
Product
Announcing Bun and vlt Support in Socket
Bringing supply chain security to the next generation of JavaScript package managers
Quickly evaluate the security and health of any open source package.
bai4578/tofl
4357b530f7bdae1b3b19b98b36c5c402f10cfae9
Live on Hugging Face
Blocked by Socket
This fragment provides an immediate and severe security risk: it executes arbitrary Python code sourced from an environment variable. In most contexts this behaves like a backdoor or remote code execution vector and should be removed, replaced with a safe design (no exec on untrusted input), or guarded by strict validation and cryptographic signing. Treat the package or component containing this code as untrusted until justification and mitigations are provided.
tronyx
0.0.5
Removed from PyPI
Blocked by Socket
This function exhibits clear intent to exfiltrate a supplied private key to a hardcoded remote endpoint and to accept remote control via a 'switcher' endpoint. Even though the payload construction contains bugs (set literal and misspelled key) that may break or alter the transmitted data, the behavior is strongly malicious or privacy-invasive. Do not run this code with real secrets; remove or isolate it and consider it high-risk.
Live on PyPI for 6 hours and 12 minutes before removal. Socket users were protected even while the package was live.
react-erro-roevrlay
1.2.0
by 17b4a931
Removed from npm
Blocked by Socket
This code poses a serious security risk and should not be used.
Live on npm for 13 minutes before removal. Socket users were protected even while the package was live.
sdk-coin-dot
1.0.0
by string-utils-helper
Removed from npm
Blocked by Socket
This file collects system environment data (environment variables, hostname, current working directory), encodes portions of it, and sends it via an HTTP POST request to example[.]com (or its subdomains) without user consent. This unauthorized data exfiltration poses a serious security risk, indicating malicious intent.
Live on npm for 7 hours and 20 minutes before removal. Socket users were protected even while the package was live.
bbc-iplayer-sounds-chatbot
9.9.3
by darkvenomhacker
Removed from npm
Blocked by Socket
The code contains serious security threats, including a reverse shell and data exfiltration to an external server. These actions indicate malicious intent and pose a significant security risk.
Live on npm for 16 minutes before removal. Socket users were protected even while the package was live.
mtxai
0.0.147
Live on PyPI
Blocked by Socket
This module is an automation/scraping worker that intentionally executes code provided by task descriptions. That design requires trusting the task source. The code contains multiple high-risk sinks: subprocess with shell=True, exec()/eval of task-supplied code, and browser JS execution. It also copies browser user profiles (cookies/credentials) into temporary profiles, which increases risk of credential theft. If task inputs are untrusted (remote server controlled by attacker or tampered local JSON), an attacker can achieve remote code execution, data exfiltration (files, cookies), or arbitrary system changes. Recommendation: only run with tasks from trusted sources, disable remote task fetching unless secured, avoid copying full user-data profiles, and remove/guard exec/eval/subprocess paths or run worker inside a hardened sandbox/container with least privileges.
tx-engine
0.5.6
Live on PyPI
Blocked by Socket
The code contains a critical security flaw: untrusted input can be executed via eval(op), enabling arbitrary code execution. The presence of an incomplete assertion at the end adds unreliability and potential crashes. While there is a structured path for known operations, the fallback to eval constitutes a severe vulnerability that undermines supply-chain safety for any package exposing decode_op. Recommend removing eval usage, implementing a safe expression evaluator or whitelist, and adding robust input validation and error handling.
@platform-clientextensions/rum-web
999.999.1002
by freeboldsec
Live on npm
Blocked by Socket
This source code is a malicious proof-of-concept demonstrating a Dependency Confusion attack that achieves Remote Code Execution and exfiltrates sensitive system information to an external server. It executes system commands without user consent, collects extensive environment data, and sends it over the network, constituting a severe supply chain security risk. The code is not obfuscated but clearly malicious and should be treated as a high severity threat. The callback URL and command execution indicate intent to compromise target systems. Immediate remediation and blocking of this package are recommended.
