconfigured logging interfaces can execute arbitrary actions (network calls, reading/exfiltrating context or platform data). There are no hard-coded exfil endpoints or credentials found. Treat hotPuller/hotImport sources, registered plugins, and the _logNetworkInterface as sensitive trust boundaries; restrict and validate them and avoid enabling unsafe_run in untrusted contexts.
Live on npm for 5 hours and 10 minutes before removal. Socket users were protected even while the package was live.
github.com/weaveworks/weave
v1.6.1-0.20160728103047-f5a30c790eb0
Live on go
Blocked by Socket
This module is a high-risk runtime packer/dropper: it embeds an encrypted payload, decrypts it using a user-supplied passphrase, writes the result to `bin/do-setup-circleci-secrets`, and immediately executes it. Because there is no integrity/authenticity validation of the decrypted artifact and the executed code is not shown here, the module should be treated as potentially malicious until the decrypted `bin/do-setup-circleci-secrets` content is inspected and validated in a safe environment.
words-with-friends-word-puzzle-apps-on-google-play971
1.0.2
by atiaromaryalab
Removed from npm
Blocked by Socket
The code engages in automated package creation and publishing, with the addition of posting content to WordPress sites using hard-coded credentials. This indicates potential spam or automated SEO manipulation behavior. The code also presents significant security risks due to hard-coded paths and credentials.
Live on npm for 3 hours and 59 minutes before removal. Socket users were protected even while the package was live.
@link-assistant/hive-mind
1.45.0
by konard
Live on npm
Blocked by Socket
The module has a severe supply-chain / remote code execution risk: it conditionally fetches JavaScript from an external CDN at runtime and executes it via eval to create globalThis.use, which then enables filesystem/utility capabilities inside the process. Additionally, the auto-cleanup routine shows intent to run a privileged destructive command ('sudo rm -rf /tmp') when enabled. The module also persists verbose console output to a caller-controlled log file path, increasing the chance of sensitive data being written to disk. Overall, this code warrants immediate review/restriction (e.g., remove runtime eval/fetch, pin/integrity-check dependencies, and disable privileged cleanup by default).
github.com/sourcegraph/sourcegraph
v0.0.0-20210421185522-ee0ac2263832
Live on go
Blocked by Socket
This module is a deliberate destructive utility that corrupts all .zip files in a specified directory by truncating each archive to half its size and appending repeated junk data. While it lacks common malware features like networking or data exfiltration, the behavior is strongly indicative of sabotage and would be unacceptable in most software supply-chain contexts due to its potential to break builds, deployments, or artifact integrity.
oauth2-paypal
6.8.0
by jpdtestjpd
Removed from npm
Blocked by Socket
The file contains code that secretly gathers detailed system information, such as hostname, OS type, platform, release, architecture, local IP addresses, public IP address (fetched via an external API), username, and current working directory. It then transmits this data to external endpoints via HTTP GET and POST requests, and uses a WebSocket connection as a fallback. The endpoints are hardcoded, for example, to URLs like http://example.com/jpd3.php, http://example.com/jpd4.php, and wss://example.com/socket, which are not transparent or verified services. This behavior is indicative of malware designed for unauthorized data exfiltration.
Live on npm for 2 days, 14 hours and 29 minutes before removal. Socket users were protected even while the package was live.
qb2-core
103.99.99
by ypvpctpbamdhxtkzdu
Removed from npm
Blocked by Socket
The script collects detailed system information and sends it to a remote server, which is a significant privacy violation and potentially malicious behavior. This data collection and transmission could be used for unauthorized access or further exploitation.
Live on npm for 7 minutes before removal. Socket users were protected even while the package was live.
fsd
0.1.570
Removed from pypi
Blocked by Socket
