
Research
2025 Report: Destructive Malware in Open Source Packages
Destructive malware is rising across open source registries, using delays and kill switches to wipe code, break builds, and disrupt CI/CD.
I was working on a project where we had multiple services with in one project (e.g. Web, SafeKeeping, IOS, Call Notice, etc.). WEB was the front-end that will let the user upload the CSV file, and prepare it. After that, other services can collect the data using a POST request.
The whole CSV file parsing is devided into 2 parts...
It converts the contents of the passed/received file into a multipart.Writer
form file so the data can be passed to next service.
It returns the correct HTTP Content-Type, the form content as bytes, and a possible error.
(WEB service will collect the CSV file from the user, prepare it using
MultipartWriter() and send it off to other/next service.)
It reads the records from the passed/received CSV-encoded file and returns the parsed data (in a 2D String slice format) to the next service.
It also gives an option to include or exclude file header.
(Other services will collect the file/data from the POST request and
parse it using the MultipartReader())
FAQs
Unknown package
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Research
Destructive malware is rising across open source registries, using delays and kill switches to wipe code, break builds, and disrupt CI/CD.

Security News
Socket CTO Ahmad Nassri shares practical AI coding techniques, tools, and team workflows, plus what still feels noisy and why shipping remains human-led.

Research
/Security News
A five-month operation turned 27 npm packages into durable hosting for browser-run lures that mimic document-sharing portals and Microsoft sign-in, targeting 25 organizations across manufacturing, industrial automation, plastics, and healthcare for credential theft.