🚀 Big News: Socket Acquires Coana to Bring Reachability Analysis to Every Appsec Team.Learn more
Socket
Book a DemoInstallSign in
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub AppBook a Demo

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery
t

timmywil published 3.7.1

left-pad
s

stevemao published 1.3.0

react
r

react-bot published 19.1.0

We protect you from vulnerable and malicious packages

my-testeresss

7.0.1

by genevievehanson74

Removed from npm

Blocked by Socket

This script behaves like a bot designed for unauthorized control or data theft. It collects potentially sensitive information from the user's machine, sends it to a remote server via a bot, and downloads and runs potentially harmful executable files. It's highly recommended not to use this package.

Live on npm for 25 minutes before removal. Socket users were protected even while the package was live.

passports-twitter

1.0.5

by taras_lakhai

Removed from npm

Blocked by Socket

This source code is malicious and constitutes a severe security risk. It stealthily collects and exfiltrates sensitive user data without consent, using heavy obfuscation and network communication to a suspicious external server. It should be classified as malware with high confidence and risk, and its use should be strongly discouraged.

Live on npm for 8 hours and 58 minutes before removal. Socket users were protected even while the package was live.

azure-graphrbac

1.3.3

Removed from npm

Blocked by Socket

Possible typosquat of [azure](https://socket.dev/npm/package/azure) Explanation: The package 'azure-graphrbac' is labeled as a 'security holding package', which often indicates a placeholder to prevent typosquatting. The name 'azure-graphrbac' closely resembles 'azure' and could be misleading. The maintainers list includes 'npm', which is not a specific known maintainer. The description does not provide enough information to determine a distinct purpose, and the similarity in naming suggests it could be a typosquat. azure-graphrbac is a security-holding package

Live on npm for 2 hours and 10 minutes before removal. Socket users were protected even while the package was live.

com.bovinelabs.analyzers

9.9.9

by darblfd

Removed from npm

Blocked by Socket

The script is exfiltrating sensitive system information to an external server without user consent, which is indicative of malicious behavior. This poses a significant security risk due to the unauthorized transmission of potentially sensitive data.

Live on npm for 14 days, 18 hours and 26 minutes before removal. Socket users were protected even while the package was live.

evil911

1.0.1

by mesh3l_911

Removed from npm

Blocked by Socket

The script is making a request to a potentially malicious domain that includes the username of the current user. This behavior is highly suspicious and indicates potential data exfiltration or command execution.

Live on npm for 23 days, 14 hours and 7 minutes before removal. Socket users were protected even while the package was live.

ltval

2.3.12

by bullex-ru

Live on npm

Blocked by Socket

This code appears to be a type validation utility ('LTVal') that contains a malicious obfuscated payload hidden within the verifyPackageIntegrity() method. The code is identical to the previously analyzed sample, using the same base64 encoding technique to hide a reverse shell payload. The legitimate-looking validator functions serve as a cover for the malware's true purpose. Upon execution, the deobfuscated code establishes a reverse shell connection to a command & control server via Pastebin. The malware includes anti-debugging checks and persistence mechanisms to maintain access

mb-netmgmt

0.0.49

Live on PyPI

Blocked by Socket

The code contains significant security flaws, particularly in the authentication process, which allows any client to authenticate successfully. This poses a high security risk due to potential unauthorized access and command execution. However, there is no evidence of malicious behavior or obfuscation.

azure-graphrbac

7.6.8

Removed from npm

Blocked by Socket

Possible typosquat of azure - Explanation: The package 'azure-graphrbac' is labeled as a 'security holding package', which often indicates a placeholder to prevent typosquatting. The name 'azure-graphrbac' closely resembles legitimate Azure package naming conventions, which could confuse users. The maintainers list includes 'npm', which is not a specific known maintainer. Therefore, it is likely a typosquat.