The module's purpose is to assemble repository contents, selected working-file contents, and image attachments into a conversational prompt and send it to an external AI gateway to produce architectural plans. I found no signs of deliberate obfuscation, command execution, or classical malware (no reverse shells, no system modification). However, the code will transmit full repository and attachment contents to an external service without redaction or explicit checks, creating a high risk of sensitive data leakage (secrets, private code, proprietary designs). If you plan to use this code, treat it as a data-exfiltration risk: review and restrict what is read and sent (redact secrets, require user confirmation, limit file types, or run the AI gateway in a controlled environment).
Live on pypi for 5 days, 10 hours and 53 minutes before removal. Socket users were protected even while the package was live.
354766/Lightprotocol/skills/token-distribution/
f3b0f11955ae8762f1cbd79491ba5bfaad3921ac
Live on socket
Blocked by Socket
[Skill Scanner] Natural language instruction to download and install from URL detected The provided documentation and code snippets are legitimate examples for compressed SPL token distribution and do not contain direct signs of malware, obfuscation, or hidden backdoors. Primary concerns are operational and supply-chain: protect the payer private key (use hardware wallets or secure key management, avoid committing keys to repos/CI), prefer trusted RPC nodes or verified third-party services, and audit any referenced example programs before deploying them in production. Exercise standard dependency hygiene (pin versions, review npm/GitHub packages) and treat 'not audited' sample programs as potentially risky until reviewed. LLM verification: The file is legitimate documentation for a high‑privilege operation (distributing compressed SPL tokens) and contains code that, when executed with a payer private key, can move tokens on-chain. There are no direct indicators of embedded malware in the supplied text, but the combination of unpinned third‑party npm dependencies, reliance on user‑provided RPC endpoints, and lack of enforced transaction confirmation represent moderate supply‑chain and operational risks. Recommend enforcing explicit
pyro4
4.30
Live on pypi
Blocked by Socket
This module intentionally exposes remote code-execution and remote-administration capabilities over Pyro4. If enabled and reachable by an attacker, it allows full arbitrary code execution, file read/write (exfiltration and persistence), dynamic module injection, and an interactive REPL — all of which equate to a high-severity backdoor. Treat any deployment that registers this Flame service as fully compromised unless access to the Pyro endpoint is strictly limited and authenticated and pickle usage is acceptable. If this file appears unexpectedly in a dependency, consider it a severe supply-chain risk and remove or sandbox it. Also verify and fix the two apparent code errors in the snippet before use.
@ikeacn/icons
99.9.9
by test-harss25
Live on npm
Blocked by Socket
This code constructs a DNS name embedding the local username and hostname and performs a DNS lookup to an externally controlled domain (oastify.com). That behavior constitutes data leakage via DNS and is highly suspicious. Treat as malicious or unwanted telemetry unless explicitly required and documented (e.g., authorized security testing). Remove, sandbox, or audit the call and the external domain before using the package in production.
retact-vrtualiied
1.2.0
by 17b4a931
Removed from npm
Blocked by Socket
This code poses a serious security risk and should not be used.
Live on npm for 46 minutes before removal. Socket users were protected even while the package was live.
dprojects.dish
2.0.1192
by marcdp, Marc Delos Poch, DProjects
Live on nuget
Blocked by Socket
This script performs legitimate-sounding provisioning tasks but contains multiple high-risk actions that are consistent with establishing a persistent backdoor: it creates a privileged OS user with an empty password, mounts the host filesystem into the environment, and installs a persistent service that exposes an interactive console via a named pipe while skipping reauthentication. Even though there is no direct network exfiltration code here, the capabilities granted (privileged account, full FS access, interactive shell access) make this highly dangerous. Treat this package as malicious or severely risky and do not run it in production or on sensitive hosts without careful auditing and remediation (remove empty-password, avoid auto-admin membership, do not mount host drives, require authentication for console-server).
omnibus
0.0.30
Live on pypi
Blocked by Socket
