
Security News
Browserslist-rs Gets Major Refactor, Cutting Binary Size by Over 1MB
Browserslist-rs now uses static data to reduce binary size by over 1MB, improving memory use and performance for Rust-based frontend tools.
Quickly evaluate the security and health of any open source package.
my-testeresss
7.0.1
by genevievehanson74
Removed from npm
Blocked by Socket
This script behaves like a bot designed for unauthorized control or data theft. It collects potentially sensitive information from the user's machine, sends it to a remote server via a bot, and downloads and runs potentially harmful executable files. It's highly recommended not to use this package.
Live on npm for 25 minutes before removal. Socket users were protected even while the package was live.
passports-twitter
1.0.5
by taras_lakhai
Removed from npm
Blocked by Socket
This source code is malicious and constitutes a severe security risk. It stealthily collects and exfiltrates sensitive user data without consent, using heavy obfuscation and network communication to a suspicious external server. It should be classified as malware with high confidence and risk, and its use should be strongly discouraged.
Live on npm for 8 hours and 58 minutes before removal. Socket users were protected even while the package was live.
azure-graphrbac
1.3.3
Removed from npm
Blocked by Socket
Possible typosquat of [azure](https://socket.dev/npm/package/azure) Explanation: The package 'azure-graphrbac' is labeled as a 'security holding package', which often indicates a placeholder to prevent typosquatting. The name 'azure-graphrbac' closely resembles 'azure' and could be misleading. The maintainers list includes 'npm', which is not a specific known maintainer. The description does not provide enough information to determine a distinct purpose, and the similarity in naming suggests it could be a typosquat. azure-graphrbac is a security-holding package
Live on npm for 2 hours and 10 minutes before removal. Socket users were protected even while the package was live.
com.bovinelabs.analyzers
9.9.9
by darblfd
Removed from npm
Blocked by Socket
The script is exfiltrating sensitive system information to an external server without user consent, which is indicative of malicious behavior. This poses a significant security risk due to the unauthorized transmission of potentially sensitive data.
Live on npm for 14 days, 18 hours and 26 minutes before removal. Socket users were protected even while the package was live.
evil911
1.0.1
by mesh3l_911
Removed from npm
Blocked by Socket
The script is making a request to a potentially malicious domain that includes the username of the current user. This behavior is highly suspicious and indicates potential data exfiltration or command execution.
Live on npm for 23 days, 14 hours and 7 minutes before removal. Socket users were protected even while the package was live.
ltval
2.3.12
by bullex-ru
Live on npm
Blocked by Socket
This code appears to be a type validation utility ('LTVal') that contains a malicious obfuscated payload hidden within the verifyPackageIntegrity() method. The code is identical to the previously analyzed sample, using the same base64 encoding technique to hide a reverse shell payload. The legitimate-looking validator functions serve as a cover for the malware's true purpose. Upon execution, the deobfuscated code establishes a reverse shell connection to a command & control server via Pastebin. The malware includes anti-debugging checks and persistence mechanisms to maintain access
mb-netmgmt
0.0.49
Live on PyPI
Blocked by Socket
The code contains significant security flaws, particularly in the authentication process, which allows any client to authenticate successfully. This poses a high security risk due to potential unauthorized access and command execution. However, there is no evidence of malicious behavior or obfuscation.
azure-graphrbac
7.6.8
Removed from npm
Blocked by Socket
Possible typosquat of azure - Explanation: The package 'azure-graphrbac' is labeled as a 'security holding package', which often indicates a placeholder to prevent typosquatting. The name 'azure-graphrbac' closely resembles legitimate Azure package naming conventions, which could confuse users. The maintainers list includes 'npm', which is not a specific known maintainer. Therefore, it is likely a typosquat.
Live on npm for 10 hours and 59 minutes before removal. Socket users were protected even while the package was live.
automerge-action
9.9.9
by dextester123456
Removed from npm
Blocked by Socket
The script is designed to send sensitive system information to an external server, posing a significant security risk and indicating malicious intent.