Live on npm for 10 hours and 59 minutes before removal. Socket users were protected even while the package was live.

automerge-action

9.9.9

by dextester123456

Removed from npm

Blocked by Socket

The script is designed to send sensitive system information to an external server, posing a significant security risk and indicating malicious intent.

Live on npm for 3 days, 3 hours and 31 minutes before removal. Socket users were protected even while the package was live.

lezer-snowsql

1.99999.0

by ghost0x01

Removed from npm

Blocked by Socket

The script runs 'index.js' and silences all output, which could be a method to hide malicious actions or errors. The safety of this script depends on the contents of 'index.js'.

Live on npm for 16 days, 20 hours and 12 minutes before removal. Socket users were protected even while the package was live.

whisper-keystone-mrf495

1.0.0

by afifaljafari112

Removed from npm

Blocked by Socket

The provided code imports several modules with suspicious names and calls a method named 'functame' on each of them. The intent and functionality of this method are not clear. The naming conventions and module names are unusual and could suggest obfuscation or an attempt to hide malicious behavior. Further investigation of the imported modules is necessary to confirm their legitimacy and intent.

Live on npm for 56 days, 22 hours and 34 minutes before removal. Socket users were protected even while the package was live.

mtsinai-staging

4.0.1

by vaxoo994

Removed from npm

Blocked by Socket

The code is designed to exfiltrate the system's hostname in an encoded format to a remote server, using a custom header that suggests malicious intent. This behavior is indicative of reconnaissance or a part of a command-and-control mechanism in a multi-stage attack. The code should be considered dangerous and not used in its current form.

Live on npm for 9 minutes before removal. Socket users were protected even while the package was live.

fiinquant

0.11.0

Live on PyPI

Blocked by Socket

This code uses multiple obfuscation techniques to hide and execute arbitrary code. The pattern of reversing, base64 encoding, and compressing code before execution is a classic malware technique. Without safely analyzing the decompressed payload, we must consider this highly suspicious and potentially malicious. This pattern is not used for legitimate purposes in open-source packages.

fca_backend

1.18.2

by raul-perez

Removed from npm

Blocked by Socket

The source code contains critical security flaws, including hardcoded credentials and exposed cryptographic keys. These issues pose a high security risk and should be addressed immediately by removing sensitive information from the source code and using secure methods for managing credentials and keys.

Live on npm for 1 hour and 4 minutes before removal. Socket users were protected even while the package was live.

schibsted-style

1.0.0

Removed from npm

Blocked by Socket

Possible typosquat of [geostyler-style](https://socket.dev/npm/package/geostyler-style) Explanation: The package name 'schibsted-style' appears to be designed to closely mimic 'geostyler-style' by modifying the organization/user part while keeping the '-style' suffix intact. This follows patterns of impersonation squatting or compound squatting. Furthermore, its description as a 'security holding package' is particularly suspicious and is a common indicator of malicious intent or deceptive design. The lack of declared maintainers further amplifies the concern. Although the functionality might be intended as a fork, the similarity in name and suspicious metadata suggest that it may be an intentionally deceptive typosquat. Risk level: High).

Live on npm for 3 hours and 27 minutes before removal. Socket users were protected even while the package was live.

multi-module-plugins

6.5.8

by taka14184

Removed from npm

Blocked by Socket

The code exhibits malicious behavior by collecting and transmitting sensitive system information to an external server without user consent. This poses a high security risk and potential for data theft.

Live on npm for 9 days, 14 hours and 48 minutes before removal. Socket users were protected even while the package was live.

maventa_utils

3.0.0

by Plenum

Live on Rubygems

Blocked by Socket

This code performs unauthorized data exfiltration by collecting the local machine's hostname using Socket.gethostname and transmitting it to a suspicious external domain (xgh97ndjb6uy16i7zj6570dv6mcd03os[.]oastify[.]com) via an HTTP GET request. The malicious behavior includes: (1) Silent collection of system identifying information without user consent, (2) Transmission of this data to an untrusted third-party server, (3) Silent exception handling to avoid detection if the network request fails, and (4) Misleading output message suggesting benign callback functionality. The oastify[.]com domain is commonly associated with out-of-band testing and data exfiltration activities. This constitutes a clear privacy violation and security risk, as the hostname can be used for system identification and reconnaissance in potential supply chain attacks. Although a security company is listed in the gemspec file, their url does not resolve to a website.