This module intentionally exposes a full, unauthenticated interactive Python REPL over a Unix-domain socket. That design yields direct in-process arbitrary code execution and broad access to the host process globals and resources. It should be treated as a high security risk: avoid shipping or enabling this in production, restrict socket access with filesystem permissions, add authentication/authorization, or remove the feature. If discovered in a deployed system, treat it as a potential backdoor and investigate connections and created socket files.
@skyzopedia/baileys-mod
6.0.11
by skyzopedia
Live on npm
Blocked by Socket
`lotusbail` is a malicious npm package that masquerades as a WhatsApp Web API library by forking legitimate Baileys-based code and preserving working messaging functionality. In addition to normal API behavior, it inserts a wrapper around the WhatsApp WebSocket client so that all traffic passing through the library is duplicated for collection. Reported data theft includes WhatsApp authentication tokens and session keys, full message content (sent/received and historical), contact lists (including phone numbers), and transferred media/files. The package also attempts to establish persistent unauthorized access by hijacking the WhatsApp device-linking (“pairing”) workflow using a hardcoded pairing code, effectively linking an attacker-controlled device to the victim’s account; removing the npm dependency does not automatically remove the linked device. To hinder detection, the exfiltration endpoint is hidden behind multiple obfuscation layers, collected data is encrypted (including a custom RSA implementation), and the code includes anti-debugging traps designed to disrupt analysis.
django-avishan
0.1.2
Live on pypi
Blocked by Socket
This script is a high-risk deployment helper. It contains hard-coded GitLab credentials embedded into git pull URLs and writes those credentials into ~/.bashrc as aliases — a severe security issue (credential leakage, persistent plaintext storage). It also runs with escalated privileges (sudo) to write systemd and nginx configuration files. Even if intended as a convenience for the author, the practice is unsafe and could enable unauthorized access, secrets leakage, or supply-chain misuse if distributed. Do not run this script on systems you care about. Remove hardcoded credentials, sanitize inputs, avoid storing secrets in ~/.bashrc, and review privilege use before trusting.
pro-shop-dallas-cowboys-free188
1.0.2
by sicrap
Removed from npm
Blocked by Socket
The code exhibits potentially malicious behavior such as unauthorized login attempts and content publishing, as well as obfuscation and hard-coded credentials. The overall security risk is high due to the presence of these factors.
Live on npm for 12 minutes before removal. Socket users were protected even while the package was live.
354766/inference-sh/skills/image-upscaling/
7a1895a7127347e1d5f535739db50f807f9c5c0e
Live on socket
Blocked by Socket
[Skill Scanner] Pipe-to-shell or eval pattern detected (AITech 9.1.4) [CI013]
routerxpl
0.9.0
Live on pypi
Blocked by Socket
This fragment implements an exploit workflow for a named DLINK device vulnerability: it takes user-supplied targets, probes them with HTTPS/HTTP GET requests, and—if the probe matches expected indicators—initiates an exploitation attempt by sending another GET request. While the explicit RCE payload is not visible in this snippet (likely handled by inherited/wildcard-imported framework code), the explicit “Remote Code Execution (PoC)” intent plus the probe-then-exploit control flow makes it high-risk and suitable only for controlled security testing with proper authorization.
tx.npoi
1.0.2.3
by TianTeng
Live on nuget
Blocked by Socket
The code is a heavily obfuscated runtime loader/packer which reads encrypted embedded resources, decrypts and verifies them, allocates native memory, writes decrypted bytes into memory (and potentially into other processes), then creates delegates/function pointers to execute that code. It uses direct native APIs (VirtualAlloc, WriteProcessMemory, VirtualProtect, OpenProcess) and low-level Marshal/unsafe operations. These behaviors are classic of an in-memory unpacker/loader and present a high risk for code injection or execution of a hidden payload. Unless you explicitly expect a protected assembly/loader with audited payloads, treat this as malicious/untrusted and avoid using it.
os-remover
0.1.1
Live on pypi
Blocked by Socket
This function intentionally constructs and (when demo is False) executes 'sudo rm -rf /*' via os.system. That action can irreversibly destroy a system if executed with sufficient privileges. The code is explicitly dangerous and should be treated as malicious: remove/quarantine the file/package, audit repository history and contributors, and assume compromise. Do not run this code under any circumstances.
