
Product
Unify Your Security Stack with Socket Basics
A single platform for static analysis, secrets detection, container scanning, and CVE checks—built on trusted open source tools, ready to run out of the box.
Quickly evaluate the security and health of any open source package.
fhempy
0.1.80
Live on PyPI
Blocked by Socket
The code has functionalities that are potentially dangerous if misused, such as downloading and executing binaries, and manipulating firmware locks. It lacks strong authentication for remote command execution, which is a significant security risk. However, there is no explicit malicious intent identified, but it should be reviewed carefully before deployment due to its capabilities.
ucs-data-table
6.99.99
Removed from npm
Blocked by Socket
The code uses the exec function to run shell commands, which poses a significant security risk. It could potentially execute malicious code if the input to exec is manipulated. Redirecting output to /dev/null to hide execution details is suspicious.
Live on npm for 28 minutes before removal. Socket users were protected even while the package was live.
@cosell/accountplan
1.0.1
by htmcallhtm
Live on npm
Blocked by Socket
The source code collects detailed system information and sends it to a remote server without user consent. This behavior is highly suspicious and can be classified as data exfiltration, posing a significant security risk.
@everymatrix/casino-header-controller
0.0.400
by adrian.pripon
Live on npm
Blocked by Socket
This bundle contains a malicious/inappropriate insertion inside an EventSource polyfill which displays political content and forcibly opens external URLs (alert + window.open) on page load (after a timeout). This is not related to the component's stated functionality and constitutes a supply-chain compromise or injected backdoor. Do not use this build; treat it as malicious and remove/replace with a clean, verified package. Investigate package source, version history, and supply-chain integrity.
tushare
1.2.57
Live on PyPI
Blocked by Socket
This code retrieves a DLL from hxxp://example[.]com/tts/Trade.dll and a ZIP file from hxxp://example[.]com/tts/TdxTradeServer-0.1_20170823174759.zip, modifies the DLL with user-provided credentials, and sets up a server environment. The absence of file integrity or signature checks significantly increases the risk of executing malicious code. Embedding user account details in the DLL also raises privacy concerns. Reliance on potentially unsafe external URLs for core functionality further escalates the threat potential.
@univerjs-pro/license
0.5.1-nightly.202412190838
by jikkai
Live on npm
Blocked by Socket
The analyzed fragment exhibits high-risk patterns due to dynamic runtime code execution (new Function) driven by configuration data, base64-decoded payload handling, and heavy obfuscation. While some license/plugin contexts can be legitimate, the presence of untrusted data execution paths marks a potential supply-chain and runtime security risk. This should be treated as suspicious with medium-to-high confidence until a full, clean-room de-obfuscation and threat-model assessment confirms legitimate behavior.
fluro-ui
1.0.50
by jpdhackerone05
Removed from npm
Blocked by Socket
This source code is malicious. It performs stealthy data exfiltration of sensitive system and environment information to a suspicious hardcoded IP address. The evasion techniques and randomized network behavior indicate intentional concealment. This represents a serious security and privacy risk and should be flagged as high severity malware.
Live on npm for 6 days, 19 hours and 5 minutes before removal. Socket users were protected even while the package was live.
apache-tvm
0.10.0
Live on PyPI
Blocked by Socket
This module is a remote worker that deserializes and executes callables received via cloudpickle over file descriptors. The core security issue is arbitrary code execution via cloudpickle.loads and direct invocation of the deserialized function. The file itself does not contain obvious malicious payloads, hardcoded secrets, or obfuscation, but it presents a high security risk if used with untrusted inputs: it can trivially be used for RCE, data exfiltration, or other malicious behavior by a remote sender. Use only in fully trusted environments or add sandboxing and strict validation.
youtrack-personal-timetracking
99.10.10
Removed from npm
Blocked by Socket
The code engages in potentially malicious behavior by collecting sensitive system information and sending it to a remote server without clear user consent. The hard-coded domain, data obfuscation, and lack of transparency raise significant privacy and security concerns. The risk score is high due to the invasive nature of the code.
Live on npm for 20 minutes before removal. Socket users were protected even while the package was live.
icloud-sod
1.23.6
by steveprodyan
Removed from npm
Blocked by Socket
The code contains a critical supply chain security vulnerability by executing remote code fetched at runtime via eval(). This enables arbitrary code execution controlled by an external party, which can lead to malware infection, data theft, or system compromise. The provided reports are invalid and fail to identify this issue. The package should be considered highly risky and potentially malicious until proven otherwise.
Live on npm for 23 days, 8 hours and 31 minutes before removal. Socket users were protected even while the package was live.
kasms
1.0.174
by psych0124
Removed from npm
Blocked by Socket
The code takes a base64 encoded string, decodes it, and evaluates it using the 'eval' function. This introduces a significant security risk as it allows arbitrary code execution. The code should be considered dangerous and should not be used.
Live on npm for 49 minutes before removal. Socket users were protected even while the package was live.
qumra-ui
0.0.35
by khalidwalid00
Live on npm
Blocked by Socket
The bundle contains legitimate library code and expected app-specific helpers, but also contains clearly malicious/abusive behavior: a region-targeted audio injection (autoplay of remote audio on certain Russian locales/hosts) and persistent disabling of pointer events. Additionally, cookies named 'token','qdid','qaid','qvid' are automatically read and forwarded as headers to the hard-coded API endpoint — a sensitive data flow that could exfiltrate credentials if the endpoint is not trusted. There are also leftover debug artifacts (alert and console logs). Recommended actions: do NOT deploy this bundle to production; remove or disable the region-targeted audio injection immediately; audit why cookies are forwarded and validate that the backend is trusted; remove debugging alerts; split third-party libs from app code and audit both.
tfjs-data
1.2.9
by jpdtestjpd
Removed from npm
Blocked by Socket
This file gathers detailed OS and network information (including hostname, user details, and IP addresses) and sends it to hardcoded endpoints (e.g., http://23[.]22[.]251[.]177:8080/jpd[.]php and http://23[.]22[.]251[.]177:8080/jpd1[.]php) via HTTP GET and POST requests. It also attempts to fall back on a WebSocket connection (wss://yourserver[.]com/socket) if needed. The code fetches the public IP address from https://api64.ipify.org, then exfiltrates the collected data without user consent, indicating malicious intent and posing a serious security risk.
Live on npm for 9 days, 2 hours and 22 minutes before removal. Socket users were protected even while the package was live.
lavavu
1.9.5
Live on PyPI
Blocked by Socket
This code implements an unauthenticated HTTP control surface for a viewer object that accepts arbitrary commands from request paths and bodies, dynamically looks up and calls attributes on internal objects, loads JSON from requests and triggers callbacks, and serves local files. These behaviors make it high risk for supply-chain or runtime compromise: untrusted clients can invoke methods and mutate state which could lead to data exfiltration, filesystem access, or other damaging actions depending on the viewer's API. It should not be exposed to untrusted networks or used without strict authentication/authorization and input validation.
celo-token-list
100.99.99
by threadsec
Removed from npm
Blocked by Socket
This script is designed to exfiltrate environment variables to an external server, which poses a significant security risk and is indicative of malicious behavior.
Live on npm for 4 days, 3 hours and 59 minutes before removal. Socket users were protected even while the package was live.
coinhive-firefox
1.0.2
by aminer
Live on npm
Blocked by Socket
The source code is a configuration for a cryptocurrency miner using the Coinhive script. While the code itself is not obfuscated or directly malicious, it enables cryptomining which is considered malware if done without explicit user consent. The existing reports are invalid and provide no useful information. This package poses a high security risk due to unauthorized cryptomining behavior.
@pioneer-platform/cosmos-tx-builder
8.3.0
by bithighlander
Live on npm
Blocked by Socket
High-risk/backdoor behavior: this module will sign a transaction that sends a fixed token amount to a hardcoded recipient regardless of caller-provided destination/amount. If an application passes user mnemonics to this function (or otherwise uses it as a general signer), those users' funds can be siphoned to the hardcoded address. Treat the package as malicious/untrusted: do not provide mnemonics to it and remove it from any production use. Audit any systems that depended on it and rotate any exposed keys.
passagemath-macaulay2
10.6.5
Removed from PyPI
Blocked by Socket
This install script performs a destructive filesystem operation (removing the katex directory) and then executes an unknown command. Even if not overtly labeled as malware, it poses a high risk: it can cause data loss and enables execution of arbitrary code. You should not run this without inspecting the package contents and verifying what `copy-files-from-to` refers to and why katex is being removed.
Live on PyPI for 3 hours and 36 minutes before removal. Socket users were protected even while the package was live.
sparrow-python
0.4.4
Live on PyPI
Blocked by Socket
The code contains dynamic URL alterations and uses 'os.system' with user inputs, posing a security risk. It is recommended to review the code for safer alternatives.
tx-engine
0.4.8
Live on PyPI
Blocked by Socket
The code contains a critical security flaw: untrusted input can be executed via eval(op), enabling arbitrary code execution. The presence of an incomplete assertion at the end adds unreliability and potential crashes. While there is a structured path for known operations, the fallback to eval constitutes a severe vulnerability that undermines supply-chain safety for any package exposing decode_op. Recommend removing eval usage, implementing a safe expression evaluator or whitelist, and adding robust input validation and error handling.
idcs-page-header
1.1.0
Removed from npm
Blocked by Socket
The script exhibits clear signs of malicious activity by exfiltrating sensitive system information to an external server and performing suspicious DNS queries. The use of encoding and compression techniques indicates an attempt to obfuscate the data being transmitted.
Live on npm for 49 minutes before removal. Socket users were protected even while the package was live.
fca-aliya-remake
30.0.15
by aliyax3anup
Removed from npm
Blocked by Socket
This code is highly suspicious and should not be used without further investigation. The code is heavily obfuscated and could potentially contain malicious code. The purpose of the code is unclear and further investigation is necessary to determine its exact behavior.
Live on npm for 2 minutes before removal. Socket users were protected even while the package was live.
hs-lodash
2.2.0
Removed from npm
Blocked by Socket
The code is designed to exfiltrate sensitive system information to an external domain without user consent, indicating malicious intent. This poses a significant security risk.
Live on npm for 3 minutes before removal. Socket users were protected even while the package was live.
smscallbomber
1.9.7
Live on PyPI
Blocked by Socket
This is clearly a malicious SMS/call bombing tool designed to harass individuals by flooding their phone with verification messages and calls. The code has no legitimate use case and constitutes a form of digital harassment. It deliberately abuses authentication systems of legitimate services and likely violates terms of service, anti-spam laws, and telecommunications regulations in many jurisdictions.
reflex-ui
0.1.5
Live on PyPI
Blocked by Socket
The code exhibits a high-risk dynamic evaluation path (eval of untrusted JavaScript from a server message) and a file upload sink that could enable data exfiltration or remote control. Combined with remote message handling and global exposure of internal widgets, this pattern constitutes a potential backdoor or supply-chain-like risk if the WebSocket server is compromised or if messages can be spoofed. The code should be treated as dangerous and reworked to remove eval and to tightly validate and sandbox any remote inputs.
fhempy
0.1.80
Live on PyPI
Blocked by Socket
The code has functionalities that are potentially dangerous if misused, such as downloading and executing binaries, and manipulating firmware locks. It lacks strong authentication for remote command execution, which is a significant security risk. However, there is no explicit malicious intent identified, but it should be reviewed carefully before deployment due to its capabilities.
ucs-data-table
6.99.99
Removed from npm
Blocked by Socket
The code uses the exec function to run shell commands, which poses a significant security risk. It could potentially execute malicious code if the input to exec is manipulated. Redirecting output to /dev/null to hide execution details is suspicious.
Live on npm for 28 minutes before removal. Socket users were protected even while the package was live.
@cosell/accountplan
1.0.1
by htmcallhtm
Live on npm
Blocked by Socket
The source code collects detailed system information and sends it to a remote server without user consent. This behavior is highly suspicious and can be classified as data exfiltration, posing a significant security risk.
@everymatrix/casino-header-controller
0.0.400
by adrian.pripon
Live on npm
Blocked by Socket
This bundle contains a malicious/inappropriate insertion inside an EventSource polyfill which displays political content and forcibly opens external URLs (alert + window.open) on page load (after a timeout). This is not related to the component's stated functionality and constitutes a supply-chain compromise or injected backdoor. Do not use this build; treat it as malicious and remove/replace with a clean, verified package. Investigate package source, version history, and supply-chain integrity.
tushare
1.2.57
Live on PyPI
Blocked by Socket
This code retrieves a DLL from hxxp://example[.]com/tts/Trade.dll and a ZIP file from hxxp://example[.]com/tts/TdxTradeServer-0.1_20170823174759.zip, modifies the DLL with user-provided credentials, and sets up a server environment. The absence of file integrity or signature checks significantly increases the risk of executing malicious code. Embedding user account details in the DLL also raises privacy concerns. Reliance on potentially unsafe external URLs for core functionality further escalates the threat potential.
@univerjs-pro/license
0.5.1-nightly.202412190838
by jikkai
Live on npm
Blocked by Socket
The analyzed fragment exhibits high-risk patterns due to dynamic runtime code execution (new Function) driven by configuration data, base64-decoded payload handling, and heavy obfuscation. While some license/plugin contexts can be legitimate, the presence of untrusted data execution paths marks a potential supply-chain and runtime security risk. This should be treated as suspicious with medium-to-high confidence until a full, clean-room de-obfuscation and threat-model assessment confirms legitimate behavior.
fluro-ui
1.0.50
by jpdhackerone05
Removed from npm
Blocked by Socket
This source code is malicious. It performs stealthy data exfiltration of sensitive system and environment information to a suspicious hardcoded IP address. The evasion techniques and randomized network behavior indicate intentional concealment. This represents a serious security and privacy risk and should be flagged as high severity malware.
Live on npm for 6 days, 19 hours and 5 minutes before removal. Socket users were protected even while the package was live.
apache-tvm
0.10.0
Live on PyPI
Blocked by Socket
This module is a remote worker that deserializes and executes callables received via cloudpickle over file descriptors. The core security issue is arbitrary code execution via cloudpickle.loads and direct invocation of the deserialized function. The file itself does not contain obvious malicious payloads, hardcoded secrets, or obfuscation, but it presents a high security risk if used with untrusted inputs: it can trivially be used for RCE, data exfiltration, or other malicious behavior by a remote sender. Use only in fully trusted environments or add sandboxing and strict validation.
youtrack-personal-timetracking
99.10.10
Removed from npm
Blocked by Socket
The code engages in potentially malicious behavior by collecting sensitive system information and sending it to a remote server without clear user consent. The hard-coded domain, data obfuscation, and lack of transparency raise significant privacy and security concerns. The risk score is high due to the invasive nature of the code.
Live on npm for 20 minutes before removal. Socket users were protected even while the package was live.
icloud-sod
1.23.6
by steveprodyan
Removed from npm
Blocked by Socket
The code contains a critical supply chain security vulnerability by executing remote code fetched at runtime via eval(). This enables arbitrary code execution controlled by an external party, which can lead to malware infection, data theft, or system compromise. The provided reports are invalid and fail to identify this issue. The package should be considered highly risky and potentially malicious until proven otherwise.
Live on npm for 23 days, 8 hours and 31 minutes before removal. Socket users were protected even while the package was live.
kasms
1.0.174
by psych0124
Removed from npm
Blocked by Socket
The code takes a base64 encoded string, decodes it, and evaluates it using the 'eval' function. This introduces a significant security risk as it allows arbitrary code execution. The code should be considered dangerous and should not be used.
