
Research
2025 Report: Destructive Malware in Open Source Packages
Destructive malware is rising across open source registries, using delays and kill switches to wipe code, break builds, and disrupt CI/CD.
Golang machine learning lib. Currently, it can be used to solve binary classification problems.
Hector support libsvm-like data format. Following is an sample dataset
1 1:0.7 3:0.1 9:0.4
0 2:0.3 4:0.9 7:0.5
0 2:0.7 5:0.3
...
In src folder, you will find two program with main function : hector-cv.go and hector-run.go
hector-cv.go will help you test one algorithm by cross validation in some dataset, you can run it by following steps:
cd src
go build hector-cv.go
./hector-cv --method [Method] --train [Data Path] --cv 10
Here, Method include
hector-run.go will help you train one algorithm on train dataset and test it on test dataset, you can run it by following steps:
cd src
go build hector-run.go
./hector-run --method [Method] --train [Data Path] --test [Data Path]
Above methods will direct train algorithm on train dataset and then test on test dataset. If you want to train algorithm and get the model file, you can run it by following steps:
./hector-run --method [Method] --action train --train [Data Path] --model [Model Path]
Then, you can use model file to test any test dataset:
./hector-run --method [Method] --action test --test [Data Path] --model [Model Path]
Following are datasets used in benchmarks:
I will do 5-fold cross validation on the dataset, and use AUC as evaluation metric. Following are the results:
| DataSet | Method | AUC |
|---|---|---|
| heart | FTRL-LR | 0.9109 |
| heart | EP-LR | 0.8982 |
| heart | CART | 0.8231 |
| heart | RDT | 0.9155 |
| heart | RF | 0.9019 |
| heart | GBDT | 0.9061 |
| fourclass | FTRL-LR | 0.8281 |
| fourclass | EP-LR | 0.7986 |
| fourclass | CART | 0.9832 |
| fourclass | RDT | 0.9925 |
| fourclass | RF | 0.9947 |
| fourclass | GBDT | 0.9958 |
FAQs
Unknown package
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Research
Destructive malware is rising across open source registries, using delays and kill switches to wipe code, break builds, and disrupt CI/CD.

Security News
Socket CTO Ahmad Nassri shares practical AI coding techniques, tools, and team workflows, plus what still feels noisy and why shipping remains human-led.

Research
/Security News
A five-month operation turned 27 npm packages into durable hosting for browser-run lures that mimic document-sharing portals and Microsoft sign-in, targeting 25 organizations across manufacturing, industrial automation, plastics, and healthcare for credential theft.