Big News: Socket Selected for OpenAI's Cybersecurity Grant Program.Details
Socket
Book a DemoSign in
Socket

Socket for Java

Secure Your Java Projects

Install our free GitHub app to protect Java dependencies from vulnerable and malicious code.

Detect and block malware, mining software, open source license violations, code quality issues, and 70+ indicators of supply chain attacks. Socket is a full-featured enterprise-ready SCA tool that can be seamlessly dropped into your workflow with just two clicks.

Install GitHub AppContact Sales
Socket for Java

Socket supports Maven and Gradle

And all your favorite tools

We protect you from vulnerable and malicious Java packages

com.jwebmp.jre11:jwebmp-jqx-widgets

0.62.0.1

Live on maven

Blocked by Socket

The code fragment contains a high-risk covert redirect to an external domain (www.jqwidgets.com) triggered when the host is not that domain. This behavior functions as a backdoor-like telemetry/redirect and constitutes a serious privacy and supply-chain concern. It can enable data exfiltration or unwanted user tracking. Immediate remediation should remove or disable this redirect logic and audit the library for additional covert behaviors. Without this, the library remains a legitimate charting tool but with unacceptable privacy risk due to the hidden redirect.

io.acryl:datahub-custom-plugin-lib

1.1.0.3

Live on maven

Blocked by Socket

The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.

org.webjars.npm:sweetalert2

11.15.3

Live on maven

Blocked by Socket

The code contains an intentional, targeted malicious payload embedded in a UI library: it waits for Russian-locale users on Russian hosts, uses localStorage to delay action for >3 days, then disables page interaction and injects/plays an external audio file (a Ukrainian anthem) hosted on a third-party domain. This is a supply-chain sabotage/backdoor and is malicious. Do not use this package version; remove it and investigate dependencies and any deployments that included it.

ai.databand:dbnd-agent

1.0.27.18

Live on maven

Blocked by Socket

The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.

org.jeecgframework.jimureport:jimureport-spring-boot-starter

2.3.1

Live on maven

Blocked by Socket

The fragment demonstrates comprehensive host fingerprinting capabilities (MAC, ProcessorId, serial numbers), cross-platform data collection, and network exfiltration pathways, coupled with script-based payload delivery (VBScript/WSH) and external command execution. These characteristics strongly indicate malicious or highly suspicious beacon/backdoor behavior. Without trustworthy provenance or explicit opt-in controls, this code should be treated as malware-like in a supply-chain setting and isolated for further forensic analysis; remove or replace with clearly auditable, opt-in equivalents if used in production dependencies.

io.github.reajason:packer

2.6.0

Live on maven

Blocked by Socket

This class is an exploit/payload builder for Java deserialization vulnerabilities using Commons-Beanutils BeanComparator + PriorityQueue + TemplatesImpl gadget chain. It takes class bytes supplied via the config, embeds them in a TemplatesImpl instance, mutates private fields via reflection to craft the gadget graph, and returns a serialized representation. This is intentionally malicious (constructs remote code execution payloads) and should be treated as highly dangerous in a supply-chain context.

org.mvnpm:sweetalert2

11.15.10

Live on maven

Blocked by Socket

This code contains a politically motivated supply chain attack that specifically targets Russian users. After a 3-day delay, it disables website interaction and plays Ukrainian national anthem on loop. While most of the code is legitimate SweetAlert2 functionality, the embedded malicious payload makes this package extremely dangerous and should not be used.

io.github.mirrerror:discordutils

4.8.1

Live on maven

Blocked by Socket

The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.

org.webjars.npm:sweetalert2

11.12.2

Live on maven

Blocked by Socket

The code primarily serves to provide alert functionality using the SweetAlert2 library. However, it includes potentially risky behavior, such as the use of new Function(), and dynamically playing a remote audio file based on locale and domain conditions. This requires further scrutiny for any context-specific vulnerabilities.

ai.databand:dbnd-azkaban-agent

1.0.27.13

Live on maven

Blocked by Socket

The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.