Live on npm for 3 days, 3 hours and 31 minutes before removal. Socket users were protected even while the package was live.
lezer-snowsql
1.99999.0
by ghost0x01
Removed from npm
Blocked by Socket
The script runs 'index.js' and silences all output, which could be a method to hide malicious actions or errors. The safety of this script depends on the contents of 'index.js'.
Live on npm for 16 days, 20 hours and 12 minutes before removal. Socket users were protected even while the package was live.
whisper-keystone-mrf495
1.0.0
by afifaljafari112
Removed from npm
Blocked by Socket
The provided code imports several modules with suspicious names and calls a method named 'functame' on each of them. The intent and functionality of this method are not clear. The naming conventions and module names are unusual and could suggest obfuscation or an attempt to hide malicious behavior. Further investigation of the imported modules is necessary to confirm their legitimacy and intent.
Live on npm for 56 days, 22 hours and 34 minutes before removal. Socket users were protected even while the package was live.
mtsinai-staging
4.0.1
by vaxoo994
Removed from npm
Blocked by Socket
The code is designed to exfiltrate the system's hostname in an encoded format to a remote server, using a custom header that suggests malicious intent. This behavior is indicative of reconnaissance or a part of a command-and-control mechanism in a multi-stage attack. The code should be considered dangerous and not used in its current form.
Live on npm for 9 minutes before removal. Socket users were protected even while the package was live.
fiinquant
0.11.0
Live on PyPI
Blocked by Socket
This code uses multiple obfuscation techniques to hide and execute arbitrary code. The pattern of reversing, base64 encoding, and compressing code before execution is a classic malware technique. Without safely analyzing the decompressed payload, we must consider this highly suspicious and potentially malicious. This pattern is not used for legitimate purposes in open-source packages.
fca_backend
1.18.2
by raul-perez
Removed from npm
Blocked by Socket
The source code contains critical security flaws, including hardcoded credentials and exposed cryptographic keys. These issues pose a high security risk and should be addressed immediately by removing sensitive information from the source code and using secure methods for managing credentials and keys.
Live on npm for 1 hour and 4 minutes before removal. Socket users were protected even while the package was live.
schibsted-style
1.0.0
Removed from npm
Blocked by Socket
Possible typosquat of [geostyler-style](https://socket.dev/npm/package/geostyler-style) Explanation: The package name 'schibsted-style' appears to be designed to closely mimic 'geostyler-style' by modifying the organization/user part while keeping the '-style' suffix intact. This follows patterns of impersonation squatting or compound squatting. Furthermore, its description as a 'security holding package' is particularly suspicious and is a common indicator of malicious intent or deceptive design. The lack of declared maintainers further amplifies the concern. Although the functionality might be intended as a fork, the similarity in name and suspicious metadata suggest that it may be an intentionally deceptive typosquat. Risk level: High).
Live on npm for 3 hours and 27 minutes before removal. Socket users were protected even while the package was live.
multi-module-plugins
6.5.8
by taka14184
Removed from npm
Blocked by Socket
The code exhibits malicious behavior by collecting and transmitting sensitive system information to an external server without user consent. This poses a high security risk and potential for data theft.
Live on npm for 9 days, 14 hours and 48 minutes before removal. Socket users were protected even while the package was live.
maventa_utils
3.0.0
by Plenum
Live on Rubygems
Blocked by Socket
This code performs unauthorized data exfiltration by collecting the local machine's hostname using Socket.gethostname and transmitting it to a suspicious external domain (xgh97ndjb6uy16i7zj6570dv6mcd03os[.]oastify[.]com) via an HTTP GET request. The malicious behavior includes: (1) Silent collection of system identifying information without user consent, (2) Transmission of this data to an untrusted third-party server, (3) Silent exception handling to avoid detection if the network request fails, and (4) Misleading output message suggesting benign callback functionality. The oastify[.]com domain is commonly associated with out-of-band testing and data exfiltration activities. This constitutes a clear privacy violation and security risk, as the hostname can be used for system identification and reconnaissance in potential supply chain attacks. Although a security company is listed in the gemspec file, their url does not resolve to a website.