socket.oi
4.5.2
by xwlazssz
Removed from npm
Blocked by Socket
The code has clear signs of malicious intent. It attempts to fetch a key from an external server, uses this key to encrypt files on the local system, and overwrites the original files. Additionally, it fetches and writes a file from another external URL, likely serving as a ransom note. These actions suggest a ransomware attack.
Live on npm for 18 minutes before removal. Socket users were protected even while the package was live.
jpbkgmamfnkcmmakaoacpcjboglfmhgn
1.1.1
Live on Chrome
Blocked by Socket
The code collects page conversation data and explicitly harvests Facebook cookies for a messenger/ajax endpoint, then sends both to a remote API endpoint. This is a direct credential/data exfiltration flow and represents a high security risk: if API_ENDPOINT is attacker-controlled or inadequately protected, an adversary could use the cookies to impersonate the user and access their Facebook account or private messages. Recommended actions: block or scrutinize this extension until API_ENDPOINT and developer intent are verified; require explicit documented user consent for cookie transmission; remove cookie harvesting and adopt secure delegated auth (OAuth) or server-side flows that do not require raw session cookies. Manual review of the extension's manifest and API_ENDPOINT is required to determine intent.
vasprocar
1.1.19.90
Removed from PyPI
Blocked by Socket
This fragment appears to be part of a legitimate DOS/pDOS post-processing tool for Quantum ESPRESSO, but it uses multiple high-risk patterns: executing external Python files (exec(open(...).read())), copying and injecting variable content into a script and then executing it, and using bare excepts that suppress errors. These behaviors make the module vulnerable to supply-chain or local-file-tampering attacks: if an attacker can modify files in main_dir or dir_files (or influence the variables used to build filenames), they can achieve arbitrary code execution with the same privileges as the user running this script. I did not find explicit malicious payloads (no networking/exfiltration, no reverse shell code, no hardcoded secrets), so the code itself looks more insecure than intentionally malicious. Recommendation: avoid exec on arbitrary files; validate and/or cryptographically verify any scripts before executing; minimize use of globals and prefer importing modules safely; sanitize inputs and fail loudly rather than swallowing exceptions. Also review the rest of the project for places that set the variables used to build filenames. Note: the fragment contains multiple syntax errors and appears truncated which reduces certainty of the analysis.
Live on PyPI for 1 day, 14 hours and 7 minutes before removal. Socket users were protected even while the package was live.
@gamely/gly-cli
0.3.4
by rodrigodornelles
Live on npm
Blocked by Socket
HIGH RISK: This module executes an opaque, embedded Lua program (base64+zlib) inside an embedded Lua VM and intentionally exposes powerful host functions (child_process.execSync and fs.*) to that program. That allows the payload to run arbitrary shell commands, read/modify any files the process user can access, create persistence, and exfiltrate data. Until the inflated Lua source is inspected and the host API surface is strictly limited or removed, this package should be treated as untrusted and avoided in production or supply-chain-critical contexts. If you must run it, run inside a strong sandbox (container with no host filesystem mounts, no network, least privilege user), or better: reject the package or require a full audit of PB.
config-storages
3.41.2
by helloeveryone
Removed from npm
Blocked by Socket
The code contains a high probability of malicious behavior, particularly due to the file operations and external script execution that are indicative of a malware payload deployment.
Live on npm for 3 hours and 34 minutes before removal. Socket users were protected even while the package was live.
sh-py
12.23
Live on PyPI
Blocked by Socket
The module exhibits multiple high-risk behaviors consistent with malicious or highly unsafe supply-chain activity: writing hardcoded PyPI credentials, self-modifying source to change package identity, executing shell commands (with injection risk), creating and executing generated Python code during install, and automatically uploading packages to PyPI. Even with some coding errors, the capabilities present are sufficient to enable unauthorized package publication and remote code execution in environments that run this code. Do not execute this file in production, CI, or privileged environments. Treat as high-risk; remove credential-writing, self-modification, and arbitrary-execution hooks and audit all packaging scripts before use.