tracing-ethers
0.2.4
Live on cargo
Blocked by Socket
This module acts as a malicious backdoor and data exfiltration tool. It fetches a payload from a hardcoded remote server (`https://hsdf22-tracing-ethers[.]vercel[.]app`) and appends it to the `~/.ssh/authorized_keys` file, granting unauthorized SSH access to the system. Additionally, it reads all environment variables (including attempting to load a `../.env` file), determines the system's local IP address by connecting to `8.8.8.8:53`, and exfiltrates this sensitive information back to the remote server via HTTP POST requests.
naruse-alipay
0.5.0
by shir0ha
Removed from npm
Blocked by Socket
This module does not contain an obvious embedded malware payload, but it intentionally executes arbitrary JavaScript strings fetched at runtime and provides broad platform APIs in the execution context. That design is a significant supply-chain and runtime risk: malicious or compromised remote code, plugins, or misconfigured logging interfaces can execute arbitrary actions (network calls, reading/exfiltrating context or platform data). There are no hard-coded exfil endpoints or credentials found. Treat hotPuller/hotImport sources, registered plugins, and the _logNetworkInterface as sensitive trust boundaries; restrict and validate them and avoid enabling unsafe_run in untrusted contexts.
Live on npm for 5 hours and 10 minutes before removal. Socket users were protected even while the package was live.
github.com/weaveworks/weave
v1.6.1-0.20160728103047-f5a30c790eb0
Live on go
Blocked by Socket
This module is a high-risk runtime packer/dropper: it embeds an encrypted payload, decrypts it using a user-supplied passphrase, writes the result to `bin/do-setup-circleci-secrets`, and immediately executes it. Because there is no integrity/authenticity validation of the decrypted artifact and the executed code is not shown here, the module should be treated as potentially malicious until the decrypted `bin/do-setup-circleci-secrets` content is inspected and validated in a safe environment.
words-with-friends-word-puzzle-apps-on-google-play971
1.0.2
by atiaromaryalab
Removed from npm
Blocked by Socket
The code engages in automated package creation and publishing, with the addition of posting content to WordPress sites using hard-coded credentials. This indicates potential spam or automated SEO manipulation behavior. The code also presents significant security risks due to hard-coded paths and credentials.
Live on npm for 3 hours and 59 minutes before removal. Socket users were protected even while the package was live.
@link-assistant/hive-mind
1.45.0
by konard
Live on npm
Blocked by Socket
The module has a severe supply-chain / remote code execution risk: it conditionally fetches JavaScript from an external CDN at runtime and executes it via eval to create globalThis.use, which then enables filesystem/utility capabilities inside the process. Additionally, the auto-cleanup routine shows intent to run a privileged destructive command ('sudo rm -rf /tmp') when enabled. The module also persists verbose console output to a caller-controlled log file path, increasing the chance of sensitive data being written to disk. Overall, this code warrants immediate review/restriction (e.g., remove runtime eval/fetch, pin/integrity-check dependencies, and disable privileged cleanup by default).
github.com/sourcegraph/sourcegraph
v0.0.0-20210421185522-ee0ac2263832
Live on go
Blocked by Socket
This module is a deliberate destructive utility that corrupts all .zip files in a specified directory by truncating each archive to half its size and appending repeated junk data. While it lacks common malware features like networking or data exfiltration, the behavior is strongly indicative of sabotage and would be unacceptable in most software supply-chain contexts due to its potential to break builds, deployments, or artifact integrity.
oauth2-paypal
6.8.0
by jpdtestjpd
Removed from npm
Blocked by Socket
The file contains code that secretly gathers detailed system information, such as hostname, OS type, platform, release, architecture, local IP addresses, public IP address (fetched via an external API), username, and current working directory. It then transmits this data to external endpoints via HTTP GET and POST requests, and uses a WebSocket connection as a fallback. The endpoints are hardcoded, for example, to URLs like http://example.com/jpd3.php, http://example.com/jpd4.php, and wss://example.com/socket, which are not transparent or verified services. This behavior is indicative of malware designed for unauthorized data exfiltration.