ctct-theme
9.764.11
by hctct-thm
Removed from npm
Blocked by Socket
The code is designed to exfiltrate environment variables to a remote server, which is a clear security risk and indicates malicious intent. The use of base64 encoding and the specific checks in the filter suggest an attempt to avoid detection.
Live on npm for 25 minutes before removal. Socket users were protected even while the package was live.
@connext/vector-contracts
0.2.5-alpha.4
by rhlsthrm
Live on npm
Blocked by Socket
The contract has a mechanism for burning funds, which poses a significant risk if exploited. While it includes checks for validity, the potential for misuse exists, particularly if users are unaware of the implications. Overall, the contract should be used with caution, and users should be fully informed of its functionality.
fiinquant
0.11.10
Live on PyPI
Blocked by Socket
This file contains obfuscated code that uses a combination of base64 encoding, zlib compression, and string reversal to hide its payload before executing it using exec(). This technique is commonly used in malware to evade detection and execute malicious code. The code's structure makes it impossible to determine the exact payload without decompressing and decoding it, but the deliberate obfuscation and unsafe use of exec() with encoded data indicates malicious intent. This pattern poses a significant security risk as it could execute arbitrary code with the same privileges as the running Python process.
js-node-ethers
5.4.6
by bestbuythis
Removed from npm
Blocked by Socket
The code defines utility functions for encryption, logging, and data manipulation. It contains potential security risks such as hardcoded credentials, connection to a suspicious domain, and an obfuscated encryption algorithm. The lack of error handling and potential vulnerabilities in the spelunk function should be addressed. The code does not appear to contain malware.
Live on npm for 29 days, 12 hours and 18 minutes before removal. Socket users were protected even while the package was live.
up
1.0.1
by tjholowaychuk
Live on npm
Blocked by Socket
This install script downloads and executes a shell script from an external source without any verification, posing a significant security risk.
cvs-components
9.9.999
by jagdish.thavasi
Removed from npm
Blocked by Socket
This script is encoding the hostname and sending it to the CVS server. This behavior is suspicious and could be used for tracking or other malicious purposes.
Live on npm for 3 minutes before removal. Socket users were protected even while the package was live.
eslint-plugin-lexical
1.3.0
Removed from npm
Blocked by Socket
The code exhibits malicious behavior by collecting and sending potentially sensitive system information to a remote server without user consent. This is a serious security concern due to unauthorized data exfiltration.
Live on npm for 13 days, 3 hours and 42 minutes before removal. Socket users were protected even while the package was live.
mocha-intellij
99.10.10
Removed from npm
Blocked by Socket
The code engages in potentially malicious behavior by collecting sensitive system information and sending it to a remote server without clear user consent. The hard-coded domain, data obfuscation, and lack of transparency raise significant privacy and security concerns. The risk score is high due to the invasive nature of the code.
Live on npm for 1 hour and 41 minutes before removal. Socket users were protected even while the package was live.
my-testeresss
7.0.1
by genevievehanson74
Removed from npm
Blocked by Socket
This script behaves like a bot designed for unauthorized control or data theft. It collects potentially sensitive information from the user's machine, sends it to a remote server via a bot, and downloads and runs potentially harmful executable files. It's highly recommended not to use this package.
Live on npm for 25 minutes before removal. Socket users were protected even while the package was live.
passports-twitter
1.0.5
by taras_lakhai
Removed from npm
Blocked by Socket
This source code is malicious and constitutes a severe security risk. It stealthily collects and exfiltrates sensitive user data without consent, using heavy obfuscation and network communication to a suspicious external server. It should be classified as malware with high confidence and risk, and its use should be strongly discouraged.