ban-notifier7
1.0.6
by sankargosutwo
Removed from npm
Blocked by Socket
This script installs a package from an external source and includes a command injection risk, making it highly suspicious and potentially malicious.
Live on npm for 12 hours and 18 minutes before removal. Socket users were protected even while the package was live.
hackingtools
3.0.0.942
Live on PyPI
Blocked by Socket
The code demonstrates high-risk behavior typical of dropper/packer-like workflows: encrypted payloads embedded in stubs, base64-wrapped code executed at runtime, and optional packaging into executables. While there are syntax anomalies and incomplete branches that prevent immediate execution, the overall pattern is aligned with covert payload delivery or supply-chain risk. Thorough review of the complete, verified source is required before use; treat as dangerous and isolate until confirmed safe.
mdeofjadannamlfokjpnepoldkkdcffj
2.8.4
Live on Chrome
Blocked by Socket
This script exhibits malicious/suspicious behavior: dynamic remote configuration, stealthy collection of public IP and page title, sending that data to a Telegram account (using a token obtained from the remote config), and performing client-side redirects based on regex rules from remote config. These are supply-chain/backdoor-style behaviors that can be used for tracking, targeted redirection, phishing, or other abuse. The package should be treated as dangerous and not trusted unless you can verify the source and intended behavior and ensure the remote config is benign.
tailwindcss-color-icons-lite
1.0.2
by peter_soria525582
Live on npm
Blocked by Socket
The code is a clear security threat exhibiting malicious behavior: it exfiltrates sensitive environment variables to a suspicious external server and executes arbitrary code received from that server. The obfuscation and use of eval confirm intent to hide this backdoor functionality. This module should be considered malware and avoided.
ucs-availability-status-chart
4.99.99
Removed from npm
Blocked by Socket
The code uses the exec function to run shell commands, which poses a significant security risk. It could potentially execute malicious code if the input to exec is manipulated. Redirecting output to /dev/null to hide execution details is suspicious.
Live on npm for 14 minutes before removal. Socket users were protected even while the package was live.
regscale-cli
6.20.7.0
Live on PyPI
Blocked by Socket
This obfuscated Python module prompts for a user password, generates or loads a symmetric Fernet key into a hidden directory, and then encrypts or decrypts files in-place based on their extensions. All string constants (file paths, commands, extensions) are built via indexing into a single alphabet string to thwart analysis. It writes key and token files to disk, calls os.system under specific OS checks, and uses sys.exit to abort on failed validation. There are no network calls, but the script will irreversibly overwrite user files with ciphertext until the correct password is supplied—matching ransomware-like behavior and posing a severe risk to data integrity if executed without isolation.
bapy
0.2.186
Live on PyPI
Blocked by Socket
Malicious bash initialization script that performs destructive filesystem operations on macOS systems. When the external helper script 'isuserdarwin.sh' returns true, the script silently executes 'sudo rm -rf' to delete critical user directories including ~/Applications, ~/Movies, ~/Music, ~/Pictures, ~/Public, and ~/Sites without user confirmation. It also removes the macOS sleepimage file at /private/var/vm/sleepimage. The script modifies SSH directory permissions using 'sudo chmod -R go-rw' which can break SSH access or expose credentials. All destructive operations have their output suppressed with '>/dev/null 2>&1' to hide failures and make the actions stealthy. The script uses eval to execute the output of /usr/bin/dircolors, creating a command injection risk if the binary is compromised. It depends on external scripts (paper.sh, isuserdarwin.sh, debug.sh) whose contents are unknown and could execute arbitrary code. The destructive operations are embedded within what appears to be routine shell configuration code, likely to disguise the malicious intent.
azure-graphrbac
8.0.1
Removed from npm
Blocked by Socket
The code exhibits clear signs of malicious behavior by exfiltrating sensitive system and project data to external servers without user consent. The use of suspicious domains and the nature of the data being sent indicate a high risk of data theft and potential exploitation.
