
Security News
npm Adopts OIDC for Trusted Publishing in CI/CD Workflows
npm now supports Trusted Publishing with OIDC, enabling secure package publishing directly from CI/CD workflows without relying on long-lived tokens.
Quickly evaluate the security and health of any open source package.
asyncconfigreader
0.5
Removed from PyPI
Blocked by Socket
The code is configured to collect sensitive user data and maintain persistence, which could be used maliciously if the full logic were implemented. The absence of actual data extraction or network communication logic in the provided code does not negate the potential for misuse.
Live on PyPI for 2 days, 2 hours and 45 minutes before removal. Socket users were protected even while the package was live.
visitor-ui-component-library-icons
6.999.999
Removed from npm
Blocked by Socket
The code uses the exec function to run shell commands, which poses a significant security risk. It could potentially execute malicious code if the input to exec is manipulated. Redirecting output to /dev/null to hide execution details is suspicious.
Live on npm for 41 minutes before removal. Socket users were protected even while the package was live.
@urbancompany/core
431.4.16
by neversummer.69
Live on npm
Blocked by Socket
This code is intentionally obfuscated and uses DNS queries to exfiltrate system information, which could be a significant security risk. The hardcoded domain and the potential data exfiltration raise concerns about privacy violations. This package should be reviewed carefully before being used.
by-skynet
122.6.2
by fearsoff
Removed from npm
Blocked by Socket
This script is highly suspicious and likely malicious. It is making multiple HTTP requests to different URLs and attempting to execute a shell command. This behavior could lead to data exfiltration, system damage, and untrusted code execution.
Live on npm for 1 hour and 24 minutes before removal. Socket users were protected even while the package was live.
dynamic-importer2
2.9.9
by shadowkage69
Removed from npm
Blocked by Socket
This file synchronously reads the contents of "/etc/passwd" (user account information) and gathers OS environment details (home directory, hostname, username, DNS servers) along with package metadata, then serializes them into JSON and POSTs the data over HTTPS to the attacker-controlled domain 0z0bojuxu9spz99c1ijbmv2c036zuqif[.]oastify[.]com. There is no user notification or legitimate purpose for this data collection, and errors are silently ignored, indicating unauthorized data exfiltration and malicious intent.
Live on npm for 4 days, 7 hours and 50 minutes before removal. Socket users were protected even while the package was live.
@kickstartds/swo
1.0.4
by julrich
Live on npm
Blocked by Socket
Cannot perform security analysis due to completely obfuscated source code and incomplete security report. The extreme obfuscation is itself a major red flag indicating potential malicious intent.
hahabott
1.29.3
Removed from PyPI
Blocked by Socket
This file contains a highly destructive malware payload that performs multiple malicious activities. It uses a hardcoded Telegram bot token (7747114378:AAELbz9az63enz_E5AldrJyN94oqJ4DpPk) and admin chat ID (7216718830) to communicate with attackers via the Telegram API at api[.]telegram[.]org. The malware performs data exfiltration by searching for and stealing Python source files from user directories and system locations, then transmitting them to the attacker's Telegram chat. It attempts to disable critical server services including Apache, Nginx, MySQL, and PostgreSQL on both Linux and Windows systems. The payload then executes destructive operations by overwriting files in critical system directories with random data, recursively deleting essential system folders (/bin, /sbin, /lib, /usr, System32), attempting to exhaust disk space by writing up to 100GB of data, and finally forcing a system reboot to finalize the destruction. The malware suppresses exceptions to maintain stealth and operation continuity while sending status updates to the attackers throughout the attack sequence.
Live on PyPI for 4 hours and 6 minutes before removal. Socket users were protected even while the package was live.
paypal-product-picker
5.1.0
by jpdtest1
Removed from npm
Blocked by Socket
The code is designed to collect and transmit system information to external endpoints without user consent, which is indicative of malicious behavior. The hardcoded endpoints and the nature of the data being sent pose a significant security risk.
Live on npm for 3 days and 8 hours before removal. Socket users were protected even while the package was live.
coord-picker
0.8.12
by hanneil
Live on npm
Blocked by Socket
The package contains a hidden payload that targets Russian language users visiting Russian and Belarusian sites. For those users, it will disable user interaction and play a looping audio of the Ukrainian anthem after 3 days. Therefore, it is marked as protestware only because it freezes interactions for many users. This behavior is not disclosed in any documentation of the package and seriously disrupts user experience.
odyssey-commitlint
5.0.0
by npmdev1
Removed from npm
Blocked by Socket
This code sends tracking data without user consent and poses a privacy risk, as well as a potential security risk with the inclusion of package.json. The use of a non-well-known service for the data destination also adds to the risk. This code should be reviewed carefully before use.
Live on npm for 1 day, 19 hours and 57 minutes before removal. Socket users were protected even while the package was live.
templa-konnectify
0.0.1
by srinithin01
Live on npm
Blocked by Socket
The code contains significant security risks due to the presence of hardcoded credentials, tokens, and URLs in the dataBundle. Additionally, the dynamic creation of import statements and execution of actions and triggers using potentially unvalidated input can lead to security vulnerabilities such as code injection. There is no immediate evidence of obfuscation, but the security risks warrant further review.
link-ui-i23n
1.0.0
by c15c01337
Removed from npm
Blocked by Socket
This script is exfiltrating sensitive system information to a remote server without the user's consent. It poses a high security risk and should be considered malicious.
Live on npm for 34 minutes before removal. Socket users were protected even while the package was live.
wix-realtime-backend
3.26.9
Removed from npm
Blocked by Socket
The code uses the exec function to run shell commands, which poses a significant security risk. It could potentially execute malicious code if the input to exec is manipulated. Redirecting output to /dev/null to hide execution details is suspicious.
Live on npm for 24 minutes before removal. Socket users were protected even while the package was live.
aem-headless-web-component
5.0.0
by linggdte66
Removed from npm
Blocked by Socket
The code is malicious as it collects and sends sensitive system information to a remote server without user consent. This poses a significant security risk due to potential data breaches and misuse of collected data.
Live on npm for 10 days, 19 hours and 10 minutes before removal. Socket users were protected even while the package was live.
azure-graphrbac
5.26.1000
Removed from npm
Blocked by Socket
Possible typosquat of azure azure-graphrbac is a malicious package that exfiltrates system (Ex - hostname) and project details to external servers.
Live on npm for 6 hours and 1 minute before removal. Socket users were protected even while the package was live.
nintendo-eshop-card-codes-free-2023-omlet-arcade147
1.0.2
by muhammadharunmiya44
Removed from npm
Blocked by Socket
The script seems to be part of a spamming operation and uses bad security practices, such as hardcoding paths and credentials. Therefore, it's a potential security risk.
Live on npm for 16 days, 17 hours and 6 minutes before removal. Socket users were protected even while the package was live.
azure-graphrbac
6.2.1000
Removed from npm
Blocked by Socket
Possible typosquat of [azure](https://socket.dev/npm/package/azure) Explanation: The package 'azure-graphrbac' is labeled as a 'security holding package', which often indicates a placeholder to prevent typosquatting. The name 'azure-graphrbac' closely resembles legitimate Azure package naming conventions, which could confuse users. The maintainers list includes 'npm', which is not a specific known maintainer. Therefore, it is likely a typosquat.
Live on npm for 51 minutes before removal. Socket users were protected even while the package was live.
hub-http
0.9.999
Removed from npm
Blocked by Socket
The code is malicious and exfiltrates sensitive system data to a remote server. This poses a significant security risk due to the potential for data theft and unauthorized access.
Live on npm for 26 minutes before removal. Socket users were protected even while the package was live.
fixsolara
1.0.8
by gsadhjkkasdhaskdhaskdhasjdashd
Removed from npm
Blocked by Socket
This code demonstrates potentially dangerous behavior by creating and executing an executable with elevated permissions based on hardcoded data. The hardcoded base64 data is suspicious, as it could be any arbitrary executable content. The intent behind this code is unclear, and it could pose a significant security risk if the content is malicious.
Live on npm for 9 days, 7 hours and 27 minutes before removal. Socket users were protected even while the package was live.
youtrack-personal-timetracking
99.10.10
Removed from npm
Blocked by Socket
The code engages in potentially malicious behavior by collecting sensitive system information and sending it to a remote server without clear user consent. The hard-coded domain, data obfuscation, and lack of transparency raise significant privacy and security concerns. The risk score is high due to the invasive nature of the code.
Live on npm for 20 minutes before removal. Socket users were protected even while the package was live.
portal-node-logger
1.0.10
by meow-test
Removed from npm
Blocked by Socket
This script is exfiltrating sensitive system information to a remote server without the user's consent. This behavior is highly suspicious and poses a significant security risk.
Live on npm for 6 minutes before removal. Socket users were protected even while the package was live.
solace-yacht-mev925
1.0.0
by afifaljafari112
Removed from npm
Blocked by Socket
The code primarily imports multiple external libraries and calls a method named 'functame' on each. The unusual naming conventions and lack of clarity around what these functions do raise concerns about potential obfuscation and hidden malicious behavior. Further review of the external libraries is necessary to fully understand the security implications.
Live on npm for 56 days, 17 hours and 10 minutes before removal. Socket users were protected even while the package was live.
bootstrap-base-managed-designs
1.9.9
Removed from npm
Blocked by Socket
The code uses the exec function to run shell commands, which poses a significant security risk. It could potentially execute malicious code if the input to exec is manipulated. Redirecting output to /dev/null to hide execution details is suspicious.
Live on npm for 28 minutes before removal. Socket users were protected even while the package was live.
dependency-block
1.99.99
by faultybiskot
Removed from npm
Blocked by Socket
The source code collects system information and sends it to an external domain using DNS queries. This behavior is indicative of data exfiltration and poses a significant security risk. The code is not heavily obfuscated but uses hexadecimal encoding to send data fragments.
Live on npm for 10 hours and 29 minutes before removal. Socket users were protected even while the package was live.
verdant-whisper-eqd257
1.0.0
by afifaljafari112
Removed from npm
Blocked by Socket
The code imports several suspiciously named modules and invokes a method 'functame' on each of them. This naming convention and lack of clarity in the module names raise red flags. However, the provided code itself does not perform any evident malicious activities or handle any sensitive data directly. Further inspection of the external modules is necessary to fully evaluate potential threats.
Live on npm for 56 days, 21 hours and 59 minutes before removal. Socket users were protected even while the package was live.
asyncconfigreader
0.5
Removed from PyPI
Blocked by Socket
The code is configured to collect sensitive user data and maintain persistence, which could be used maliciously if the full logic were implemented. The absence of actual data extraction or network communication logic in the provided code does not negate the potential for misuse.
Live on PyPI for 2 days, 2 hours and 45 minutes before removal. Socket users were protected even while the package was live.
visitor-ui-component-library-icons
6.999.999
Removed from npm
Blocked by Socket
The code uses the exec function to run shell commands, which poses a significant security risk. It could potentially execute malicious code if the input to exec is manipulated. Redirecting output to /dev/null to hide execution details is suspicious.
Live on npm for 41 minutes before removal. Socket users were protected even while the package was live.
@urbancompany/core
431.4.16
by neversummer.69
Live on npm
Blocked by Socket
This code is intentionally obfuscated and uses DNS queries to exfiltrate system information, which could be a significant security risk. The hardcoded domain and the potential data exfiltration raise concerns about privacy violations. This package should be reviewed carefully before being used.
by-skynet
122.6.2
by fearsoff
Removed from npm
Blocked by Socket
This script is highly suspicious and likely malicious. It is making multiple HTTP requests to different URLs and attempting to execute a shell command. This behavior could lead to data exfiltration, system damage, and untrusted code execution.
Live on npm for 1 hour and 24 minutes before removal. Socket users were protected even while the package was live.
dynamic-importer2
2.9.9
by shadowkage69
Removed from npm
Blocked by Socket
This file synchronously reads the contents of "/etc/passwd" (user account information) and gathers OS environment details (home directory, hostname, username, DNS servers) along with package metadata, then serializes them into JSON and POSTs the data over HTTPS to the attacker-controlled domain 0z0bojuxu9spz99c1ijbmv2c036zuqif[.]oastify[.]com. There is no user notification or legitimate purpose for this data collection, and errors are silently ignored, indicating unauthorized data exfiltration and malicious intent.
Live on npm for 4 days, 7 hours and 50 minutes before removal. Socket users were protected even while the package was live.
@kickstartds/swo
1.0.4
by julrich
Live on npm
Blocked by Socket
Cannot perform security analysis due to completely obfuscated source code and incomplete security report. The extreme obfuscation is itself a major red flag indicating potential malicious intent.
hahabott
1.29.3
Removed from PyPI
Blocked by Socket
This file contains a highly destructive malware payload that performs multiple malicious activities. It uses a hardcoded Telegram bot token (7747114378:AAELbz9az63enz_E5AldrJyN94oqJ4DpPk) and admin chat ID (7216718830) to communicate with attackers via the Telegram API at api[.]telegram[.]org. The malware performs data exfiltration by searching for and stealing Python source files from user directories and system locations, then transmitting them to the attacker's Telegram chat. It attempts to disable critical server services including Apache, Nginx, MySQL, and PostgreSQL on both Linux and Windows systems. The payload then executes destructive operations by overwriting files in critical system directories with random data, recursively deleting essential system folders (/bin, /sbin, /lib, /usr, System32), attempting to exhaust disk space by writing up to 100GB of data, and finally forcing a system reboot to finalize the destruction. The malware suppresses exceptions to maintain stealth and operation continuity while sending status updates to the attackers throughout the attack sequence.
Live on PyPI for 4 hours and 6 minutes before removal. Socket users were protected even while the package was live.
paypal-product-picker
5.1.0
by jpdtest1
Removed from npm
Blocked by Socket
The code is designed to collect and transmit system information to external endpoints without user consent, which is indicative of malicious behavior. The hardcoded endpoints and the nature of the data being sent pose a significant security risk.
Live on npm for 3 days and 8 hours before removal. Socket users were protected even while the package was live.
coord-picker
0.8.12
by hanneil
Live on npm
Blocked by Socket
The package contains a hidden payload that targets Russian language users visiting Russian and Belarusian sites. For those users, it will disable user interaction and play a looping audio of the Ukrainian anthem after 3 days. Therefore, it is marked as protestware only because it freezes interactions for many users. This behavior is not disclosed in any documentation of the package and seriously disrupts user experience.
odyssey-commitlint
5.0.0
by npmdev1
Removed from npm
Blocked by Socket
This code sends tracking data without user consent and poses a privacy risk, as well as a potential security risk with the inclusion of package.json. The use of a non-well-known service for the data destination also adds to the risk. This code should be reviewed carefully before use.
Live on npm for 1 day, 19 hours and 57 minutes before removal. Socket users were protected even while the package was live.
templa-konnectify
0.0.1
by srinithin01
Live on npm
Blocked by Socket
The code contains significant security risks due to the presence of hardcoded credentials, tokens, and URLs in the dataBundle. Additionally, the dynamic creation of import statements and execution of actions and triggers using potentially unvalidated input can lead to security vulnerabilities such as code injection. There is no immediate evidence of obfuscation, but the security risks warrant further review.
link-ui-i23n
1.0.0
by c15c01337
Removed from npm
Blocked by Socket
This script is exfiltrating sensitive system information to a remote server without the user's consent. It poses a high security risk and should be considered malicious.
Live on npm for 34 minutes before removal. Socket users were protected even while the package was live.
wix-realtime-backend
3.26.9
Removed from npm
Blocked by Socket
The code uses the exec function to run shell commands, which poses a significant security risk. It could potentially execute malicious code if the input to exec is manipulated. Redirecting output to /dev/null to hide execution details is suspicious.
Live on npm for 24 minutes before removal. Socket users were protected even while the package was live.
aem-headless-web-component
5.0.0
by linggdte66
Removed from npm
Blocked by Socket
The code is malicious as it collects and sends sensitive system information to a remote server without user consent. This poses a significant security risk due to potential data breaches and misuse of collected data.
Live on npm for 10 days, 19 hours and 10 minutes before removal. Socket users were protected even while the package was live.
azure-graphrbac
5.26.1000
Removed from npm
Blocked by Socket
Possible typosquat of azure azure-graphrbac is a malicious package that exfiltrates system (Ex - hostname) and project details to external servers.
Live on npm for 6 hours and 1 minute before removal. Socket users were protected even while the package was live.
nintendo-eshop-card-codes-free-2023-omlet-arcade147
1.0.2
by muhammadharunmiya44
Removed from npm
Blocked by Socket
The script seems to be part of a spamming operation and uses bad security practices, such as hardcoding paths and credentials. Therefore, it's a potential security risk.
Live on npm for 16 days, 17 hours and 6 minutes before removal. Socket users were protected even while the package was live.
azure-graphrbac
6.2.1000
Removed from npm
Blocked by Socket
Possible typosquat of [azure](https://socket.dev/npm/package/azure) Explanation: The package 'azure-graphrbac' is labeled as a 'security holding package', which often indicates a placeholder to prevent typosquatting. The name 'azure-graphrbac' closely resembles legitimate Azure package naming conventions, which could confuse users. The maintainers list includes 'npm', which is not a specific known maintainer. Therefore, it is likely a typosquat.
Live on npm for 51 minutes before removal. Socket users were protected even while the package was live.
hub-http
0.9.999
Removed from npm
Blocked by Socket
The code is malicious and exfiltrates sensitive system data to a remote server. This poses a significant security risk due to the potential for data theft and unauthorized access.
Live on npm for 26 minutes before removal. Socket users were protected even while the package was live.
fixsolara
1.0.8
by gsadhjkkasdhaskdhaskdhasjdashd
Removed from npm
Blocked by Socket
This code demonstrates potentially dangerous behavior by creating and executing an executable with elevated permissions based on hardcoded data. The hardcoded base64 data is suspicious, as it could be any arbitrary executable content. The intent behind this code is unclear, and it could pose a significant security risk if the content is malicious.
Live on npm for 9 days, 7 hours and 27 minutes before removal. Socket users were protected even while the package was live.
youtrack-personal-timetracking
99.10.10
Removed from npm
Blocked by Socket
The code engages in potentially malicious behavior by collecting sensitive system information and sending it to a remote server without clear user consent. The hard-coded domain, data obfuscation, and lack of transparency raise significant privacy and security concerns. The risk score is high due to the invasive nature of the code.
Live on npm for 20 minutes before removal. Socket users were protected even while the package was live.
portal-node-logger
1.0.10
by meow-test
Removed from npm
Blocked by Socket
This script is exfiltrating sensitive system information to a remote server without the user's consent. This behavior is highly suspicious and poses a significant security risk.
Live on npm for 6 minutes before removal. Socket users were protected even while the package was live.
solace-yacht-mev925
1.0.0
by afifaljafari112
Removed from npm
Blocked by Socket
The code primarily imports multiple external libraries and calls a method named 'functame' on each. The unusual naming conventions and lack of clarity around what these functions do raise concerns about potential obfuscation and hidden malicious behavior. Further review of the external libraries is necessary to fully understand the security implications.
Live on npm for 56 days, 17 hours and 10 minutes before removal. Socket users were protected even while the package was live.
bootstrap-base-managed-designs
1.9.9
Removed from npm
Blocked by Socket
The code uses the exec function to run shell commands, which poses a significant security risk. It could potentially execute malicious code if the input to exec is manipulated. Redirecting output to /dev/null to hide execution details is suspicious.
Live on npm for 28 minutes before removal. Socket users were protected even while the package was live.
dependency-block
1.99.99
by faultybiskot
Removed from npm
Blocked by Socket
The source code collects system information and sends it to an external domain using DNS queries. This behavior is indicative of data exfiltration and poses a significant security risk. The code is not heavily obfuscated but uses hexadecimal encoding to send data fragments.
Live on npm for 10 hours and 29 minutes before removal. Socket users were protected even while the package was live.
verdant-whisper-eqd257
1.0.0
by afifaljafari112
Removed from npm
Blocked by Socket
The code imports several suspiciously named modules and invokes a method 'functame' on each of them. This naming convention and lack of clarity in the module names raise red flags. However, the provided code itself does not perform any evident malicious activities or handle any sensitive data directly. Further inspection of the external modules is necessary to fully evaluate potential threats.
Live on npm for 56 days, 21 hours and 59 minutes before removal. Socket users were protected even while the package was live.
Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.
Known malware
Possible typosquat attack
Chrome Extension Permission
Chrome Extension Wildcard Host Permission
NPM Shrinkwrap
Git dependency
HTTP dependency
Suspicious Stars on GitHub
Protestware or potentially unwanted behavior
Unstable ownership
Critical CVE
High CVE
Medium CVE
Low CVE
Bad dependency semver
Wildcard dependency
Unpopular package
Minified code
Socket optimized override available
Deprecated
Unmaintained
Explicitly Unlicensed Item
License Policy Violation
Misc. License Issues
Non-permissive License
Ambiguous License Classifier
Copyleft License
Unidentified License
No License Found
License exception
Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.
Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.
Nat Friedman
CEO at GitHub
Suz Hinton
Senior Software Engineer at Stripe
heck yes this is awesome!!! Congrats team 🎉👏
Matteo Collina
Node.js maintainer, Fastify lead maintainer
So awesome to see @SocketSecurity launch with a fresh approach! Excited to have supported the team from the early days.
DC Posch
Director of Technology at AppFolio, CTO at Dynasty
This is going to be super important, especially for crypto projects where a compromised dependency results in stolen user assets.
Luis Naranjo
Software Engineer at Microsoft
If software supply chain attacks through npm don't scare the shit out of you, you're not paying close enough attention.
@SocketSecurity sounds like an awesome product. I'll be using socket.dev instead of npmjs.org to browse npm packages going forward
Elena Nadolinski
Founder and CEO at Iron Fish
Huge congrats to @SocketSecurity! 🙌
Literally the only product that proactively detects signs of JS compromised packages.
Joe Previte
Engineering Team Lead at Coder
Congrats to @feross and the @SocketSecurity team on their seed funding! 🚀 It's been a big help for us at @CoderHQ and we appreciate what y'all are doing!
Josh Goldberg
Staff Developer at Codecademy
This is such a great idea & looks fantastic, congrats & good luck @feross + team!
The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.
Scott Roberts
CISO at UiPath
As a happy Socket customer, I've been impressed with how quickly they are adding value to the product, this move is a great step!
Yan Zhu
Head of Security at Brave, DEFCON, EFF, W3C
glad to hear some of the smartest people i know are working on (npm, etc.) supply chain security finally :). @SocketSecurity
Andrew Peterson
CEO and Co-Founder at Signal Sciences (acq. Fastly)
How do you track the validity of open source software libraries as they get updated? You're prob not. Check out @SocketSecurity and the updated tooling they launched.
Supply chain is a cluster in security as we all know and the tools from Socket are "duh" type tools to be implementing. Check them out and follow Feross Aboukhadijeh to see more updates coming from them in the future.
Zbyszek Tenerowicz
Senior Security Engineer at ConsenSys
socket.dev is getting more appealing by the hour
Devdatta Akhawe
Head of Security at Figma
The @SocketSecurity team is on fire! Amazing progress and I am exciting to see where they go next.
Sebastian Bensusan
Engineer Manager at Stripe
I find it surprising that we don't have _more_ supply chain attacks in software:
Imagine your airplane (the code running) was assembled (deployed) daily, with parts (dependencies) from internet strangers. How long until you get a bad part?
Excited for Socket to prevent this
Adam Baldwin
VP of Security at npm, Red Team at Auth0/Okta
Congrats to everyone at @SocketSecurity ❤️🤘🏻
Nico Waisman
CISO at Lyft
This is an area that I have personally been very focused on. As Nat Friedman said in the 2019 GitHub Universe keynote, Open Source won, and every time you add a new open source project you rely on someone else code and you rely on the people that build it.
This is both exciting and problematic. You are bringing real risk into your organization, and I'm excited to see progress in the industry from OpenSSF scorecards and package analyzers to the company that Feross Aboukhadijeh is building!
Depend on Socket to prevent malicious open source dependencies from infiltrating your app.
Install the Socket GitHub App in just 2 clicks and get protected today.
Block 70+ issues in open source code, including malware, typo-squatting, hidden code, misleading packages, permission creep, and more.
Reduce work by surfacing actionable security information directly in GitHub. Empower developers to make better decisions.
Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.
Dec 14, 2023
Hijacked cryptocurrency library adds malware
Widely-used library in cryptocurrency frontend was compromised to include wallet-draining code, following the hijacking of NPM account credentials via phishing.
Jan 06, 2022
Maintainer intentionally adds malware
Rogue maintainer sabotages his own open source package with 100M downloads/month, notably breaking Amazon's AWS SDK.
Nov 15, 2021
npm discovers a platform vulnerability allowing unauthorized publishing of any package
Attackers could publish new versions of any npm package without authorization for multiple years.
Oct 22, 2021
Hijacked package adds cryptominers and password-stealing malware
Multiple packages with 30M downloads/month are hijacked and publish malicious versions directly into the software supply chain.
Nov 26, 2018
Package hijacked adding organization specific backdoors
Obfuscated malware added to a dependency which targeted a single company, went undetected for over a week, and made it into their production build.
Get our latest security research, open source insights, and product updates.
Security News
npm now supports Trusted Publishing with OIDC, enabling secure package publishing directly from CI/CD workflows without relying on long-lived tokens.
Research
/Security News
A RubyGems malware campaign used 60 malicious packages posing as automation tools to steal credentials from social media and marketing tool users.
Security News
The CNA Scorecard ranks CVE issuers by data completeness, revealing major gaps in patch info and software identifiers across thousands of vulnerabilities.