Live on npm for 2 days, 14 hours and 29 minutes before removal. Socket users were protected even while the package was live.
qb2-core
103.99.99
by ypvpctpbamdhxtkzdu
Removed from npm
Blocked by Socket
The script collects detailed system information and sends it to a remote server, which is a significant privacy violation and potentially malicious behavior. This data collection and transmission could be used for unauthorized access or further exploitation.
Live on npm for 7 minutes before removal. Socket users were protected even while the package was live.
fsd
0.1.570
Removed from pypi
Blocked by Socket
The module's purpose is to assemble repository contents, selected working-file contents, and image attachments into a conversational prompt and send it to an external AI gateway to produce architectural plans. I found no signs of deliberate obfuscation, command execution, or classical malware (no reverse shells, no system modification). However, the code will transmit full repository and attachment contents to an external service without redaction or explicit checks, creating a high risk of sensitive data leakage (secrets, private code, proprietary designs). If you plan to use this code, treat it as a data-exfiltration risk: review and restrict what is read and sent (redact secrets, require user confirmation, limit file types, or run the AI gateway in a controlled environment).
Live on pypi for 5 days, 10 hours and 53 minutes before removal. Socket users were protected even while the package was live.
354766/Lightprotocol/skills/token-distribution/
f3b0f11955ae8762f1cbd79491ba5bfaad3921ac
Live on socket
Blocked by Socket
[Skill Scanner] Natural language instruction to download and install from URL detected The provided documentation and code snippets are legitimate examples for compressed SPL token distribution and do not contain direct signs of malware, obfuscation, or hidden backdoors. Primary concerns are operational and supply-chain: protect the payer private key (use hardware wallets or secure key management, avoid committing keys to repos/CI), prefer trusted RPC nodes or verified third-party services, and audit any referenced example programs before deploying them in production. Exercise standard dependency hygiene (pin versions, review npm/GitHub packages) and treat 'not audited' sample programs as potentially risky until reviewed. LLM verification: The file is legitimate documentation for a high‑privilege operation (distributing compressed SPL tokens) and contains code that, when executed with a payer private key, can move tokens on-chain. There are no direct indicators of embedded malware in the supplied text, but the combination of unpinned third‑party npm dependencies, reliance on user‑provided RPC endpoints, and lack of enforced transaction confirmation represent moderate supply‑chain and operational risks. Recommend enforcing explicit
pyro4
4.30
Live on pypi
Blocked by Socket
This module intentionally exposes remote code-execution and remote-administration capabilities over Pyro4. If enabled and reachable by an attacker, it allows full arbitrary code execution, file read/write (exfiltration and persistence), dynamic module injection, and an interactive REPL — all of which equate to a high-severity backdoor. Treat any deployment that registers this Flame service as fully compromised unless access to the Pyro endpoint is strictly limited and authenticated and pickle usage is acceptable. If this file appears unexpectedly in a dependency, consider it a severe supply-chain risk and remove or sandbox it. Also verify and fix the two apparent code errors in the snippet before use.
@ikeacn/icons
99.9.9
by test-harss25
Live on npm
Blocked by Socket
This code constructs a DNS name embedding the local username and hostname and performs a DNS lookup to an externally controlled domain (oastify.com). That behavior constitutes data leakage via DNS and is highly suspicious. Treat as malicious or unwanted telemetry unless explicitly required and documented (e.g., authorized security testing). Remove, sandbox, or audit the call and the external domain before using the package in production.
retact-vrtualiied
1.2.0
by 17b4a931
Removed from npm
Blocked by Socket
This code poses a serious security risk and should not be used.
Live on npm for 46 minutes before removal. Socket users were protected even while the package was live.
dprojects.dish
2.0.1192