Live on npm for 55 minutes before removal. Socket users were protected even while the package was live.
qg-toolkit
1.1.6
Live on PyPI
Blocked by Socket
The script collects sensitive user information from the Discord API, including usernames, emails, and IDs, and saves it to a file without user consent. It automates interactions with Discord, including sending unsolicited messages to channels (spamming), and uses a captcha solving service to bypass security measures. The script contains hardcoded API keys and tokens, posing significant security risks if shared or leaked. Additionally, it includes obfuscated JavaScript code to manipulate local storage tokens, suggesting attempts to hijack or misuse user accounts.
gidejehfgombmkfflghejpncblgfkagj
4.27.10
Live on Chrome
Blocked by Socket
This is malicious code designed for user tracking and e-commerce data scraping. It continuously monitors user navigation and DOM changes, then sends this data to a Chrome extension background script while triggering store scraping functionality. The obfuscated nature and suspicious 'injectStoreScrapers' action indicate clear malicious intent for data harvesting.
iparapheur-utils-beta
0.0.1.post587159
Live on PyPI
Blocked by Socket
The code intentionally resets the Alfresco 'admin' account password to a hardcoded hash and restarts the Alfresco service. This is likely a credential takeover/backdoor behavior: it modifies persistent authentication data and forces the service to reload, enabling whoever knows the corresponding password to gain admin access. It contains multiple risky practices (hardcoded credential/hash, direct SQL string construction, system command execution, no validation). Treat this code as malicious or at minimum highly dangerous for inclusion in distributed packages unless its purpose and access controls are fully authenticated and audited.
bai4578/tofl
4357b530f7bdae1b3b19b98b36c5c402f10cfae9
Live on Hugging Face
Blocked by Socket
This fragment provides an immediate and severe security risk: it executes arbitrary Python code sourced from an environment variable. In most contexts this behaves like a backdoor or remote code execution vector and should be removed, replaced with a safe design (no exec on untrusted input), or guarded by strict validation and cryptographic signing. Treat the package or component containing this code as untrusted until justification and mitigations are provided.
tronyx
0.0.5
Removed from PyPI
Blocked by Socket
This function exhibits clear intent to exfiltrate a supplied private key to a hardcoded remote endpoint and to accept remote control via a 'switcher' endpoint. Even though the payload construction contains bugs (set literal and misspelled key) that may break or alter the transmitted data, the behavior is strongly malicious or privacy-invasive. Do not run this code with real secrets; remove or isolate it and consider it high-risk.
Live on PyPI for 6 hours and 12 minutes before removal. Socket users were protected even while the package was live.
react-erro-roevrlay
1.2.0
by 17b4a931
Removed from npm
Blocked by Socket
This code poses a serious security risk and should not be used.
Live on npm for 13 minutes before removal. Socket users were protected even while the package was live.
sdk-coin-dot
1.0.0
by string-utils-helper
Removed from npm
Blocked by Socket
This file collects system environment data (environment variables, hostname, current working directory), encodes portions of it, and sends it via an HTTP POST request to example[.]com (or its subdomains) without user consent. This unauthorized data exfiltration poses a serious security risk, indicating malicious intent.
Live on npm for 7 hours and 20 minutes before removal. Socket users were protected even while the package was live.
bbc-iplayer-sounds-chatbot
9.9.3
by darkvenomhacker
Removed from npm
Blocked by Socket
The code contains serious security threats, including a reverse shell and data exfiltration to an external server. These actions indicate malicious intent and pose a significant security risk.
Live on npm for 16 minutes before removal. Socket users were protected even while the package was live.
mtxai
0.0.147
Live on PyPI
Blocked by Socket