Live on npm for 8 hours and 58 minutes before removal. Socket users were protected even while the package was live.
azure-graphrbac
1.3.3
Removed from npm
Blocked by Socket
Possible typosquat of [azure](https://socket.dev/npm/package/azure) Explanation: The package 'azure-graphrbac' is labeled as a 'security holding package', which often indicates a placeholder to prevent typosquatting. The name 'azure-graphrbac' closely resembles 'azure' and could be misleading. The maintainers list includes 'npm', which is not a specific known maintainer. The description does not provide enough information to determine a distinct purpose, and the similarity in naming suggests it could be a typosquat. azure-graphrbac is a security-holding package
Live on npm for 2 hours and 10 minutes before removal. Socket users were protected even while the package was live.
com.bovinelabs.analyzers
9.9.9
by darblfd
Removed from npm
Blocked by Socket
The script is exfiltrating sensitive system information to an external server without user consent, which is indicative of malicious behavior. This poses a significant security risk due to the unauthorized transmission of potentially sensitive data.
Live on npm for 14 days, 18 hours and 26 minutes before removal. Socket users were protected even while the package was live.
evil911
1.0.1
by mesh3l_911
Removed from npm
Blocked by Socket
The script is making a request to a potentially malicious domain that includes the username of the current user. This behavior is highly suspicious and indicates potential data exfiltration or command execution.
Live on npm for 23 days, 14 hours and 7 minutes before removal. Socket users were protected even while the package was live.
ltval
2.3.12
by bullex-ru
Live on npm
Blocked by Socket
This code appears to be a type validation utility ('LTVal') that contains a malicious obfuscated payload hidden within the verifyPackageIntegrity() method. The code is identical to the previously analyzed sample, using the same base64 encoding technique to hide a reverse shell payload. The legitimate-looking validator functions serve as a cover for the malware's true purpose. Upon execution, the deobfuscated code establishes a reverse shell connection to a command & control server via Pastebin. The malware includes anti-debugging checks and persistence mechanisms to maintain access
mb-netmgmt
0.0.49
Live on PyPI
Blocked by Socket
The code contains significant security flaws, particularly in the authentication process, which allows any client to authenticate successfully. This poses a high security risk due to potential unauthorized access and command execution. However, there is no evidence of malicious behavior or obfuscation.
azure-graphrbac
7.6.8
Removed from npm
Blocked by Socket
Possible typosquat of azure - Explanation: The package 'azure-graphrbac' is labeled as a 'security holding package', which often indicates a placeholder to prevent typosquatting. The name 'azure-graphrbac' closely resembles legitimate Azure package naming conventions, which could confuse users. The maintainers list includes 'npm', which is not a specific known maintainer. Therefore, it is likely a typosquat.
Live on npm for 10 hours and 59 minutes before removal. Socket users were protected even while the package was live.
automerge-action
9.9.9
by dextester123456
Removed from npm
Blocked by Socket
The script is designed to send sensitive system information to an external server, posing a significant security risk and indicating malicious intent.
Live on npm for 3 days, 3 hours and 31 minutes before removal. Socket users were protected even while the package was live.
lezer-snowsql
1.99999.0
by ghost0x01
Removed from npm
Blocked by Socket
The script runs 'index.js' and silences all output, which could be a method to hide malicious actions or errors. The safety of this script depends on the contents of 'index.js'.
Live on npm for 16 days, 20 hours and 12 minutes before removal. Socket users were protected even while the package was live.
whisper-keystone-mrf495
1.0.0
by afifaljafari112
Removed from npm
Blocked by Socket
The provided code imports several modules with suspicious names and calls a method named 'functame' on each of them. The intent and functionality of this method are not clear. The naming conventions and module names are unusual and could suggest obfuscation or an attempt to hide malicious behavior. Further investigation of the imported modules is necessary to confirm their legitimacy and intent.