by marcdp, Marc Delos Poch, DProjects
Live on nuget
Blocked by Socket
This script performs legitimate-sounding provisioning tasks but contains multiple high-risk actions that are consistent with establishing a persistent backdoor: it creates a privileged OS user with an empty password, mounts the host filesystem into the environment, and installs a persistent service that exposes an interactive console via a named pipe while skipping reauthentication. Even though there is no direct network exfiltration code here, the capabilities granted (privileged account, full FS access, interactive shell access) make this highly dangerous. Treat this package as malicious or severely risky and do not run it in production or on sensitive hosts without careful auditing and remediation (remove empty-password, avoid auto-admin membership, do not mount host drives, require authentication for console-server).
omnibus
0.0.30
Live on pypi
Blocked by Socket
This module intentionally exposes a full, unauthenticated interactive Python REPL over a Unix-domain socket. That design yields direct in-process arbitrary code execution and broad access to the host process globals and resources. It should be treated as a high security risk: avoid shipping or enabling this in production, restrict socket access with filesystem permissions, add authentication/authorization, or remove the feature. If discovered in a deployed system, treat it as a potential backdoor and investigate connections and created socket files.
@skyzopedia/baileys-mod
6.0.11
by skyzopedia
Live on npm
Blocked by Socket
`lotusbail` is a malicious npm package that masquerades as a WhatsApp Web API library by forking legitimate Baileys-based code and preserving working messaging functionality. In addition to normal API behavior, it inserts a wrapper around the WhatsApp WebSocket client so that all traffic passing through the library is duplicated for collection. Reported data theft includes WhatsApp authentication tokens and session keys, full message content (sent/received and historical), contact lists (including phone numbers), and transferred media/files. The package also attempts to establish persistent unauthorized access by hijacking the WhatsApp device-linking (“pairing”) workflow using a hardcoded pairing code, effectively linking an attacker-controlled device to the victim’s account; removing the npm dependency does not automatically remove the linked device. To hinder detection, the exfiltration endpoint is hidden behind multiple obfuscation layers, collected data is encrypted (including a custom RSA implementation), and the code includes anti-debugging traps designed to disrupt analysis.
django-avishan
0.1.2
Live on pypi
Blocked by Socket
This script is a high-risk deployment helper. It contains hard-coded GitLab credentials embedded into git pull URLs and writes those credentials into ~/.bashrc as aliases — a severe security issue (credential leakage, persistent plaintext storage). It also runs with escalated privileges (sudo) to write systemd and nginx configuration files. Even if intended as a convenience for the author, the practice is unsafe and could enable unauthorized access, secrets leakage, or supply-chain misuse if distributed. Do not run this script on systems you care about. Remove hardcoded credentials, sanitize inputs, avoid storing secrets in ~/.bashrc, and review privilege use before trusting.
pro-shop-dallas-cowboys-free188
1.0.2
by sicrap
Removed from npm
Blocked by Socket
The code exhibits potentially malicious behavior such as unauthorized login attempts and content publishing, as well as obfuscation and hard-coded credentials. The overall security risk is high due to the presence of these factors.
Live on npm for 12 minutes before removal. Socket users were protected even while the package was live.
Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.
Possible typosquat attack
Known malware
Unstable ownership
Git dependency
GitHub dependency
AI-detected potential malware
HTTP dependency
Obfuscated code
Skill: Pre-execution shell command
Suspicious Stars on GitHub
Critical CVE
High CVE
Medium CVE
Low CVE
Unpopular package
Minified code
Bad dependency semver
Wildcard dependency
Socket optimized override available
Deprecated
Unmaintained
Explicitly Unlicensed Item
License Policy Violation
Misc. License Issues
Ambiguous License Classifier
Copyleft License
License exception
No License Found
Non-permissive License
Unidentified License
Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.
Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Nat Friedman
CEO at GitHub

