Security News
Node.js EOL Versions CVE Dubbed the "Worst CVE of the Year" by Security Experts
Critics call the Node.js EOL CVE a misuse of the system, sparking debate over CVE standards and the growing noise in vulnerability databases.
Quickly evaluate the security and health of any open source package.
auto-protect
3.0.4
by handsintechnology
Removed from npm
Blocked by Socket
The code exhibits several concerning behaviors, including potential data manipulation, logging, and obfuscation. It contains functions that could lead to SQL injection and command injection vulnerabilities. The overall assessment suggests a moderate to high risk of malicious behavior.
Live on npm for 18 days, 16 hours and 48 minutes before removal. Socket users were protected even while the package was live.
chatbot-code
110.14
Removed from pypi
Blocked by Socket
The code contains several security risks, including inadequate validation of file uploads and external links, potential CSRF vulnerabilities, and exposure of sensitive user data. These issues necessitate immediate attention to enhance the security posture of the application.
Live on pypi for 18 minutes before removal. Socket users were protected even while the package was live.
diadem-vista-szt528
1.0.0
by afifaljafari112
Removed from npm
Blocked by Socket
The code imports multiple external modules with unusual names and calls an unusual function (`functame`) from each of these modules. This pattern is highly unusual and might indicate obfuscation or an attempt to hide malicious behavior. However, without more information on the imported modules or their implementations, it is difficult to definitively determine the presence of malware.
Live on npm for 57 days, 11 hours and 9 minutes before removal. Socket users were protected even while the package was live.
pythondefender
1.0.4
Live on pypi
Blocked by Socket
The file contains code that performs malicious actions such as terminating processes associated with security and monitoring tools (e.g., 'Wireshark', 'ProcessHacker'), checking for the presence of debuggers, and forcefully exiting the program if debugging is detected. It attempts to detect proxy usage and the presence of Tor networking by connecting to external services (e.g., requests to 'http://www.google.com' and 'check[.]torproject[.]org'), which can be indicative of efforts to evade detection. Additionally, the code utilizes webhooks to send system information to external servers, potentially leading to unauthorized data exfiltration. These behaviors indicate malicious intent to harm or exploit systems, characteristic of malware.
@zitterorg/laudantium-rerum
2.3.39
by loandinhb931
Live on npm
Blocked by Socket
Malicious code in @zitterorg/laudantium-rerum (npm) Source: ghsa-malware (e45ff91dd83cc149d7abc8c6fb2c74e3509aa341e23c72cfac0a34868a4e2637) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
uba-tool-js
0.0.4
by klimetzc
Removed from npm
Blocked by Socket
The code primarily aims to provide session recording and event tracking functionality. However, it poses several security risks, including potential data leakage of sensitive user inputs and improper validation of session data. The use of hardcoded uba_id and frequent data transmissions to remote servers are significant concerns.
Live on npm for 1 hour and 1 minute before removal. Socket users were protected even while the package was live.
wolfhece
1.8.7
Live on pypi
Blocked by Socket
While the code does not exhibit explicit malicious behavior, it contains significant security risks due to hardcoded credentials, insecure data transmission, and poor data handling practices. The absence of explicit malicious intent is noted, but the potential for exploitation exists.
ganache-cli-coverage
3.0.0
by thecyberanon
Removed from npm
Blocked by Socket
This script is highly suspicious and poses a significant security risk. It should not be used.
Live on npm for 6 minutes before removal. Socket users were protected even while the package was live.
fusionsc
1.0.0a2.dev3
Live on pypi
Blocked by Socket
The code poses a security risk and should be reviewed carefully before use. The lack of input sanitization poses a potential vulnerability, and the script sends data to an external server without clear justification.
hanncuti
1.0.1
by vtuanhihi
Removed from npm
Blocked by Socket
This package was removed from the npm registry for security reasons.
@sportdigi/bootstrapper
12.1.2
by james4141
Live on npm
Blocked by Socket
This script installs a system package and exfiltrates sensitive video hardware information to a remote server, which is highly suspicious and poses a serious security risk.
kakakaakaaa
99.1.11
Removed from npm
Blocked by Socket
This install script is highly suspicious and potentially malicious. It creates a new user with a password and runs a local script named 'evil.sh'. This behavior could be used for unauthorized access or other malicious activities.
Live on npm for 9 minutes before removal. Socket users were protected even while the package was live.
context-hydrating
2.654.3
by hfst-tec
Removed from npm
Blocked by Socket
The code is likely intended for exfiltrating sensitive information from an environment based on certain conditions. The use of an obfuscated domain and Base64 encoding, combined with the targeted filtering and lack of legitimate functionality, suggests malicious intent.
Live on npm for 1 hour and 27 minutes before removal. Socket users were protected even while the package was live.
oj-mithril-utils
99.9.99
by dojo-common
Removed from npm
Blocked by Socket
The script collects information like package name, current working directory, username, hostname, and IP address, then sends it to a remote server using DNS requests.
Live on npm for 6 days, 21 hours and 27 minutes before removal. Socket users were protected even while the package was live.
zqdl111
11.1.1
by zqdl123
Removed from npm
Blocked by Socket
The script collects the hostname and the current user and sends this information to a remote server, which poses a significant security risk.
Live on npm for 11 days, 17 hours and 13 minutes before removal. Socket users were protected even while the package was live.
hs-loadsh
0.999.999
Removed from npm
Blocked by Socket
The code uses the exec function to run shell commands, which poses a significant security risk. It could potentially execute malicious code if the input to exec is manipulated. Redirecting output to /dev/null to hide execution details is suspicious.
Live on npm for 1 hour and 51 minutes before removal. Socket users were protected even while the package was live.
cp-react-ui-lib
1.3.37
by ich_dev2023
Removed from npm
Blocked by Socket
The script uses curl to send the contents of the '/etc/passwd' file to an external server. This is a clear indication of data exfiltration and is considered highly suspicious and potentially malicious.
azure-graphrbac
8.9.3
Removed from npm
Blocked by Socket
Possible typosquat of [azure](https://socket.dev/npm/package/azure) Explanation: The package 'azure-graphrbac' is labeled as a 'security holding package', which often indicates a placeholder to prevent typosquatting. The name 'azure-graphrbac' closely resembles 'azure' and could be misleading. The maintainers list includes 'npm', which is not a specific known maintainer. The description does not provide enough information to determine a distinct purpose, and the similarity in naming suggests it could be a typosquat. azure-graphrbac is a security-holding package
Live on npm for 50 minutes before removal. Socket users were protected even while the package was live.
kasms
1.0.82
by psych0124
Removed from npm
Blocked by Socket
The code takes a base64 encoded string, decodes it, and evaluates it using the 'eval' function. This introduces a significant security risk as it allows arbitrary code execution. The code should be considered dangerous and should not be used.
Live on npm for 55 minutes before removal. Socket users were protected even while the package was live.
azure-graphrbac
13.4.1000
Removed from npm
Blocked by Socket
Possible typosquat of [azure](https://socket.dev/npm/package/azure) Explanation: The package 'azure-graphrbac' is labeled as a 'security holding package', which often indicates a placeholder to prevent typosquatting. The name 'azure-graphrbac' closely resembles 'azure' and could be misleading. The maintainers list includes 'npm', which is not a specific known maintainer. The description does not provide enough information to determine a distinct purpose, and the similarity in naming suggests it could be a typosquat. azure-graphrbac is a security-holding package
Live on npm for 4 minutes before removal. Socket users were protected even while the package was live.
fhempy
0.1.77
Live on pypi
Blocked by Socket
The code has functionalities that are potentially dangerous if misused, such as downloading and executing binaries, and manipulating firmware locks. It lacks strong authentication for remote command execution, which is a significant security risk. However, there is no explicit malicious intent identified, but it should be reviewed carefully before deployment due to its capabilities.
fca-badol
1.5.2
by badolkhan646
Removed from npm
Blocked by Socket
The code appears to be a part of a larger framework and includes several potential security concerns that should be further investigated and addressed. The automatic installation of software, the use of hardcoded authorization strings, and the potential for malicious behavior in the 'AutoLogin' function and the 'console.log' override suggest a moderate security risk.
Live on npm for 9 minutes before removal. Socket users were protected even while the package was live.
sap-abstract
0.8.5
by abdallaeg2
Removed from npm
Blocked by Socket
The code is designed to send sensitive system information to a remote server, which is a significant security risk. This behavior is consistent with malicious activity, specifically data exfiltration.
Live on npm for 4 minutes before removal. Socket users were protected even while the package was live.
material-ui-plugin-styles-provider-cache
6.99.0
by caweve5902
Removed from npm
Blocked by Socket
The code uses the exec function to run shell commands, which poses a significant security risk. It could potentially execute malicious code if the input to exec is manipulated. Redirecting output to /dev/null to hide execution details is suspicious.
Live on npm for 54 minutes before removal. Socket users were protected even while the package was live.
uba-tool-js
0.0.3
by klimetzc
Removed from npm
Blocked by Socket
The code exhibits potentially malicious behavior in terms of user privacy violations through the capture and transmission of sensitive user interaction data. It includes features that could be exploited to collect sensitive information without user consent, raising significant security risks.
Live on npm for 40 minutes before removal. Socket users were protected even while the package was live.
auto-protect
3.0.4
by handsintechnology
Removed from npm
Blocked by Socket
The code exhibits several concerning behaviors, including potential data manipulation, logging, and obfuscation. It contains functions that could lead to SQL injection and command injection vulnerabilities. The overall assessment suggests a moderate to high risk of malicious behavior.
Live on npm for 18 days, 16 hours and 48 minutes before removal. Socket users were protected even while the package was live.
chatbot-code
110.14
Removed from pypi
Blocked by Socket
The code contains several security risks, including inadequate validation of file uploads and external links, potential CSRF vulnerabilities, and exposure of sensitive user data. These issues necessitate immediate attention to enhance the security posture of the application.
Live on pypi for 18 minutes before removal. Socket users were protected even while the package was live.
diadem-vista-szt528
1.0.0
by afifaljafari112
Removed from npm
Blocked by Socket
The code imports multiple external modules with unusual names and calls an unusual function (`functame`) from each of these modules. This pattern is highly unusual and might indicate obfuscation or an attempt to hide malicious behavior. However, without more information on the imported modules or their implementations, it is difficult to definitively determine the presence of malware.
Live on npm for 57 days, 11 hours and 9 minutes before removal. Socket users were protected even while the package was live.
pythondefender
1.0.4
Live on pypi
Blocked by Socket
The file contains code that performs malicious actions such as terminating processes associated with security and monitoring tools (e.g., 'Wireshark', 'ProcessHacker'), checking for the presence of debuggers, and forcefully exiting the program if debugging is detected. It attempts to detect proxy usage and the presence of Tor networking by connecting to external services (e.g., requests to 'http://www.google.com' and 'check[.]torproject[.]org'), which can be indicative of efforts to evade detection. Additionally, the code utilizes webhooks to send system information to external servers, potentially leading to unauthorized data exfiltration. These behaviors indicate malicious intent to harm or exploit systems, characteristic of malware.
@zitterorg/laudantium-rerum
2.3.39
by loandinhb931
Live on npm
Blocked by Socket
Malicious code in @zitterorg/laudantium-rerum (npm) Source: ghsa-malware (e45ff91dd83cc149d7abc8c6fb2c74e3509aa341e23c72cfac0a34868a4e2637) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
uba-tool-js
0.0.4
by klimetzc
Removed from npm
Blocked by Socket
The code primarily aims to provide session recording and event tracking functionality. However, it poses several security risks, including potential data leakage of sensitive user inputs and improper validation of session data. The use of hardcoded uba_id and frequent data transmissions to remote servers are significant concerns.
Live on npm for 1 hour and 1 minute before removal. Socket users were protected even while the package was live.
wolfhece
1.8.7
Live on pypi
Blocked by Socket
While the code does not exhibit explicit malicious behavior, it contains significant security risks due to hardcoded credentials, insecure data transmission, and poor data handling practices. The absence of explicit malicious intent is noted, but the potential for exploitation exists.
ganache-cli-coverage
3.0.0
by thecyberanon
Removed from npm
Blocked by Socket
This script is highly suspicious and poses a significant security risk. It should not be used.
Live on npm for 6 minutes before removal. Socket users were protected even while the package was live.
fusionsc
1.0.0a2.dev3
Live on pypi
Blocked by Socket
The code poses a security risk and should be reviewed carefully before use. The lack of input sanitization poses a potential vulnerability, and the script sends data to an external server without clear justification.
hanncuti
1.0.1
by vtuanhihi
Removed from npm
Blocked by Socket
This package was removed from the npm registry for security reasons.
@sportdigi/bootstrapper
12.1.2
by james4141
Live on npm
Blocked by Socket
This script installs a system package and exfiltrates sensitive video hardware information to a remote server, which is highly suspicious and poses a serious security risk.
kakakaakaaa
99.1.11
Removed from npm
Blocked by Socket
This install script is highly suspicious and potentially malicious. It creates a new user with a password and runs a local script named 'evil.sh'. This behavior could be used for unauthorized access or other malicious activities.
Live on npm for 9 minutes before removal. Socket users were protected even while the package was live.
context-hydrating
2.654.3
by hfst-tec
Removed from npm
Blocked by Socket
The code is likely intended for exfiltrating sensitive information from an environment based on certain conditions. The use of an obfuscated domain and Base64 encoding, combined with the targeted filtering and lack of legitimate functionality, suggests malicious intent.
Live on npm for 1 hour and 27 minutes before removal. Socket users were protected even while the package was live.
oj-mithril-utils
99.9.99
by dojo-common
Removed from npm
Blocked by Socket
The script collects information like package name, current working directory, username, hostname, and IP address, then sends it to a remote server using DNS requests.
Live on npm for 6 days, 21 hours and 27 minutes before removal. Socket users were protected even while the package was live.
zqdl111
11.1.1
by zqdl123
Removed from npm
Blocked by Socket
The script collects the hostname and the current user and sends this information to a remote server, which poses a significant security risk.
Live on npm for 11 days, 17 hours and 13 minutes before removal. Socket users were protected even while the package was live.
hs-loadsh
0.999.999
Removed from npm
Blocked by Socket
The code uses the exec function to run shell commands, which poses a significant security risk. It could potentially execute malicious code if the input to exec is manipulated. Redirecting output to /dev/null to hide execution details is suspicious.
Live on npm for 1 hour and 51 minutes before removal. Socket users were protected even while the package was live.
cp-react-ui-lib
1.3.37
by ich_dev2023
Removed from npm
Blocked by Socket
The script uses curl to send the contents of the '/etc/passwd' file to an external server. This is a clear indication of data exfiltration and is considered highly suspicious and potentially malicious.
azure-graphrbac
8.9.3
Removed from npm
Blocked by Socket
Possible typosquat of [azure](https://socket.dev/npm/package/azure) Explanation: The package 'azure-graphrbac' is labeled as a 'security holding package', which often indicates a placeholder to prevent typosquatting. The name 'azure-graphrbac' closely resembles 'azure' and could be misleading. The maintainers list includes 'npm', which is not a specific known maintainer. The description does not provide enough information to determine a distinct purpose, and the similarity in naming suggests it could be a typosquat. azure-graphrbac is a security-holding package
Live on npm for 50 minutes before removal. Socket users were protected even while the package was live.
kasms
1.0.82
by psych0124
Removed from npm
Blocked by Socket
The code takes a base64 encoded string, decodes it, and evaluates it using the 'eval' function. This introduces a significant security risk as it allows arbitrary code execution. The code should be considered dangerous and should not be used.
Live on npm for 55 minutes before removal. Socket users were protected even while the package was live.
azure-graphrbac
13.4.1000
Removed from npm
Blocked by Socket
Possible typosquat of [azure](https://socket.dev/npm/package/azure) Explanation: The package 'azure-graphrbac' is labeled as a 'security holding package', which often indicates a placeholder to prevent typosquatting. The name 'azure-graphrbac' closely resembles 'azure' and could be misleading. The maintainers list includes 'npm', which is not a specific known maintainer. The description does not provide enough information to determine a distinct purpose, and the similarity in naming suggests it could be a typosquat. azure-graphrbac is a security-holding package
Live on npm for 4 minutes before removal. Socket users were protected even while the package was live.
fhempy
0.1.77
Live on pypi
Blocked by Socket
The code has functionalities that are potentially dangerous if misused, such as downloading and executing binaries, and manipulating firmware locks. It lacks strong authentication for remote command execution, which is a significant security risk. However, there is no explicit malicious intent identified, but it should be reviewed carefully before deployment due to its capabilities.
fca-badol
1.5.2
by badolkhan646
Removed from npm
Blocked by Socket
The code appears to be a part of a larger framework and includes several potential security concerns that should be further investigated and addressed. The automatic installation of software, the use of hardcoded authorization strings, and the potential for malicious behavior in the 'AutoLogin' function and the 'console.log' override suggest a moderate security risk.
Live on npm for 9 minutes before removal. Socket users were protected even while the package was live.
sap-abstract
0.8.5
by abdallaeg2
Removed from npm
Blocked by Socket
The code is designed to send sensitive system information to a remote server, which is a significant security risk. This behavior is consistent with malicious activity, specifically data exfiltration.
Live on npm for 4 minutes before removal. Socket users were protected even while the package was live.
material-ui-plugin-styles-provider-cache
6.99.0
by caweve5902
Removed from npm
Blocked by Socket
The code uses the exec function to run shell commands, which poses a significant security risk. It could potentially execute malicious code if the input to exec is manipulated. Redirecting output to /dev/null to hide execution details is suspicious.
Live on npm for 54 minutes before removal. Socket users were protected even while the package was live.
uba-tool-js
0.0.3
by klimetzc
Removed from npm
Blocked by Socket
The code exhibits potentially malicious behavior in terms of user privacy violations through the capture and transmission of sensitive user interaction data. It includes features that could be exploited to collect sensitive information without user consent, raising significant security risks.
Live on npm for 40 minutes before removal. Socket users were protected even while the package was live.
Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.
Known malware
Possible typosquat attack
NPM Shrinkwrap
Git dependency
HTTP dependency
Suspicious Stars on GitHub
Protestware or potentially unwanted behavior
Unstable ownership
AI-detected potential malware
Obfuscated code
20 more alerts →
Bad dependency semver
Wildcard dependency
Unpopular package
Minified code
Socket optimized override available
Deprecated
Unmaintained
Critical CVE
High CVE
Medium CVE
Low CVE
Explicitly Unlicensed Item
License Policy Violation
Misc. License Issues
Non-permissive License
Ambiguous License Classifier
Copyleft License
Unidentified License
No License Found
License exception
Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.
Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.
Nat Friedman
CEO at GitHub
Congrats to @feross and the hard-working team behind @SocketSecurity on today's launch!
Suz Hinton
Senior Software Engineer at Stripe
heck yes this is awesome!!! Congrats team 🎉👏
Matteo Collina
Node.js maintainer, Fastify lead maintainer
So awesome to see @SocketSecurity launch with a fresh approach! Excited to have supported the team from the early days.
DC Posch
Director of Technology at AppFolio, CTO at Dynasty
This is going to be super important, especially for crypto projects where a compromised dependency results in stolen user assets.
Luis Naranjo
Software Engineer at Microsoft
If software supply chain attacks through npm don't scare the shit out of you, you're not paying close enough attention.
@SocketSecurity sounds like an awesome product. I'll be using socket.dev instead of npmjs.org to browse npm packages going forward
Elena Nadolinski
Founder and CEO at Iron Fish
Huge congrats to @SocketSecurity! 🙌
Literally the only product that proactively detects signs of JS compromised packages.
Joe Previte
Engineering Team Lead at Coder
Congrats to @feross and the @SocketSecurity team on their seed funding! 🚀 It's been a big help for us at @CoderHQ and we appreciate what y'all are doing!
Josh Goldberg
Staff Developer at Codecademy
This is such a great idea & looks fantastic, congrats & good luck @feross + team!
The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.
Yan Zhu
Head of Security at Brave, DEFCON, EFF, W3C
glad to hear some of the smartest people i know are working on (npm, etc.) supply chain security finally :). @SocketSecurity
Andrew Peterson
CEO and Co-Founder at Signal Sciences (acq. Fastly)
How do you track the validity of open source software libraries as they get updated? You're prob not. Check out @SocketSecurity and the updated tooling they launched.
Supply chain is a cluster in security as we all know and the tools from Socket are "duh" type tools to be implementing.
Zbyszek Tenerowicz
Senior Security Engineer at ConsenSys
socket.dev is getting more appealing by the hour
Devdatta Akhawe
Head of Security at Figma
The @SocketSecurity team is on fire! Amazing progress and I am exciting to see where they go next.
Ryan Noon
Founder & CEO at Material Security
The NPM ecosystem is a horrible horrible place and I'm glad you're doing something about it.
Sebastian Bensusan
Engineer Manager at Stripe
I find it surprising that we don't have _more_ supply chain attacks in software:
Imagine your airplane (the code running) was assembled (deployed) daily, with parts (dependencies) from internet strangers. How long until you get a bad part?
Excited for Socket to prevent this
Adam Baldwin
VP of Security at npm, Red Team at Auth0/Okta
Congrats to everyone at @SocketSecurity ❤️🤘🏻
Nico Waisman
CISO at Lyft
This is an area that I have personally been very focused on. As Nat Friedman said in the 2019 GitHub Universe keynote, Open Source won, and every time you add a new open source project you rely on someone else's code and you rely on the people that build it.
This is both exciting and problematic. You are bringing real risk into your organization, and I'm excited to see progress in the industry from OpenSSF scorecards and package analyzers to the company that Feross Aboukhadijeh is building!
Depend on Socket to prevent malicious open source dependencies from infiltrating your app.
Install the Socket GitHub App in just 2 clicks and get protected today.
Block 70+ issues in open source code, including malware, typo-squatting, hidden code, misleading packages, permission creep, and more.
Reduce work by surfacing actionable security information directly in GitHub. Empower developers to make better decisions.
Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.
Dec 14, 2023
Hijacked cryptocurrency library adds malware
Widely-used library in cryptocurrency frontend was compromised to include wallet-draining code, following the hijacking of NPM account credentials via phishing.
Jan 06, 2022
Maintainer intentionally adds malware
Rogue maintainer sabotages his own open source package with 100M downloads/month, notably breaking Amazon's AWS SDK.
Nov 15, 2021
npm discovers a platform vulnerability allowing unauthorized publishing of any package
Attackers could publish new versions of any npm package without authorization for multiple years.
Oct 22, 2021
Hijacked package adds cryptominers and password-stealing malware
Multiple packages with 30M downloads/month are hijacked and publish malicious versions directly into the software supply chain.
Nov 26, 2018
Package hijacked adding organization specific backdoors
Obfuscated malware added to a dependency which targeted a single company, went undetected for over a week, and made it into their production build.
Get our latest security research, open source insights, and product updates.
Security News
Critics call the Node.js EOL CVE a misuse of the system, sparking debate over CVE standards and the growing noise in vulnerability databases.
Security News
cURL and Go security teams are publicly rejecting CVSS as flawed for assessing vulnerabilities and are calling for more accurate, context-aware approaches.
Security News
Bun 1.2 enhances its JavaScript runtime with 90% Node.js compatibility, built-in S3 and Postgres support, HTML Imports, and faster, cloud-first performance.