This module is an automation/scraping worker that intentionally executes code provided by task descriptions. That design requires trusting the task source. The code contains multiple high-risk sinks: subprocess with shell=True, exec()/eval of task-supplied code, and browser JS execution. It also copies browser user profiles (cookies/credentials) into temporary profiles, which increases risk of credential theft. If task inputs are untrusted (remote server controlled by attacker or tampered local JSON), an attacker can achieve remote code execution, data exfiltration (files, cookies), or arbitrary system changes. Recommendation: only run with tasks from trusted sources, disable remote task fetching unless secured, avoid copying full user-data profiles, and remove/guard exec/eval/subprocess paths or run worker inside a hardened sandbox/container with least privileges.
tx-engine
0.5.6
Live on PyPI
Blocked by Socket
The code contains a critical security flaw: untrusted input can be executed via eval(op), enabling arbitrary code execution. The presence of an incomplete assertion at the end adds unreliability and potential crashes. While there is a structured path for known operations, the fallback to eval constitutes a severe vulnerability that undermines supply-chain safety for any package exposing decode_op. Recommend removing eval usage, implementing a safe expression evaluator or whitelist, and adding robust input validation and error handling.
@platform-clientextensions/rum-web
999.999.1002
by freeboldsec
Live on npm
Blocked by Socket
This source code is a malicious proof-of-concept demonstrating a Dependency Confusion attack that achieves Remote Code Execution and exfiltrates sensitive system information to an external server. It executes system commands without user consent, collects extensive environment data, and sends it over the network, constituting a severe supply chain security risk. The code is not obfuscated but clearly malicious and should be treated as a high severity threat. The callback URL and command execution indicate intent to compromise target systems. Immediate remediation and blocking of this package are recommended.
socket.oi
4.5.2
by xwlazssz
Removed from npm
Blocked by Socket
The code has clear signs of malicious intent. It attempts to fetch a key from an external server, uses this key to encrypt files on the local system, and overwrites the original files. Additionally, it fetches and writes a file from another external URL, likely serving as a ransom note. These actions suggest a ransomware attack.
Live on npm for 18 minutes before removal. Socket users were protected even while the package was live.
jpbkgmamfnkcmmakaoacpcjboglfmhgn
1.1.1
Live on Chrome
Blocked by Socket
The code collects page conversation data and explicitly harvests Facebook cookies for a messenger/ajax endpoint, then sends both to a remote API endpoint. This is a direct credential/data exfiltration flow and represents a high security risk: if API_ENDPOINT is attacker-controlled or inadequately protected, an adversary could use the cookies to impersonate the user and access their Facebook account or private messages. Recommended actions: block or scrutinize this extension until API_ENDPOINT and developer intent are verified; require explicit documented user consent for cookie transmission; remove cookie harvesting and adopt secure delegated auth (OAuth) or server-side flows that do not require raw session cookies. Manual review of the extension's manifest and API_ENDPOINT is required to determine intent.
vasprocar
1.1.19.90
Removed from PyPI
Blocked by Socket
This fragment appears to be part of a legitimate DOS/pDOS post-processing tool for Quantum ESPRESSO, but it uses multiple high-risk patterns: executing external Python files (exec(open(...).read())), copying and injecting variable content into a script and then executing it, and using bare excepts that suppress errors. These behaviors make the module vulnerable to supply-chain or local-file-tampering attacks: if an attacker can modify files in main_dir or dir_files (or influence the variables used to build filenames), they can achieve arbitrary code execution with the same privileges as the user running this script. I did not find explicit malicious payloads (no networking/exfiltration, no reverse shell code, no hardcoded secrets), so the code itself looks more insecure than intentionally malicious. Recommendation: avoid exec on arbitrary files; validate and/or cryptographically verify any scripts before executing; minimize use of globals and prefer importing modules safely; sanitize inputs and fail loudly rather than swallowing exceptions. Also review the rest of the project for places that set the variables used to build filenames. Note: the fragment contains multiple syntax errors and appears truncated which reduces certainty of the analysis.
Live on PyPI for 1 day, 14 hours and 7 minutes before removal. Socket users were protected even while the package was live.