Suz Hinton
Senior Software Engineer at Stripe
heck yes this is awesome!!! Congrats team 🎉👏

Matteo Collina
Node.js maintainer, Fastify lead maintainer
So awesome to see @SocketSecurity launch with a fresh approach! Excited to have supported the team from the early days.

DC Posch
Director of Technology at AppFolio, CTO at Dynasty
This is going to be super important, especially for crypto projects where a compromised dependency results in stolen user assets.

Luis Naranjo
Software Engineer at Microsoft
If software supply chain attacks through npm don't scare the shit out of you, you're not paying close enough attention.
@SocketSecurity sounds like an awesome product. I'll be using socket.dev instead of npmjs.org to browse npm packages going forward

Elena Nadolinski
Founder and CEO at Iron Fish
Huge congrats to @SocketSecurity! 🙌
Literally the only product that proactively detects signs of JS compromised packages.

Joe Previte
Engineering Team Lead at Coder
Congrats to @feross and the @SocketSecurity team on their seed funding! 🚀 It's been a big help for us at @CoderHQ and we appreciate what y'all are doing!

Josh Goldberg
Staff Developer at Codecademy
This is such a great idea & looks fantastic, congrats & good luck @feross + team!
The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Scott Roberts
CISO at UiPath
As a happy Socket customer, I've been impressed with how quickly they are adding value to the product, this move is a great step!

Yan Zhu
Head of Security at Brave, DEFCON, EFF, W3C
glad to hear some of the smartest people i know are working on (npm, etc.) supply chain security finally :). @SocketSecurity

Andrew Peterson
CEO and Co-Founder at Signal Sciences (acq. Fastly)
How do you track the validity of open source software libraries as they get updated? You're prob not. Check out @SocketSecurity and the updated tooling they launched.
Supply chain is a cluster in security as we all know and the tools from Socket are "duh" type tools to be implementing. Check them out and follow Feross Aboukhadijeh to see more updates coming from them in the future.

Zbyszek Tenerowicz
Senior Security Engineer at ConsenSys
socket.dev is getting more appealing by the hour

Devdatta Akhawe
Head of Security at Figma
The @SocketSecurity team is on fire! Amazing progress and I am exciting to see where they go next.

Sebastian Bensusan
Engineer Manager at Stripe
I find it surprising that we don't have _more_ supply chain attacks in software:
Imagine your airplane (the code running) was assembled (deployed) daily, with parts (dependencies) from internet strangers. How long until you get a bad part?
Excited for Socket to prevent this

Adam Baldwin
VP of Security at npm, Red Team at Auth0/Okta
Congrats to everyone at @SocketSecurity ❤️🤘🏻

Nico Waisman
CISO at Lyft
This is an area that I have personally been very focused on. As Nat Friedman said in the 2019 GitHub Universe keynote, Open Source won, and every time you add a new open source project you rely on someone else code and you rely on the people that build it.
This is both exciting and problematic. You are bringing real risk into your organization, and I'm excited to see progress in the industry from OpenSSF scorecards and package analyzers to the company that Feross Aboukhadijeh is building!
Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.
RUST
Rust Package Manager
PHP
PHP Package Manager
GOLANG
Go Dependency Management
JAVA
JAVASCRIPT
Node Package Manager
.NET
.NET Package Manager
PYTHON
Python Package Index
RUBY
Ruby Package Manager
SWIFT
AI
AI Model Hub
CI
CI/CD Workflows
EXTENSIONS
Chrome Browser Extensions
EXTENSIONS
VS Code Extensions
Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.
Nov 23, 2025
Shai Hulud v2
Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.
Nov 05, 2025
Elves on npm
A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.
Jul 04, 2025
RubyGems Automation-Tool Infostealer
Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.
Mar 13, 2025
North Korea's Contagious Interview Campaign
Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.
Jul 23, 2024
Network Reconnaissance Campaign
A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.
Get our latest security research, open source insights, and product updates.

Security News
Socket CEO Feross Aboukhadijeh breaks down how North Korea hijacked Axios and what it means for the future of software supply chain security.

Security News
OpenSSF has issued a high-severity advisory warning open source developers of an active Slack-based campaign using impersonation to deliver malware.

Research
/Security News
Malicious packages published to npm, PyPI, Go Modules, crates.io, and Packagist impersonate developer tooling to fetch staged malware, steal credentials and wallets, and enable remote access.