io.github.reajason:generator

2.6.0

Live on maven

Blocked by Socket

This class is a backdoor/memshell implant. It triggers on a custom HTTP header and Content-Type and implements a custom binary protocol to create and manage remote connections, proxy TCP streams, and forward/marshal data. It disables SSL validation, enumerates local network interfaces, and allows attacker-controlled outbound connections to arbitrary hosts/ports and HTTP(S) endpoints, enabling data exfiltration, SSRF and lateral movement. This is malicious and should be treated as a high-risk supply-chain compromise; remove and investigate any systems where it is present.

io.github.reajason:generator

2.6.1

Live on maven

Blocked by Socket

This class is a clear malicious backdoor / webshell (memory-shell) for Jetty servers. It listens for a covert header/parameter combination, decrypts and loads arbitrary class bytes into the JVM (using Unsafe or defineClass via reflection), instantiates and interacts with the payload, and returns encoded output. It bypasses module and classloader protections and uses static secrets and reflection to evade detection. Do not deploy or run this component; treat as high-risk compromise and remove/scan for other implants.

org.apache.knox:knox-token-generation-ui

2.0.0

Live on maven

Blocked by Socket

This code bundle includes legitimate library code (SweetAlert2, zone.js, polyfills, HTTP client fragments) but contains a clearly malicious/abusive injection: a small conditional that targets Russian locale/hosts and injects and autoplays an externally hosted MP3 while temporarily disabling user interactions, gated by localStorage. This is a targeted, unwanted behavior (UX disruption and potential propaganda/tracking) and constitutes a supply-chain malicious insertion. Treat this package/version as compromised: remove or block its use, audit upstream source/repository for unauthorized commits, and scan for other similar injections. If already deployed, consider removing the script and informing stakeholders; also check if external domain has been contacted (server logs) to assess reach.

io.vilt.minium:minium-webelements

1.4.1

Live on maven

Blocked by Socket

This module exposes a high-risk arbitrary code execution primitive by adding `$.fn.eval*` methods that run caller-provided JavaScript via `eval` without any validation. Even absent explicit network/stealing behavior in the snippet, the capability is severe and strongly suggests misuse potential (XSS/code injection within the page context or abuse in automated runs).

org.eclipse.dirigible:dirigible-components-security-oauth2

10.6.28

Live on maven

Blocked by Socket

The code fragment exposes a web-based terminal on port 9000 via ttyd with an incomplete or mis-typed shell command ('bas'), creating a remote command execution surface without visible access controls. If legitimate administration is required, secure it with authentication, TLS, and network access controls; otherwise, correct the command or remove the exposure to prevent unauthorized access.

org.graylog2:graylog2-server

3.0.0-alpha.1

Live on maven

Blocked by Socket

The provided code is a minified and obfuscated version of the `moment.js` library. The accompanying 'reports' are unhelpful promises, providing no concrete security findings. While `moment.js` itself is not inherently malicious, its complexity, minification, and history of vulnerabilities (like ReDoS and prototype pollution) make it a potential target for supply chain attacks. The lack of specific findings in the reports prevents a detailed analysis, but the overall context suggests a need for caution.

org.eclipse.dirigible:dirigible-components-security-basic

10.6.37

Live on maven

Blocked by Socket

The code fragment exposes a web-based terminal on port 9000 via ttyd with an incomplete or mis-typed shell command ('bas'), creating a remote command execution surface without visible access controls. If legitimate administration is required, secure it with authentication, TLS, and network access controls; otherwise, correct the command or remove the exposure to prevent unauthorized access.

org.jeecgframework.jimureport:jimureport-spring-boot-starter

1.9.5

Live on maven

Blocked by Socket

This code fragment functions as a cryptographic loader with obfuscated access patterns and dynamic resource handling. While it could be a legitimate decryption utility, the combination of static Base64 payloads, ECB-mode encryption, and resource loading based on decoded material presents non-trivial supply-chain risk. The pattern strongly suggests potential for hidden payloads or runtime decryption of assets within the JAR or environment. Immediate actions: verify the source of Base64 payloads, audit how decoded keys/payloads are used by the larger codebase, remove ECB usage or replace with authenticated encryption if confidentiality is required, and implement strict validation for all dynamically loaded resources. Risk assessment: high for supply-chain security (malicious payload loading or backdoor potential) but no explicit exfiltration observed here. Evidence justifies treating this as a high-risk cryptographic loader module that requires thorough contextual review.