@gamely/gly-cli
0.3.4
by rodrigodornelles
Live on npm
Blocked by Socket
HIGH RISK: This module executes an opaque, embedded Lua program (base64+zlib) inside an embedded Lua VM and intentionally exposes powerful host functions (child_process.execSync and fs.*) to that program. That allows the payload to run arbitrary shell commands, read/modify any files the process user can access, create persistence, and exfiltrate data. Until the inflated Lua source is inspected and the host API surface is strictly limited or removed, this package should be treated as untrusted and avoided in production or supply-chain-critical contexts. If you must run it, run inside a strong sandbox (container with no host filesystem mounts, no network, least privilege user), or better: reject the package or require a full audit of PB.
config-storages
3.41.2
by helloeveryone
Removed from npm
Blocked by Socket
The code contains a high probability of malicious behavior, particularly due to the file operations and external script execution that are indicative of a malware payload deployment.
Live on npm for 3 hours and 34 minutes before removal. Socket users were protected even while the package was live.
sh-py
12.23
Live on PyPI
Blocked by Socket
The module exhibits multiple high-risk behaviors consistent with malicious or highly unsafe supply-chain activity: writing hardcoded PyPI credentials, self-modifying source to change package identity, executing shell commands (with injection risk), creating and executing generated Python code during install, and automatically uploading packages to PyPI. Even with some coding errors, the capabilities present are sufficient to enable unauthorized package publication and remote code execution in environments that run this code. Do not execute this file in production, CI, or privileged environments. Treat as high-risk; remove credential-writing, self-modification, and arbitrary-execution hooks and audit all packaging scripts before use.
ban-notifier7
1.0.6
by sankargosutwo
Removed from npm
Blocked by Socket
This script installs a package from an external source and includes a command injection risk, making it highly suspicious and potentially malicious.
Live on npm for 12 hours and 18 minutes before removal. Socket users were protected even while the package was live.
hackingtools
3.0.0.942
Live on PyPI
Blocked by Socket
The code demonstrates high-risk behavior typical of dropper/packer-like workflows: encrypted payloads embedded in stubs, base64-wrapped code executed at runtime, and optional packaging into executables. While there are syntax anomalies and incomplete branches that prevent immediate execution, the overall pattern is aligned with covert payload delivery or supply-chain risk. Thorough review of the complete, verified source is required before use; treat as dangerous and isolate until confirmed safe.
mdeofjadannamlfokjpnepoldkkdcffj
2.8.4
Live on Chrome
Blocked by Socket
This script exhibits malicious/suspicious behavior: dynamic remote configuration, stealthy collection of public IP and page title, sending that data to a Telegram account (using a token obtained from the remote config), and performing client-side redirects based on regex rules from remote config. These are supply-chain/backdoor-style behaviors that can be used for tracking, targeted redirection, phishing, or other abuse. The package should be treated as dangerous and not trusted unless you can verify the source and intended behavior and ensure the remote config is benign.
tailwindcss-color-icons-lite
1.0.2
by peter_soria525582
Live on npm
Blocked by Socket
The code is a clear security threat exhibiting malicious behavior: it exfiltrates sensitive environment variables to a suspicious external server and executes arbitrary code received from that server. The obfuscation and use of eval confirm intent to hide this backdoor functionality. This module should be considered malware and avoided.
ucs-availability-status-chart
4.99.99
Removed from npm
Blocked by Socket
The code uses the exec function to run shell commands, which poses a significant security risk. It could potentially execute malicious code if the input to exec is manipulated. Redirecting output to /dev/null to hide execution details is suspicious.
Live on npm for 14 minutes before removal. Socket users were protected even while the package was live.
regscale-cli
6.20.7.0
Live on PyPI
Blocked by Socket