Live on npm for 56 days, 22 hours and 34 minutes before removal. Socket users were protected even while the package was live.
mtsinai-staging
4.0.1
by vaxoo994
Removed from npm
Blocked by Socket
The code is designed to exfiltrate the system's hostname in an encoded format to a remote server, using a custom header that suggests malicious intent. This behavior is indicative of reconnaissance or a part of a command-and-control mechanism in a multi-stage attack. The code should be considered dangerous and not used in its current form.
Live on npm for 9 minutes before removal. Socket users were protected even while the package was live.
fiinquant
0.11.0
Live on PyPI
Blocked by Socket
This code uses multiple obfuscation techniques to hide and execute arbitrary code. The pattern of reversing, base64 encoding, and compressing code before execution is a classic malware technique. Without safely analyzing the decompressed payload, we must consider this highly suspicious and potentially malicious. This pattern is not used for legitimate purposes in open-source packages.
fca_backend
1.18.2
by raul-perez
Removed from npm
Blocked by Socket
The source code contains critical security flaws, including hardcoded credentials and exposed cryptographic keys. These issues pose a high security risk and should be addressed immediately by removing sensitive information from the source code and using secure methods for managing credentials and keys.
Live on npm for 1 hour and 4 minutes before removal. Socket users were protected even while the package was live.
schibsted-style
1.0.0
Removed from npm
Blocked by Socket
Possible typosquat of [geostyler-style](https://socket.dev/npm/package/geostyler-style) Explanation: The package name 'schibsted-style' appears to be designed to closely mimic 'geostyler-style' by modifying the organization/user part while keeping the '-style' suffix intact. This follows patterns of impersonation squatting or compound squatting. Furthermore, its description as a 'security holding package' is particularly suspicious and is a common indicator of malicious intent or deceptive design. The lack of declared maintainers further amplifies the concern. Although the functionality might be intended as a fork, the similarity in name and suspicious metadata suggest that it may be an intentionally deceptive typosquat. Risk level: High).
Live on npm for 3 hours and 27 minutes before removal. Socket users were protected even while the package was live.
multi-module-plugins
6.5.8
by taka14184
Removed from npm
Blocked by Socket
The code exhibits malicious behavior by collecting and transmitting sensitive system information to an external server without user consent. This poses a high security risk and potential for data theft.
Live on npm for 9 days, 14 hours and 48 minutes before removal. Socket users were protected even while the package was live.
maventa_utils
3.0.0
by Plenum
Live on Rubygems
Blocked by Socket
This code performs unauthorized data exfiltration by collecting the local machine's hostname using Socket.gethostname and transmitting it to a suspicious external domain (xgh97ndjb6uy16i7zj6570dv6mcd03os[.]oastify[.]com) via an HTTP GET request. The malicious behavior includes: (1) Silent collection of system identifying information without user consent, (2) Transmission of this data to an untrusted third-party server, (3) Silent exception handling to avoid detection if the network request fails, and (4) Misleading output message suggesting benign callback functionality. The oastify[.]com domain is commonly associated with out-of-band testing and data exfiltration activities. This constitutes a clear privacy violation and security risk, as the hostname can be used for system identification and reconnaissance in potential supply chain attacks. Although a security company is listed in the gemspec file, their url does not resolve to a website.
ctct-theme
9.764.11
by hctct-thm
Removed from npm
Blocked by Socket
The code is designed to exfiltrate environment variables to a remote server, which is a clear security risk and indicates malicious intent. The use of base64 encoding and the specific checks in the filter suggest an attempt to avoid detection.
Live on npm for 25 minutes before removal. Socket users were protected even while the package was live.