ctct-theme

9.764.11

by hctct-thm

Removed from npm

Blocked by Socket

The code is designed to exfiltrate environment variables to a remote server, which is a clear security risk and indicates malicious intent. The use of base64 encoding and the specific checks in the filter suggest an attempt to avoid detection.

Live on npm for 25 minutes before removal. Socket users were protected even while the package was live.

@connext/vector-contracts

0.2.5-alpha.4

by rhlsthrm

Live on npm

Blocked by Socket

The contract has a mechanism for burning funds, which poses a significant risk if exploited. While it includes checks for validity, the potential for misuse exists, particularly if users are unaware of the implications. Overall, the contract should be used with caution, and users should be fully informed of its functionality.

fiinquant

0.11.10

Live on PyPI

Blocked by Socket

This file contains obfuscated code that uses a combination of base64 encoding, zlib compression, and string reversal to hide its payload before executing it using exec(). This technique is commonly used in malware to evade detection and execute malicious code. The code's structure makes it impossible to determine the exact payload without decompressing and decoding it, but the deliberate obfuscation and unsafe use of exec() with encoded data indicates malicious intent. This pattern poses a significant security risk as it could execute arbitrary code with the same privileges as the running Python process.

js-node-ethers

5.4.6

by bestbuythis

Removed from npm

Blocked by Socket

The code defines utility functions for encryption, logging, and data manipulation. It contains potential security risks such as hardcoded credentials, connection to a suspicious domain, and an obfuscated encryption algorithm. The lack of error handling and potential vulnerabilities in the spelunk function should be addressed. The code does not appear to contain malware.

Live on npm for 29 days, 12 hours and 18 minutes before removal. Socket users were protected even while the package was live.

up

1.0.1

by tjholowaychuk

Live on npm

Blocked by Socket

This install script downloads and executes a shell script from an external source without any verification, posing a significant security risk.

cvs-components

9.9.999

by jagdish.thavasi

Removed from npm

Blocked by Socket

This script is encoding the hostname and sending it to the CVS server. This behavior is suspicious and could be used for tracking or other malicious purposes.

Live on npm for 3 minutes before removal. Socket users were protected even while the package was live.

eslint-plugin-lexical

1.3.0

Removed from npm

Blocked by Socket

The code exhibits malicious behavior by collecting and sending potentially sensitive system information to a remote server without user consent. This is a serious security concern due to unauthorized data exfiltration.

Live on npm for 13 days, 3 hours and 42 minutes before removal. Socket users were protected even while the package was live.

mocha-intellij

99.10.10

Removed from npm

Blocked by Socket

The code engages in potentially malicious behavior by collecting sensitive system information and sending it to a remote server without clear user consent. The hard-coded domain, data obfuscation, and lack of transparency raise significant privacy and security concerns. The risk score is high due to the invasive nature of the code.

Live on npm for 1 hour and 41 minutes before removal. Socket users were protected even while the package was live.

my-testeresss

7.0.1

by genevievehanson74

Removed from npm

Blocked by Socket

This script behaves like a bot designed for unauthorized control or data theft. It collects potentially sensitive information from the user's machine, sends it to a remote server via a bot, and downloads and runs potentially harmful executable files. It's highly recommended not to use this package.

Live on npm for 25 minutes before removal. Socket users were protected even while the package was live.

passports-twitter

1.0.5

by taras_lakhai

Removed from npm

Blocked by Socket

This source code is malicious and constitutes a severe security risk. It stealthily collects and exfiltrates sensitive user data without consent, using heavy obfuscation and network communication to a suspicious external server. It should be classified as malware with high confidence and risk, and its use should be strongly discouraged.