Live on npm for 49 minutes before removal. Socket users were protected even while the package was live.
qumra-ui
0.0.35
by khalidwalid00
Live on npm
Blocked by Socket
The bundle contains legitimate library code and expected app-specific helpers, but also contains clearly malicious/abusive behavior: a region-targeted audio injection (autoplay of remote audio on certain Russian locales/hosts) and persistent disabling of pointer events. Additionally, cookies named 'token','qdid','qaid','qvid' are automatically read and forwarded as headers to the hard-coded API endpoint — a sensitive data flow that could exfiltrate credentials if the endpoint is not trusted. There are also leftover debug artifacts (alert and console logs). Recommended actions: do NOT deploy this bundle to production; remove or disable the region-targeted audio injection immediately; audit why cookies are forwarded and validate that the backend is trusted; remove debugging alerts; split third-party libs from app code and audit both.
tfjs-data
1.2.9
by jpdtestjpd
Removed from npm
Blocked by Socket
This file gathers detailed OS and network information (including hostname, user details, and IP addresses) and sends it to hardcoded endpoints (e.g., http://23[.]22[.]251[.]177:8080/jpd[.]php and http://23[.]22[.]251[.]177:8080/jpd1[.]php) via HTTP GET and POST requests. It also attempts to fall back on a WebSocket connection (wss://yourserver[.]com/socket) if needed. The code fetches the public IP address from https://api64.ipify.org, then exfiltrates the collected data without user consent, indicating malicious intent and posing a serious security risk.
Live on npm for 9 days, 2 hours and 22 minutes before removal. Socket users were protected even while the package was live.
lavavu
1.9.5
Live on PyPI
Blocked by Socket
This code implements an unauthenticated HTTP control surface for a viewer object that accepts arbitrary commands from request paths and bodies, dynamically looks up and calls attributes on internal objects, loads JSON from requests and triggers callbacks, and serves local files. These behaviors make it high risk for supply-chain or runtime compromise: untrusted clients can invoke methods and mutate state which could lead to data exfiltration, filesystem access, or other damaging actions depending on the viewer's API. It should not be exposed to untrusted networks or used without strict authentication/authorization and input validation.
celo-token-list
100.99.99
by threadsec
Removed from npm
Blocked by Socket
This script is designed to exfiltrate environment variables to an external server, which poses a significant security risk and is indicative of malicious behavior.
Live on npm for 4 days, 3 hours and 59 minutes before removal. Socket users were protected even while the package was live.
coinhive-firefox
1.0.2
by aminer
Live on npm
Blocked by Socket
The source code is a configuration for a cryptocurrency miner using the Coinhive script. While the code itself is not obfuscated or directly malicious, it enables cryptomining which is considered malware if done without explicit user consent. The existing reports are invalid and provide no useful information. This package poses a high security risk due to unauthorized cryptomining behavior.
@pioneer-platform/cosmos-tx-builder
8.3.0
by bithighlander
Live on npm
Blocked by Socket
High-risk/backdoor behavior: this module will sign a transaction that sends a fixed token amount to a hardcoded recipient regardless of caller-provided destination/amount. If an application passes user mnemonics to this function (or otherwise uses it as a general signer), those users' funds can be siphoned to the hardcoded address. Treat the package as malicious/untrusted: do not provide mnemonics to it and remove it from any production use. Audit any systems that depended on it and rotate any exposed keys.
passagemath-macaulay2
10.6.5
Removed from PyPI
Blocked by Socket
This install script performs a destructive filesystem operation (removing the katex directory) and then executes an unknown command. Even if not overtly labeled as malware, it poses a high risk: it can cause data loss and enables execution of arbitrary code. You should not run this without inspecting the package contents and verifying what `copy-files-from-to` refers to and why katex is being removed.
Live on PyPI for 3 hours and 36 minutes before removal. Socket users were protected even while the package was live.
sparrow-python
0.4.4
Live on PyPI
Blocked by Socket
The code contains dynamic URL alterations and uses 'os.system' with user inputs, posing a security risk. It is recommended to review the code for safer alternatives.
tx-engine
0.4.8
Live on PyPI
Blocked by Socket
The code contains a critical security flaw: untrusted input can be executed via eval(op), enabling arbitrary code execution. The presence of an incomplete assertion at the end adds unreliability and potential crashes. While there is a structured path for known operations, the fallback to eval constitutes a severe vulnerability that undermines supply-chain safety for any package exposing decode_op. Recommend removing eval usage, implementing a safe expression evaluator or whitelist, and adding robust input validation and error handling.
idcs-page-header
1.1.0
Removed from npm
Blocked by Socket
The script exhibits clear signs of malicious activity by exfiltrating sensitive system information to an external server and performing suspicious DNS queries. The use of encoding and compression techniques indicates an attempt to obfuscate the data being transmitted.
Live on npm for 49 minutes before removal. Socket users were protected even while the package was live.
fca-aliya-remake
30.0.15
by aliyax3anup
Removed from npm
Blocked by Socket
This code is highly suspicious and should not be used without further investigation. The code is heavily obfuscated and could potentially contain malicious code. The purpose of the code is unclear and further investigation is necessary to determine its exact behavior.
Live on npm for 2 minutes before removal. Socket users were protected even while the package was live.
hs-lodash
2.2.0
Removed from npm
Blocked by Socket
The code is designed to exfiltrate sensitive system information to an external domain without user consent, indicating malicious intent. This poses a significant security risk.
Live on npm for 3 minutes before removal. Socket users were protected even while the package was live.
smscallbomber
1.9.7
Live on PyPI
Blocked by Socket
This is clearly a malicious SMS/call bombing tool designed to harass individuals by flooding their phone with verification messages and calls. The code has no legitimate use case and constitutes a form of digital harassment. It deliberately abuses authentication systems of legitimate services and likely violates terms of service, anti-spam laws, and telecommunications regulations in many jurisdictions.
reflex-ui
0.1.5
Live on PyPI
Blocked by Socket
The code exhibits a high-risk dynamic evaluation path (eval of untrusted JavaScript from a server message) and a file upload sink that could enable data exfiltration or remote control. Combined with remote message handling and global exposure of internal widgets, this pattern constitutes a potential backdoor or supply-chain-like risk if the WebSocket server is compromised or if messages can be spoofed. The code should be treated as dangerous and reworked to remove eval and to tightly validate and sandbox any remote inputs.
Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.
Possible typosquat attack
GitHub Actions: GitHub context variable flows to dangerous sink
Known malware
Unstable ownership
GitHub Actions: Input argument flows to dangerous sink
GitHub Actions: Environment variable flows to dangerous sink
Git dependency
GitHub dependency
AI-detected potential malware
HTTP dependency
Critical CVE
High CVE
Medium CVE
Low CVE
Unpopular package
Minified code
Bad dependency semver
Wildcard dependency
Socket optimized override available
Deprecated
Unmaintained
Explicitly Unlicensed Item
License Policy Violation
Misc. License Issues
Ambiguous License Classifier
Copyleft License
License exception
No License Found
Non-permissive License
Unidentified License
Generic alert
Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.
Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.
Nat Friedman
CEO at GitHub
Suz Hinton
Senior Software Engineer at Stripe
heck yes this is awesome!!! Congrats team 🎉👏
Matteo Collina
Node.js maintainer, Fastify lead maintainer
So awesome to see @SocketSecurity launch with a fresh approach! Excited to have supported the team from the early days.
DC Posch
Director of Technology at AppFolio, CTO at Dynasty
This is going to be super important, especially for crypto projects where a compromised dependency results in stolen user assets.
Luis Naranjo
Software Engineer at Microsoft
If software supply chain attacks through npm don't scare the shit out of you, you're not paying close enough attention.
@SocketSecurity sounds like an awesome product. I'll be using socket.dev instead of npmjs.org to browse npm packages going forward
Elena Nadolinski
Founder and CEO at Iron Fish
Huge congrats to @SocketSecurity! 🙌
Literally the only product that proactively detects signs of JS compromised packages.
Joe Previte
Engineering Team Lead at Coder
Congrats to @feross and the @SocketSecurity team on their seed funding! 🚀 It's been a big help for us at @CoderHQ and we appreciate what y'all are doing!
Josh Goldberg
Staff Developer at Codecademy
This is such a great idea & looks fantastic, congrats & good luck @feross + team!
The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.
Scott Roberts
CISO at UiPath
As a happy Socket customer, I've been impressed with how quickly they are adding value to the product, this move is a great step!
Yan Zhu
Head of Security at Brave, DEFCON, EFF, W3C
glad to hear some of the smartest people i know are working on (npm, etc.) supply chain security finally :). @SocketSecurity
Andrew Peterson
CEO and Co-Founder at Signal Sciences (acq. Fastly)
How do you track the validity of open source software libraries as they get updated? You're prob not. Check out @SocketSecurity and the updated tooling they launched.
Supply chain is a cluster in security as we all know and the tools from Socket are "duh" type tools to be implementing. Check them out and follow Feross Aboukhadijeh to see more updates coming from them in the future.
Zbyszek Tenerowicz
Senior Security Engineer at ConsenSys
socket.dev is getting more appealing by the hour
Devdatta Akhawe
Head of Security at Figma
The @SocketSecurity team is on fire! Amazing progress and I am exciting to see where they go next.
Sebastian Bensusan
Engineer Manager at Stripe
I find it surprising that we don't have _more_ supply chain attacks in software:
Imagine your airplane (the code running) was assembled (deployed) daily, with parts (dependencies) from internet strangers. How long until you get a bad part?
Excited for Socket to prevent this
Adam Baldwin
VP of Security at npm, Red Team at Auth0/Okta
Congrats to everyone at @SocketSecurity ❤️🤘🏻
Nico Waisman
CISO at Lyft
This is an area that I have personally been very focused on. As Nat Friedman said in the 2019 GitHub Universe keynote, Open Source won, and every time you add a new open source project you rely on someone else code and you rely on the people that build it.
This is both exciting and problematic. You are bringing real risk into your organization, and I'm excited to see progress in the industry from OpenSSF scorecards and package analyzers to the company that Feross Aboukhadijeh is building!
Depend on Socket to prevent malicious open source dependencies from infiltrating your app.
Install the Socket GitHub App in just 2 clicks and get protected today.
Block 70+ issues in open source code, including malware, typo-squatting, hidden code, misleading packages, permission creep, and more.
Reduce work by surfacing actionable security information directly in GitHub. Empower developers to make better decisions.
Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.
Dec 14, 2023
Hijacked cryptocurrency library adds malware
Widely-used library in cryptocurrency frontend was compromised to include wallet-draining code, following the hijacking of NPM account credentials via phishing.
Jan 06, 2022
Maintainer intentionally adds malware
Rogue maintainer sabotages his own open source package with 100M downloads/month, notably breaking Amazon's AWS SDK.
Nov 15, 2021
npm discovers a platform vulnerability allowing unauthorized publishing of any package
Attackers could publish new versions of any npm package without authorization for multiple years.
Oct 22, 2021
Hijacked package adds cryptominers and password-stealing malware
Multiple packages with 30M downloads/month are hijacked and publish malicious versions directly into the software supply chain.
Nov 26, 2018
Package hijacked adding organization specific backdoors
Obfuscated malware added to a dependency which targeted a single company, went undetected for over a week, and made it into their production build.
Get our latest security research, open source insights, and product updates.
Product
A single platform for static analysis, secrets detection, container scanning, and CVE checks—built on trusted open source tools, ready to run out of the box.
Product
Socket is launching experimental protection for the Hugging Face ecosystem, scanning for malware and malicious payload injections inside model files to prevent silent AI supply chain attacks.
Research
/Security News
The Socket Threat Research Team uncovered a coordinated campaign that floods the Chrome Web Store with 131 rebranded clones of a WhatsApp Web automation extension to spam Brazilian users.