This obfuscated Python module prompts for a user password, generates or loads a symmetric Fernet key into a hidden directory, and then encrypts or decrypts files in-place based on their extensions. All string constants (file paths, commands, extensions) are built via indexing into a single alphabet string to thwart analysis. It writes key and token files to disk, calls os.system under specific OS checks, and uses sys.exit to abort on failed validation. There are no network calls, but the script will irreversibly overwrite user files with ciphertext until the correct password is supplied—matching ransomware-like behavior and posing a severe risk to data integrity if executed without isolation.
bapy
0.2.186
Live on PyPI
Blocked by Socket
Malicious bash initialization script that performs destructive filesystem operations on macOS systems. When the external helper script 'isuserdarwin.sh' returns true, the script silently executes 'sudo rm -rf' to delete critical user directories including ~/Applications, ~/Movies, ~/Music, ~/Pictures, ~/Public, and ~/Sites without user confirmation. It also removes the macOS sleepimage file at /private/var/vm/sleepimage. The script modifies SSH directory permissions using 'sudo chmod -R go-rw' which can break SSH access or expose credentials. All destructive operations have their output suppressed with '>/dev/null 2>&1' to hide failures and make the actions stealthy. The script uses eval to execute the output of /usr/bin/dircolors, creating a command injection risk if the binary is compromised. It depends on external scripts (paper.sh, isuserdarwin.sh, debug.sh) whose contents are unknown and could execute arbitrary code. The destructive operations are embedded within what appears to be routine shell configuration code, likely to disguise the malicious intent.
azure-graphrbac
8.0.1
Removed from npm
Blocked by Socket
The code exhibits clear signs of malicious behavior by exfiltrating sensitive system and project data to external servers without user consent. The use of suspicious domains and the nature of the data being sent indicate a high risk of data theft and potential exploitation.
Live on npm for 55 minutes before removal. Socket users were protected even while the package was live.
qg-toolkit
1.1.6
Live on PyPI
Blocked by Socket
The script collects sensitive user information from the Discord API, including usernames, emails, and IDs, and saves it to a file without user consent. It automates interactions with Discord, including sending unsolicited messages to channels (spamming), and uses a captcha solving service to bypass security measures. The script contains hardcoded API keys and tokens, posing significant security risks if shared or leaked. Additionally, it includes obfuscated JavaScript code to manipulate local storage tokens, suggesting attempts to hijack or misuse user accounts.
gidejehfgombmkfflghejpncblgfkagj
4.27.10
Live on Chrome
Blocked by Socket
This is malicious code designed for user tracking and e-commerce data scraping. It continuously monitors user navigation and DOM changes, then sends this data to a Chrome extension background script while triggering store scraping functionality. The obfuscated nature and suspicious 'injectStoreScrapers' action indicate clear malicious intent for data harvesting.
iparapheur-utils-beta
0.0.1.post587159
Live on PyPI
Blocked by Socket
The code intentionally resets the Alfresco 'admin' account password to a hardcoded hash and restarts the Alfresco service. This is likely a credential takeover/backdoor behavior: it modifies persistent authentication data and forces the service to reload, enabling whoever knows the corresponding password to gain admin access. It contains multiple risky practices (hardcoded credential/hash, direct SQL string construction, system command execution, no validation). Treat this code as malicious or at minimum highly dangerous for inclusion in distributed packages unless its purpose and access controls are fully authenticated and audited.
Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.
Possible typosquat attack
GitHub Actions: GitHub context variable flows to dangerous sink
Known malware
GitHub Actions: Input argument flows to dangerous sink
GitHub Actions: Environment variable flows to dangerous sink
Git dependency
GitHub dependency
AI-detected potential malware
HTTP dependency
Obfuscated code
Critical CVE
High CVE
Medium CVE
Low CVE
Unpopular package
Minified code
Bad dependency semver
Wildcard dependency
Socket optimized override available
Deprecated
Unmaintained
Explicitly Unlicensed Item
License Policy Violation
Misc. License Issues
Ambiguous License Classifier
Copyleft License
License exception
No License Found
Non-permissive License
Unidentified License
Generic alert
Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.
Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Nat Friedman
CEO at GitHub

Suz Hinton
Senior Software Engineer at Stripe
heck yes this is awesome!!! Congrats team 🎉👏

Matteo Collina
Node.js maintainer, Fastify lead maintainer
So awesome to see @SocketSecurity launch with a fresh approach! Excited to have supported the team from the early days.

DC Posch
Director of Technology at AppFolio, CTO at Dynasty
This is going to be super important, especially for crypto projects where a compromised dependency results in stolen user assets.

Luis Naranjo
Software Engineer at Microsoft
If software supply chain attacks through npm don't scare the shit out of you, you're not paying close enough attention.
@SocketSecurity sounds like an awesome product. I'll be using socket.dev instead of npmjs.org to browse npm packages going forward

Elena Nadolinski
Founder and CEO at Iron Fish
Huge congrats to @SocketSecurity! 🙌
Literally the only product that proactively detects signs of JS compromised packages.

Joe Previte
Engineering Team Lead at Coder
Congrats to @feross and the @SocketSecurity team on their seed funding! 🚀 It's been a big help for us at @CoderHQ and we appreciate what y'all are doing!

Josh Goldberg
Staff Developer at Codecademy
This is such a great idea & looks fantastic, congrats & good luck @feross + team!
The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Scott Roberts
CISO at UiPath
As a happy Socket customer, I've been impressed with how quickly they are adding value to the product, this move is a great step!

Yan Zhu
Head of Security at Brave, DEFCON, EFF, W3C
glad to hear some of the smartest people i know are working on (npm, etc.) supply chain security finally :). @SocketSecurity

Andrew Peterson
CEO and Co-Founder at Signal Sciences (acq. Fastly)
How do you track the validity of open source software libraries as they get updated? You're prob not. Check out @SocketSecurity and the updated tooling they launched.
Supply chain is a cluster in security as we all know and the tools from Socket are "duh" type tools to be implementing. Check them out and follow Feross Aboukhadijeh to see more updates coming from them in the future.

Zbyszek Tenerowicz
Senior Security Engineer at ConsenSys
socket.dev is getting more appealing by the hour

Devdatta Akhawe
Head of Security at Figma
The @SocketSecurity team is on fire! Amazing progress and I am exciting to see where they go next.

Sebastian Bensusan
Engineer Manager at Stripe
I find it surprising that we don't have _more_ supply chain attacks in software:
Imagine your airplane (the code running) was assembled (deployed) daily, with parts (dependencies) from internet strangers. How long until you get a bad part?
Excited for Socket to prevent this

Adam Baldwin
VP of Security at npm, Red Team at Auth0/Okta
Congrats to everyone at @SocketSecurity ❤️🤘🏻

Nico Waisman
CISO at Lyft
This is an area that I have personally been very focused on. As Nat Friedman said in the 2019 GitHub Universe keynote, Open Source won, and every time you add a new open source project you rely on someone else code and you rely on the people that build it.
This is both exciting and problematic. You are bringing real risk into your organization, and I'm excited to see progress in the industry from OpenSSF scorecards and package analyzers to the company that Feross Aboukhadijeh is building!
Depend on Socket to prevent malicious open source dependencies from infiltrating your app.
Install the Socket GitHub App in just 2 clicks and get protected today.
Block 70+ issues in open source code, including malware, typo-squatting, hidden code, misleading packages, permission creep, and more.
Reduce work by surfacing actionable security information directly in GitHub. Empower developers to make better decisions.
Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.
Dec 14, 2023
Hijacked cryptocurrency library adds malware
Widely-used library in cryptocurrency frontend was compromised to include wallet-draining code, following the hijacking of NPM account credentials via phishing.
Jan 06, 2022
Maintainer intentionally adds malware
Rogue maintainer sabotages his own open source package with 100M downloads/month, notably breaking Amazon's AWS SDK.
Nov 15, 2021
npm discovers a platform vulnerability allowing unauthorized publishing of any package
Attackers could publish new versions of any npm package without authorization for multiple years.
Oct 22, 2021
Hijacked package adds cryptominers and password-stealing malware
Multiple packages with 30M downloads/month are hijacked and publish malicious versions directly into the software supply chain.
Nov 26, 2018
Package hijacked adding organization specific backdoors
Obfuscated malware added to a dependency which targeted a single company, went undetected for over a week, and made it into their production build.
Get our latest security research, open source insights, and product updates.

Product
Bringing supply chain security to the next generation of JavaScript package managers

Product
A safer, faster way to eliminate vulnerabilities without updating dependencies

Product
Reachability analysis for Ruby is now in beta, helping teams identify which vulnerabilities are truly exploitable in their applications.