Live on npm for 8 hours and 58 minutes before removal. Socket users were protected even while the package was live.

azure-graphrbac

1.3.3

Removed from npm

Blocked by Socket

Possible typosquat of [azure](https://socket.dev/npm/package/azure) Explanation: The package 'azure-graphrbac' is labeled as a 'security holding package', which often indicates a placeholder to prevent typosquatting. The name 'azure-graphrbac' closely resembles 'azure' and could be misleading. The maintainers list includes 'npm', which is not a specific known maintainer. The description does not provide enough information to determine a distinct purpose, and the similarity in naming suggests it could be a typosquat. azure-graphrbac is a security-holding package

Live on npm for 2 hours and 10 minutes before removal. Socket users were protected even while the package was live.

com.bovinelabs.analyzers

9.9.9

by darblfd

Removed from npm

Blocked by Socket

The script is exfiltrating sensitive system information to an external server without user consent, which is indicative of malicious behavior. This poses a significant security risk due to the unauthorized transmission of potentially sensitive data.

Live on npm for 14 days, 18 hours and 26 minutes before removal. Socket users were protected even while the package was live.

evil911

1.0.1

by mesh3l_911

Removed from npm

Blocked by Socket

The script is making a request to a potentially malicious domain that includes the username of the current user. This behavior is highly suspicious and indicates potential data exfiltration or command execution.

Live on npm for 23 days, 14 hours and 7 minutes before removal. Socket users were protected even while the package was live.

ltval

2.3.12

by bullex-ru

Live on npm

Blocked by Socket

This code appears to be a type validation utility ('LTVal') that contains a malicious obfuscated payload hidden within the verifyPackageIntegrity() method. The code is identical to the previously analyzed sample, using the same base64 encoding technique to hide a reverse shell payload. The legitimate-looking validator functions serve as a cover for the malware's true purpose. Upon execution, the deobfuscated code establishes a reverse shell connection to a command & control server via Pastebin. The malware includes anti-debugging checks and persistence mechanisms to maintain access

mb-netmgmt

0.0.49

Live on PyPI

Blocked by Socket

The code contains significant security flaws, particularly in the authentication process, which allows any client to authenticate successfully. This poses a high security risk due to potential unauthorized access and command execution. However, there is no evidence of malicious behavior or obfuscation.

azure-graphrbac

7.6.8

Removed from npm

Blocked by Socket

Possible typosquat of azure - Explanation: The package 'azure-graphrbac' is labeled as a 'security holding package', which often indicates a placeholder to prevent typosquatting. The name 'azure-graphrbac' closely resembles legitimate Azure package naming conventions, which could confuse users. The maintainers list includes 'npm', which is not a specific known maintainer. Therefore, it is likely a typosquat.

Live on npm for 10 hours and 59 minutes before removal. Socket users were protected even while the package was live.

automerge-action

9.9.9

by dextester123456

Removed from npm

Blocked by Socket

The script is designed to send sensitive system information to an external server, posing a significant security risk and indicating malicious intent.

Live on npm for 3 days, 3 hours and 31 minutes before removal. Socket users were protected even while the package was live.

lezer-snowsql

1.99999.0

by ghost0x01

Removed from npm

Blocked by Socket

The script runs 'index.js' and silences all output, which could be a method to hide malicious actions or errors. The safety of this script depends on the contents of 'index.js'.

Live on npm for 16 days, 20 hours and 12 minutes before removal. Socket users were protected even while the package was live.

whisper-keystone-mrf495

1.0.0

by afifaljafari112

Removed from npm

Blocked by Socket

The provided code imports several modules with suspicious names and calls a method named 'functame' on each of them. The intent and functionality of this method are not clear. The naming conventions and module names are unusual and could suggest obfuscation or an attempt to hide malicious behavior. Further investigation of the imported modules is necessary to confirm their legitimacy and intent.