io.acryl:datahub-custom-plugin-lib

1.3.0.1rc3

Live on maven

Blocked by Socket

The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.

io.github.reajason:generator

2.5.0

Live on maven

Blocked by Socket

This class is a deliberate memory-resident webshell/tunneling backdoor. It activates on a secret HTTP header, decodes a custom protocol from request bodies, opens outbound TCP/HTTP(S) connections to attacker-specified hosts, disables SSL verification for HTTPS connections, maintains in-memory state for persistent tunnels, and spawns threads that pipe data between sockets and HTTP responses. It is malicious and should be removed and investigated; any server containing this code should be treated as compromised, with incident response steps (isolate, rotate credentials, scan for other implants, restore from trusted backups) performed.

io.github.reajason:generator

2.2.0

Live on maven

Blocked by Socket

This class is a backdoor webshell/memshell allowing remote actors to tunnel arbitrary TCP traffic and HTTP requests through the host application. It uses a stealth trigger header and a custom XOR-obfuscated binary protocol to receive commands and parameters, can connect to arbitrary hosts/ports (or redirect via HTTP), store persistent stream handles in memory keyed by client IDs, and deliberately disables SSL verification to permit connections to HTTPS endpoints without certificate checks. This code constitutes a malicious backdoor capable of server-side request forgery, internal network pivoting, and covert data exfiltration. It should be treated as high-risk and removed or quarantined.

org.eclipse.jetty:test-jetty-webapp

8.1.9.v20130131

Live on maven

Blocked by Socket

The code contains a high-severity security risk due to a path-derived reflective class loading mechanism that can instantiate and throw arbitrary Throwable objects based on user input, effectively enabling remote code execution or crash conditions. It also discloses extensive request/response data to clients and contains debug/backdoor artifacts. Immediate remediation should exclude any dynamic loading from user input, remove backdoor-like exception throwing, minimize verbose response leakage, and restrict dangerous operations (sleeps, redirects, and reflection-based locale/resource access). Overall security risk is high and the malware likelihood is non-negligible given the backdoor-like pattern; this should not be used in production without substantial sanitation and security hardening.

org.webjars.npm:sweetalert2

11.15.10

Live on maven

Blocked by Socket

This code fragment is from a UI/modal library but contains a targeted, persistent, and disruptive payload: for Russian-locale browsers on certain TLDs it can disable page interactions and auto-play a hardcoded external audio file hosted on flag-gimn.ru, gated by a localStorage timestamp. This behavior is unrelated to the library's purpose, introduces unsolicited network traffic and media playback, and is effectively a supply-chain compromise (malicious/injected code). Treat this as a high-risk malicious insertion — do not use this package version in production. Remove the injected block, revert to a known-good release, or obtain an explanation and remediation from the maintainers.

love.yinlin.platform.os:auto-update

3.5.2

Live on maven

Blocked by Socket

Overall, this module is a high-risk updater pattern: it extracts an attacker-controlled ZIP into a temporary directory using `REPLACE_EXISTING`, then executes OS shell commands to forcibly delete and replace a hard-coded `app` directory and terminates the JVM. Zip-slip style traversal mitigation for write containment is present, but there is no visible cryptographic verification or allowlisting of the update payload, so compromise of the archive/filename trust boundary would likely lead to arbitrary application replacement and local code execution on subsequent runs. This should be treated as a security alert requiring urgent review of update signing/verification and execution safeguards.

org.eclipse.dirigible:dirigible-components-security-oauth2

11.1.0

Live on maven

Blocked by Socket

The code fragment exposes a web-based terminal on port 9000 via ttyd with an incomplete or mis-typed shell command ('bas'), creating a remote command execution surface without visible access controls. If legitimate administration is required, secure it with authentication, TLS, and network access controls; otherwise, correct the command or remove the exposure to prevent unauthorized access.