@connext/vector-contracts
0.2.5-alpha.4
by rhlsthrm
Live on npm
Blocked by Socket
The contract has a mechanism for burning funds, which poses a significant risk if exploited. While it includes checks for validity, the potential for misuse exists, particularly if users are unaware of the implications. Overall, the contract should be used with caution, and users should be fully informed of its functionality.
fiinquant
0.11.10
Live on PyPI
Blocked by Socket
This file contains obfuscated code that uses a combination of base64 encoding, zlib compression, and string reversal to hide its payload before executing it using exec(). This technique is commonly used in malware to evade detection and execute malicious code. The code's structure makes it impossible to determine the exact payload without decompressing and decoding it, but the deliberate obfuscation and unsafe use of exec() with encoded data indicates malicious intent. This pattern poses a significant security risk as it could execute arbitrary code with the same privileges as the running Python process.
js-node-ethers
5.4.6
by bestbuythis
Removed from npm
Blocked by Socket
The code defines utility functions for encryption, logging, and data manipulation. It contains potential security risks such as hardcoded credentials, connection to a suspicious domain, and an obfuscated encryption algorithm. The lack of error handling and potential vulnerabilities in the spelunk function should be addressed. The code does not appear to contain malware.
Live on npm for 29 days, 12 hours and 18 minutes before removal. Socket users were protected even while the package was live.
up
1.0.1
by tjholowaychuk
Live on npm
Blocked by Socket
This install script downloads and executes a shell script from an external source without any verification, posing a significant security risk.
cvs-components
9.9.999
by jagdish.thavasi
Removed from npm
Blocked by Socket
This script is encoding the hostname and sending it to the CVS server. This behavior is suspicious and could be used for tracking or other malicious purposes.
Live on npm for 3 minutes before removal. Socket users were protected even while the package was live.
eslint-plugin-lexical
1.3.0
Removed from npm
Blocked by Socket
The code exhibits malicious behavior by collecting and sending potentially sensitive system information to a remote server without user consent. This is a serious security concern due to unauthorized data exfiltration.
Live on npm for 13 days, 3 hours and 42 minutes before removal. Socket users were protected even while the package was live.
mocha-intellij
99.10.10
Removed from npm
Blocked by Socket
The code engages in potentially malicious behavior by collecting sensitive system information and sending it to a remote server without clear user consent. The hard-coded domain, data obfuscation, and lack of transparency raise significant privacy and security concerns. The risk score is high due to the invasive nature of the code.
Live on npm for 1 hour and 41 minutes before removal. Socket users were protected even while the package was live.
Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.
Known malware
Possible typosquat attack
NPM Shrinkwrap
Git dependency
HTTP dependency
Suspicious Stars on GitHub
Protestware or potentially unwanted behavior
Unstable ownership
AI-detected potential malware
Obfuscated code
Critical CVE
High CVE
Medium CVE
Low CVE
Bad dependency semver
Wildcard dependency
Unpopular package
Minified code
Socket optimized override available
Deprecated
Unmaintained
Explicitly Unlicensed Item
License Policy Violation
Misc. License Issues
Non-permissive License
Ambiguous License Classifier
Copyleft License
Unidentified License
No License Found
License exception
Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.
Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.
Nat Friedman
CEO at GitHub
Suz Hinton
Senior Software Engineer at Stripe
heck yes this is awesome!!! Congrats team 🎉👏
Matteo Collina
Node.js maintainer, Fastify lead maintainer
So awesome to see @SocketSecurity launch with a fresh approach! Excited to have supported the team from the early days.
DC Posch
Director of Technology at AppFolio, CTO at Dynasty
This is going to be super important, especially for crypto projects where a compromised dependency results in stolen user assets.
Luis Naranjo
Software Engineer at Microsoft
If software supply chain attacks through npm don't scare the shit out of you, you're not paying close enough attention.
@SocketSecurity sounds like an awesome product. I'll be using socket.dev instead of npmjs.org to browse npm packages going forward
Elena Nadolinski
Founder and CEO at Iron Fish
Huge congrats to @SocketSecurity! 🙌
Literally the only product that proactively detects signs of JS compromised packages.
Joe Previte
Engineering Team Lead at Coder
Congrats to @feross and the @SocketSecurity team on their seed funding! 🚀 It's been a big help for us at @CoderHQ and we appreciate what y'all are doing!
Josh Goldberg
Staff Developer at Codecademy
This is such a great idea & looks fantastic, congrats & good luck @feross + team!
The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.
Scott Roberts
CISO at UiPath
As a happy Socket customer, I've been impressed with how quickly they are adding value to the product, this move is a great step!
Yan Zhu
Head of Security at Brave, DEFCON, EFF, W3C
glad to hear some of the smartest people i know are working on (npm, etc.) supply chain security finally :). @SocketSecurity
Andrew Peterson
CEO and Co-Founder at Signal Sciences (acq. Fastly)
How do you track the validity of open source software libraries as they get updated? You're prob not. Check out @SocketSecurity and the updated tooling they launched.
Supply chain is a cluster in security as we all know and the tools from Socket are "duh" type tools to be implementing. Check them out and follow Feross Aboukhadijeh to see more updates coming from them in the future.
Zbyszek Tenerowicz
Senior Security Engineer at ConsenSys
socket.dev is getting more appealing by the hour
Devdatta Akhawe
Head of Security at Figma
The @SocketSecurity team is on fire! Amazing progress and I am exciting to see where they go next.
Sebastian Bensusan
Engineer Manager at Stripe
I find it surprising that we don't have _more_ supply chain attacks in software:
Imagine your airplane (the code running) was assembled (deployed) daily, with parts (dependencies) from internet strangers. How long until you get a bad part?
Excited for Socket to prevent this
Adam Baldwin
VP of Security at npm, Red Team at Auth0/Okta
Congrats to everyone at @SocketSecurity ❤️🤘🏻
Nico Waisman
CISO at Lyft
This is an area that I have personally been very focused on. As Nat Friedman said in the 2019 GitHub Universe keynote, Open Source won, and every time you add a new open source project you rely on someone else code and you rely on the people that build it.
This is both exciting and problematic. You are bringing real risk into your organization, and I'm excited to see progress in the industry from OpenSSF scorecards and package analyzers to the company that Feross Aboukhadijeh is building!
Depend on Socket to prevent malicious open source dependencies from infiltrating your app.
Install the Socket GitHub App in just 2 clicks and get protected today.
Block 70+ issues in open source code, including malware, typo-squatting, hidden code, misleading packages, permission creep, and more.
Reduce work by surfacing actionable security information directly in GitHub. Empower developers to make better decisions.
Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.
Dec 14, 2023
Hijacked cryptocurrency library adds malware
Widely-used library in cryptocurrency frontend was compromised to include wallet-draining code, following the hijacking of NPM account credentials via phishing.
Jan 06, 2022
Maintainer intentionally adds malware
Rogue maintainer sabotages his own open source package with 100M downloads/month, notably breaking Amazon's AWS SDK.
Nov 15, 2021
npm discovers a platform vulnerability allowing unauthorized publishing of any package
Attackers could publish new versions of any npm package without authorization for multiple years.
Oct 22, 2021
Hijacked package adds cryptominers and password-stealing malware
Multiple packages with 30M downloads/month are hijacked and publish malicious versions directly into the software supply chain.
Nov 26, 2018
Package hijacked adding organization specific backdoors
Obfuscated malware added to a dependency which targeted a single company, went undetected for over a week, and made it into their production build.
Get our latest security research, open source insights, and product updates.
Security News
Browserslist-rs now uses static data to reduce binary size by over 1MB, improving memory use and performance for Rust-based frontend tools.
Research
Security News
Eight new malicious Firefox extensions impersonate games, steal OAuth tokens, hijack sessions, and exploit browser permissions to spy on users.
Security News
The official Go SDK for the Model Context Protocol is in development, with a stable, production-ready release expected by August 2025.