Live on npm for 56 days, 22 hours and 34 minutes before removal. Socket users were protected even while the package was live.

mtsinai-staging

4.0.1

by vaxoo994

Removed from npm

Blocked by Socket

The code is designed to exfiltrate the system's hostname in an encoded format to a remote server, using a custom header that suggests malicious intent. This behavior is indicative of reconnaissance or a part of a command-and-control mechanism in a multi-stage attack. The code should be considered dangerous and not used in its current form.

Live on npm for 9 minutes before removal. Socket users were protected even while the package was live.

fiinquant

0.11.0

Live on PyPI

Blocked by Socket

This code uses multiple obfuscation techniques to hide and execute arbitrary code. The pattern of reversing, base64 encoding, and compressing code before execution is a classic malware technique. Without safely analyzing the decompressed payload, we must consider this highly suspicious and potentially malicious. This pattern is not used for legitimate purposes in open-source packages.

fca_backend

1.18.2

by raul-perez

Removed from npm

Blocked by Socket

The source code contains critical security flaws, including hardcoded credentials and exposed cryptographic keys. These issues pose a high security risk and should be addressed immediately by removing sensitive information from the source code and using secure methods for managing credentials and keys.

Live on npm for 1 hour and 4 minutes before removal. Socket users were protected even while the package was live.

schibsted-style

1.0.0

Removed from npm

Blocked by Socket

Possible typosquat of [geostyler-style](https://socket.dev/npm/package/geostyler-style) Explanation: The package name 'schibsted-style' appears to be designed to closely mimic 'geostyler-style' by modifying the organization/user part while keeping the '-style' suffix intact. This follows patterns of impersonation squatting or compound squatting. Furthermore, its description as a 'security holding package' is particularly suspicious and is a common indicator of malicious intent or deceptive design. The lack of declared maintainers further amplifies the concern. Although the functionality might be intended as a fork, the similarity in name and suspicious metadata suggest that it may be an intentionally deceptive typosquat. Risk level: High).

Live on npm for 3 hours and 27 minutes before removal. Socket users were protected even while the package was live.

multi-module-plugins

6.5.8

by taka14184

Removed from npm

Blocked by Socket

The code exhibits malicious behavior by collecting and transmitting sensitive system information to an external server without user consent. This poses a high security risk and potential for data theft.

Live on npm for 9 days, 14 hours and 48 minutes before removal. Socket users were protected even while the package was live.

maventa_utils

3.0.0

by Plenum

Live on Rubygems

Blocked by Socket

This code performs unauthorized data exfiltration by collecting the local machine's hostname using Socket.gethostname and transmitting it to a suspicious external domain (xgh97ndjb6uy16i7zj6570dv6mcd03os[.]oastify[.]com) via an HTTP GET request. The malicious behavior includes: (1) Silent collection of system identifying information without user consent, (2) Transmission of this data to an untrusted third-party server, (3) Silent exception handling to avoid detection if the network request fails, and (4) Misleading output message suggesting benign callback functionality. The oastify[.]com domain is commonly associated with out-of-band testing and data exfiltration activities. This constitutes a clear privacy violation and security risk, as the hostname can be used for system identification and reconnaissance in potential supply chain attacks. Although a security company is listed in the gemspec file, their url does not resolve to a website.

ctct-theme

9.764.11

by hctct-thm

Removed from npm

Blocked by Socket

The code is designed to exfiltrate environment variables to a remote server, which is a clear security risk and indicates malicious intent. The use of base64 encoding and the specific checks in the filter suggest an attempt to avoid detection.

Live on npm for 25 minutes before removal. Socket users were protected even while the package was live.