com.jwebmp.jre11:jwebmp-jqx-widgets

0.62.0.1

Live on maven

Blocked by Socket

The code fragment contains a high-risk covert redirect to an external domain (www.jqwidgets.com) triggered when the host is not that domain. This behavior functions as a backdoor-like telemetry/redirect and constitutes a serious privacy and supply-chain concern. It can enable data exfiltration or unwanted user tracking. Immediate remediation should remove or disable this redirect logic and audit the library for additional covert behaviors. Without this, the library remains a legitimate charting tool but with unacceptable privacy risk due to the hidden redirect.

io.acryl:datahub-custom-plugin-lib

1.1.0.3

Live on maven

Blocked by Socket

The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.

org.webjars.npm:sweetalert2

11.15.3

Live on maven

Blocked by Socket

The code contains an intentional, targeted malicious payload embedded in a UI library: it waits for Russian-locale users on Russian hosts, uses localStorage to delay action for >3 days, then disables page interaction and injects/plays an external audio file (a Ukrainian anthem) hosted on a third-party domain. This is a supply-chain sabotage/backdoor and is malicious. Do not use this package version; remove it and investigate dependencies and any deployments that included it.

ai.databand:dbnd-agent

1.0.27.18

Live on maven

Blocked by Socket

The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.

org.jeecgframework.jimureport:jimureport-spring-boot-starter

2.3.1

Live on maven

Blocked by Socket

The fragment demonstrates comprehensive host fingerprinting capabilities (MAC, ProcessorId, serial numbers), cross-platform data collection, and network exfiltration pathways, coupled with script-based payload delivery (VBScript/WSH) and external command execution. These characteristics strongly indicate malicious or highly suspicious beacon/backdoor behavior. Without trustworthy provenance or explicit opt-in controls, this code should be treated as malware-like in a supply-chain setting and isolated for further forensic analysis; remove or replace with clearly auditable, opt-in equivalents if used in production dependencies.

io.github.reajason:packer

2.6.0

Live on maven

Blocked by Socket

This class is an exploit/payload builder for Java deserialization vulnerabilities using Commons-Beanutils BeanComparator + PriorityQueue + TemplatesImpl gadget chain. It takes class bytes supplied via the config, embeds them in a TemplatesImpl instance, mutates private fields via reflection to craft the gadget graph, and returns a serialized representation. This is intentionally malicious (constructs remote code execution payloads) and should be treated as highly dangerous in a supply-chain context.

org.mvnpm:sweetalert2

11.15.10

Live on maven

Blocked by Socket

This code contains a politically motivated supply chain attack that specifically targets Russian users. After a 3-day delay, it disables website interaction and plays Ukrainian national anthem on loop. While most of the code is legitimate SweetAlert2 functionality, the embedded malicious payload makes this package extremely dangerous and should not be used.

io.github.mirrerror:discordutils

4.8.1

Live on maven

Blocked by Socket

The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.

org.webjars.npm:sweetalert2

11.12.2

Live on maven

Blocked by Socket

The code primarily serves to provide alert functionality using the SweetAlert2 library. However, it includes potentially risky behavior, such as the use of new Function(), and dynamically playing a remote audio file based on locale and domain conditions. This requires further scrutiny for any context-specific vulnerabilities.

ai.databand:dbnd-azkaban-agent

1.0.27.13

Live on maven

Blocked by Socket

The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.

io.github.reajason:generator

2.6.0

Live on maven

Blocked by Socket

This class is a backdoor/memshell implant. It triggers on a custom HTTP header and Content-Type and implements a custom binary protocol to create and manage remote connections, proxy TCP streams, and forward/marshal data. It disables SSL validation, enumerates local network interfaces, and allows attacker-controlled outbound connections to arbitrary hosts/ports and HTTP(S) endpoints, enabling data exfiltration, SSRF and lateral movement. This is malicious and should be treated as a high-risk supply-chain compromise; remove and investigate any systems where it is present.

io.github.reajason:generator

2.6.1

Live on maven

Blocked by Socket

This class is a clear malicious backdoor / webshell (memory-shell) for Jetty servers. It listens for a covert header/parameter combination, decrypts and loads arbitrary class bytes into the JVM (using Unsafe or defineClass via reflection), instantiates and interacts with the payload, and returns encoded output. It bypasses module and classloader protections and uses static secrets and reflection to evade detection. Do not deploy or run this component; treat as high-risk compromise and remove/scan for other implants.

org.apache.knox:knox-token-generation-ui

2.0.0

Live on maven

Blocked by Socket

This code bundle includes legitimate library code (SweetAlert2, zone.js, polyfills, HTTP client fragments) but contains a clearly malicious/abusive injection: a small conditional that targets Russian locale/hosts and injects and autoplays an externally hosted MP3 while temporarily disabling user interactions, gated by localStorage. This is a targeted, unwanted behavior (UX disruption and potential propaganda/tracking) and constitutes a supply-chain malicious insertion. Treat this package/version as compromised: remove or block its use, audit upstream source/repository for unauthorized commits, and scan for other similar injections. If already deployed, consider removing the script and informing stakeholders; also check if external domain has been contacted (server logs) to assess reach.

io.vilt.minium:minium-webelements

1.4.1

Live on maven

Blocked by Socket

This module exposes a high-risk arbitrary code execution primitive by adding `$.fn.eval*` methods that run caller-provided JavaScript via `eval` without any validation. Even absent explicit network/stealing behavior in the snippet, the capability is severe and strongly suggests misuse potential (XSS/code injection within the page context or abuse in automated runs).

org.eclipse.dirigible:dirigible-components-security-oauth2

10.6.28

Live on maven

Blocked by Socket

The code fragment exposes a web-based terminal on port 9000 via ttyd with an incomplete or mis-typed shell command ('bas'), creating a remote command execution surface without visible access controls. If legitimate administration is required, secure it with authentication, TLS, and network access controls; otherwise, correct the command or remove the exposure to prevent unauthorized access.

org.graylog2:graylog2-server

3.0.0-alpha.1

Live on maven

Blocked by Socket

The provided code is a minified and obfuscated version of the `moment.js` library. The accompanying 'reports' are unhelpful promises, providing no concrete security findings. While `moment.js` itself is not inherently malicious, its complexity, minification, and history of vulnerabilities (like ReDoS and prototype pollution) make it a potential target for supply chain attacks. The lack of specific findings in the reports prevents a detailed analysis, but the overall context suggests a need for caution.

org.eclipse.dirigible:dirigible-components-security-basic

10.6.37

Live on maven

Blocked by Socket

The code fragment exposes a web-based terminal on port 9000 via ttyd with an incomplete or mis-typed shell command ('bas'), creating a remote command execution surface without visible access controls. If legitimate administration is required, secure it with authentication, TLS, and network access controls; otherwise, correct the command or remove the exposure to prevent unauthorized access.

org.jeecgframework.jimureport:jimureport-spring-boot-starter

1.9.5

Live on maven

Blocked by Socket

This code fragment functions as a cryptographic loader with obfuscated access patterns and dynamic resource handling. While it could be a legitimate decryption utility, the combination of static Base64 payloads, ECB-mode encryption, and resource loading based on decoded material presents non-trivial supply-chain risk. The pattern strongly suggests potential for hidden payloads or runtime decryption of assets within the JAR or environment. Immediate actions: verify the source of Base64 payloads, audit how decoded keys/payloads are used by the larger codebase, remove ECB usage or replace with authenticated encryption if confidentiality is required, and implement strict validation for all dynamically loaded resources. Risk assessment: high for supply-chain security (malicious payload loading or backdoor potential) but no explicit exfiltration observed here. Evidence justifies treating this as a high-risk cryptographic loader module that requires thorough contextual review.

io.acryl:datahub-custom-plugin-lib

1.3.0.1rc3

Live on maven

Blocked by Socket

The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.

io.github.reajason:generator

2.5.0

Live on maven

Blocked by Socket

This class is a deliberate memory-resident webshell/tunneling backdoor. It activates on a secret HTTP header, decodes a custom protocol from request bodies, opens outbound TCP/HTTP(S) connections to attacker-specified hosts, disables SSL verification for HTTPS connections, maintains in-memory state for persistent tunnels, and spawns threads that pipe data between sockets and HTTP responses. It is malicious and should be removed and investigated; any server containing this code should be treated as compromised, with incident response steps (isolate, rotate credentials, scan for other implants, restore from trusted backups) performed.

io.github.reajason:generator

2.2.0

Live on maven

Blocked by Socket

This class is a backdoor webshell/memshell allowing remote actors to tunnel arbitrary TCP traffic and HTTP requests through the host application. It uses a stealth trigger header and a custom XOR-obfuscated binary protocol to receive commands and parameters, can connect to arbitrary hosts/ports (or redirect via HTTP), store persistent stream handles in memory keyed by client IDs, and deliberately disables SSL verification to permit connections to HTTPS endpoints without certificate checks. This code constitutes a malicious backdoor capable of server-side request forgery, internal network pivoting, and covert data exfiltration. It should be treated as high-risk and removed or quarantined.

org.eclipse.jetty:test-jetty-webapp

8.1.9.v20130131

Live on maven

Blocked by Socket

The code contains a high-severity security risk due to a path-derived reflective class loading mechanism that can instantiate and throw arbitrary Throwable objects based on user input, effectively enabling remote code execution or crash conditions. It also discloses extensive request/response data to clients and contains debug/backdoor artifacts. Immediate remediation should exclude any dynamic loading from user input, remove backdoor-like exception throwing, minimize verbose response leakage, and restrict dangerous operations (sleeps, redirects, and reflection-based locale/resource access). Overall security risk is high and the malware likelihood is non-negligible given the backdoor-like pattern; this should not be used in production without substantial sanitation and security hardening.

org.webjars.npm:sweetalert2

11.15.10

Live on maven

Blocked by Socket

This code fragment is from a UI/modal library but contains a targeted, persistent, and disruptive payload: for Russian-locale browsers on certain TLDs it can disable page interactions and auto-play a hardcoded external audio file hosted on flag-gimn.ru, gated by a localStorage timestamp. This behavior is unrelated to the library's purpose, introduces unsolicited network traffic and media playback, and is effectively a supply-chain compromise (malicious/injected code). Treat this as a high-risk malicious insertion — do not use this package version in production. Remove the injected block, revert to a known-good release, or obtain an explanation and remediation from the maintainers.

love.yinlin.platform.os:auto-update

3.5.2

Live on maven

Blocked by Socket

Overall, this module is a high-risk updater pattern: it extracts an attacker-controlled ZIP into a temporary directory using `REPLACE_EXISTING`, then executes OS shell commands to forcibly delete and replace a hard-coded `app` directory and terminates the JVM. Zip-slip style traversal mitigation for write containment is present, but there is no visible cryptographic verification or allowlisting of the update payload, so compromise of the archive/filename trust boundary would likely lead to arbitrary application replacement and local code execution on subsequent runs. This should be treated as a security alert requiring urgent review of update signing/verification and execution safeguards.

org.eclipse.dirigible:dirigible-components-security-oauth2

11.1.0

Live on maven

Blocked by Socket

The code fragment exposes a web-based terminal on port 9000 via ttyd with an incomplete or mis-typed shell command ('bas'), creating a remote command execution surface without visible access controls. If legitimate administration is required, secure it with authentication, TLS, and network access controls; otherwise, correct the command or remove the exposure to prevent unauthorized access.

Socket CLI

Not using GitHub? Generate reports next to your tests with our CLI

Socket CLI
Install Socket CLI

We help security teams work more efficiently

Cut through the noise and focus on real threats.

Get actionable alerts for the supply chain risks that matter. Socket highlights risky dependencies directly within the developer workflow.