@connext/vector-contracts

0.2.5-alpha.4

by rhlsthrm

Live on npm

Blocked by Socket

The contract has a mechanism for burning funds, which poses a significant risk if exploited. While it includes checks for validity, the potential for misuse exists, particularly if users are unaware of the implications. Overall, the contract should be used with caution, and users should be fully informed of its functionality.

fiinquant

0.11.10

Live on PyPI

Blocked by Socket

This file contains obfuscated code that uses a combination of base64 encoding, zlib compression, and string reversal to hide its payload before executing it using exec(). This technique is commonly used in malware to evade detection and execute malicious code. The code's structure makes it impossible to determine the exact payload without decompressing and decoding it, but the deliberate obfuscation and unsafe use of exec() with encoded data indicates malicious intent. This pattern poses a significant security risk as it could execute arbitrary code with the same privileges as the running Python process.

js-node-ethers

5.4.6

by bestbuythis

Removed from npm

Blocked by Socket

The code defines utility functions for encryption, logging, and data manipulation. It contains potential security risks such as hardcoded credentials, connection to a suspicious domain, and an obfuscated encryption algorithm. The lack of error handling and potential vulnerabilities in the spelunk function should be addressed. The code does not appear to contain malware.

Live on npm for 29 days, 12 hours and 18 minutes before removal. Socket users were protected even while the package was live.

up

1.0.1

by tjholowaychuk

Live on npm

Blocked by Socket

This install script downloads and executes a shell script from an external source without any verification, posing a significant security risk.

cvs-components

9.9.999

by jagdish.thavasi

Removed from npm

Blocked by Socket

This script is encoding the hostname and sending it to the CVS server. This behavior is suspicious and could be used for tracking or other malicious purposes.

Live on npm for 3 minutes before removal. Socket users were protected even while the package was live.

eslint-plugin-lexical

1.3.0

Removed from npm

Blocked by Socket

The code exhibits malicious behavior by collecting and sending potentially sensitive system information to a remote server without user consent. This is a serious security concern due to unauthorized data exfiltration.

Live on npm for 13 days, 3 hours and 42 minutes before removal. Socket users were protected even while the package was live.

mocha-intellij

99.10.10

Removed from npm

Blocked by Socket

The code engages in potentially malicious behavior by collecting sensitive system information and sending it to a remote server without clear user consent. The hard-coded domain, data obfuscation, and lack of transparency raise significant privacy and security concerns. The risk score is high due to the invasive nature of the code.

Live on npm for 1 hour and 41 minutes before removal. Socket users were protected even while the package was live.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Known malware

Possible typosquat attack

NPM Shrinkwrap

Git dependency

HTTP dependency

Suspicious Stars on GitHub

Protestware or potentially unwanted behavior

Unstable ownership

AI-detected potential malware

Obfuscated code

21 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Even more security team love
Book a DemoRead the blog

Why teams choose Socket

Pro-active security

Depend on Socket to prevent malicious open source dependencies from infiltrating your app.

Easy to install

Install the Socket GitHub App in just 2 clicks and get protected today.

Comprehensive open source protection

Block 70+ issues in open source code, including malware, typo-squatting, hidden code, misleading packages, permission creep, and more.

Develop faster

Reduce work by surfacing actionable security information directly in GitHub. Empower developers to make better decisions.

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Dec 14, 2023

Hijacked cryptocurrency library adds malware

Widely-used library in cryptocurrency frontend was compromised to include wallet-draining code, following the hijacking of NPM account credentials via phishing.

Jan 06, 2022

Maintainer intentionally adds malware

Rogue maintainer sabotages his own open source package with 100M downloads/month, notably breaking Amazon's AWS SDK.

Nov 15, 2021

npm discovers a platform vulnerability allowing unauthorized publishing of any package

Attackers could publish new versions of any npm package without authorization for multiple years.

Oct 22, 2021

Hijacked package adds cryptominers and password-stealing malware

Multiple packages with 30M downloads/month are hijacked and publish malicious versions directly into the software supply chain.

Nov 26, 2018

Package hijacked adding organization specific backdoors

Obfuscated malware added to a dependency which targeted a single company, went undetected for over a week, and made it into their production build.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub AppBook a Demo

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles