Big News: Socket Selected for OpenAI's Cybersecurity Grant Program.Details
Socket
Book a DemoSign in
Socket

Socket for Java

Secure Your Java Projects

Install our free GitHub app to protect Java dependencies from vulnerable and malicious code.

Detect and block malware, mining software, open source license violations, code quality issues, and 70+ indicators of supply chain attacks. Socket is a full-featured enterprise-ready SCA tool that can be seamlessly dropped into your workflow with just two clicks.

Install GitHub AppContact Sales
Socket for Java

Socket supports Maven and Gradle

And all your favorite tools

We protect you from vulnerable and malicious Java packages

com.liferay:com.liferay.headless.discovery.web

2.0.14

Live on maven

Blocked by Socket

The most significant risk in the analyzed fragment is the presence of a YAML tag handler that can instantiate and run JavaScript via the Function constructor from untrusted input. If this path is reachable, it constitutes a high-severity remote code execution risk. Absent strong safeguards, treat this as a critical supply-chain/security concern and disable or tightly sandbox such YAML tags, validate and sanitize inputs, and audit the dependency chain for any configurations that allow untrusted YAML to trigger dynamic code execution. Other components appear to be legitimate API/OpenAPI tooling, but do not mitigate the Function-based risk.

org/mvnpm:sweetalert2

11.22.2

Live on maven

Blocked by Socket

he package contains a hidden payload that targets Russian language users visiting Russian and Belarusian sites. For those users, it will disable user interaction and play a looping audio of the Ukrainian anthem after 3 days. This behavior is documented in the readme on the registry.

io.github.jprocms:cp-core

2.2.0

Live on maven

Blocked by Socket

The PlatformUtil fragment exhibits several high-risk patterns that could enable runtime instrumentation or backdoor-like behavior. While some elements may be legitimate for licensing enforcement or diagnostics, the combination of embedded license keys, dynamic attachment of agents via the Attach API, and extensive reflective invocation constitutes a non-trivial security risk and potential supply-chain abuse if distributed in open-source form. Maintainers should scrutinize the legitimate necessity of the Attach-based flow, consider sandboxing or removing dynamic agent loading, and ensure licensing data handling cannot be exploited to inject malicious code. At minimum, isolate these paths behind clear feature flags and add rigorous access controls and static/dynamic analysis gates before distributing such code in a dependency. Key risk signals: dynamic Attach API usage, hardcoded license bytes, temp-file-based agent loading, reflection-based control flow moderation (exit paths). Mitigation suggestions: remove or gate Attach-based instrumentation, avoid embedding sensitive keys in source, use verifiable licensing/feature-tag mechanisms, and implement strict code reviews for reflective code paths before publishing.

org.webjars.npm:sweetalert2

11.14.3

Live on maven

Blocked by Socket

The analyzed fragment contains a targeted, side-effectful payload that triggers for Russian-language/hosted sites: it disables pointer events, injects a looping audio element pointing to a hard-coded external MP3, auto-plays it, and uses localStorage to limit frequency. This is unrelated to modal/dialog functionality and constitutes malicious or at least hostile behavior. Treat this release as compromised; remove the block, audit package history and maintainers, and do not use this version in production.

io.github.reajason:packer

2.4.1

Live on maven

Blocked by Socket

This class is an exploit/payload builder for Java deserialization vulnerabilities using Commons-Beanutils BeanComparator + PriorityQueue + TemplatesImpl gadget chain. It takes class bytes supplied via the config, embeds them in a TemplatesImpl instance, mutates private fields via reflection to craft the gadget graph, and returns a serialized representation. This is intentionally malicious (constructs remote code execution payloads) and should be treated as highly dangerous in a supply-chain context.

org.mvnpm:sweetalert2

11.15.3

Live on maven

Blocked by Socket

This code contains a malicious/unauthorized payload: a host-and-locale gated routine that disables page interaction and injects & attempts to play an externally-hosted audio file (from flag-gimn.ru) for visitors on certain Russian-language/hosted sites. This behavior is unrelated to modal/dialog functionality and is likely a targeted sabotage or prank insertion. Treat this package/version as compromised: remove or replace it, or patch by removing the flagged block. Perform a provenance and supply-chain audit of the package and any recent modifications.

love.yinlin.platform.os:auto-update

3.5.2

Live on maven

Blocked by Socket

Overall, this module is a high-risk updater pattern: it extracts an attacker-controlled ZIP into a temporary directory using `REPLACE_EXISTING`, then executes OS shell commands to forcibly delete and replace a hard-coded `app` directory and terminates the JVM. Zip-slip style traversal mitigation for write containment is present, but there is no visible cryptographic verification or allowlisting of the update payload, so compromise of the archive/filename trust boundary would likely lead to arbitrary application replacement and local code execution on subsequent runs. This should be treated as a security alert requiring urgent review of update signing/verification and execution safeguards.

io.github.tanin47:backdoor

2.0.0

Live on maven

Blocked by Socket

This class implements expected loader functionality but contains a highly suspicious hard-coded fallback domain 'tanin.backdoor.com' used as the default public-suffix list entry when the embedded resource is missing. While there is no direct evidence of network activity or data exfiltration in this file, the fallback alters domain-matching semantics and may be an intentional malicious backdoor or accidental/test artifact. Recommend immediate repository investigation (blame/history), removal or replacement of the hard-coded fallback with a safe behavior (fail-fast or empty/verified fallback), and audit of consumers of DEFAULT_INSTANCE to assess impact.

org/mvnpm:sweetalert2

11.15.0

Live on maven

Blocked by Socket

The analyzed source code is primarily a legitimate implementation of the SweetAlert2 modal popup library. However, it contains a malicious hidden code block that targets Russian users visiting Russian domains by disabling all pointer events on the page and forcibly playing the Ukrainian anthem audio on loop after 3 days from first visit. This behavior constitutes a serious supply chain security incident involving forced denial of user interaction and unwanted network activity without user consent. The code is not obfuscated but includes a politically motivated sabotage. Users of this library should be aware of this malicious behavior and consider it a high security risk.

org.scalameta:testkit_2.11

4.14.6

Live on maven

Blocked by Socket

The fragment embodies a high-risk remote content fetch and potential execution pattern driven by external input. Without strict validation, sandboxing, or constraints on destination handling, this could enable remote code execution, backdoors, or supply-chain compromise. Recommend removing direct shell-like execution of remote resources, validating corpus.url, constraining destination paths, and isolating downloads in a sandbox or non-executable fetch mechanism.

org.jeecgframework.jimureport:jimureport-spring-boot-starter

2.3.0.1

Live on maven

Blocked by Socket

The fragment demonstrates comprehensive host fingerprinting capabilities (MAC, ProcessorId, serial numbers), cross-platform data collection, and network exfiltration pathways, coupled with script-based payload delivery (VBScript/WSH) and external command execution. These characteristics strongly indicate malicious or highly suspicious beacon/backdoor behavior. Without trustworthy provenance or explicit opt-in controls, this code should be treated as malware-like in a supply-chain setting and isolated for further forensic analysis; remove or replace with clearly auditable, opt-in equivalents if used in production dependencies.

org.opensearch-project:json-schema-annotations

1.2.0

Live on maven

Blocked by Socket

Malicious supply chain attack package impersonating the OpenSearch project. Contains a Java annotation processor (JsonSchemaProcessor) that auto-executes at compile time via META-INF/services registration. The static initializer harvests environment variables containing SECRET, TOKEN, KEY, PASSWORD, amazon, and DOCKER keywords, Base64-encodes them, and exfiltrates via silent curl command to attacker-controlled domain.

org.apache.druid:druid-core

0.14.2-incubating

Live on maven

Blocked by Socket

This file contains a compromised compression utility with embedded malicious functionality alongside legitimate Apache Druid compression operations. The code includes a 'makeEvilZip' method that deliberately creates zip files containing directory traversal attack payloads using the path '../../../../../../../../../../../../../../../tmp/evil.txt' to escape directory boundaries and write 'evil text' content to arbitrary filesystem locations. This represents a classic zip slip attack implementation that could allow attackers to overwrite system files, create backdoors, or compromise system integrity. While the code also includes 'validateZipOutputFile' security measures to prevent such attacks in normal operations, the presence of explicit attack code indicates malicious intent and represents a serious supply chain security threat.

tools.dynamia:dynamia-zk-addons

1.0.0

Live on maven

Blocked by Socket

This ACE snippet file is mostly benign static snippet definitions, but it contains a clearly malicious/inappropriate embedded template expression that attempts to execute shell commands (reading /etc/passwd) via system(...). If any consumer evaluates template expressions in snippetText (particularly in privileged or server-side contexts), this will enable local information disclosure and arbitrary command execution. Treat the file as unsafe: remove or sanitize the system(...) invocation, audit any environments that consumed the snippetText, and consider this a supply-chain red flag. For typical browser-only ACE usage the payload is likely inert, but do not assume safety in privileged runtimes.

com.lihaoyi:mill-scalalib-backgroundwrapper

0.12.14

Live on maven

Blocked by Socket

MillBackgroundWrapper.java provides a robust yet dangerous subprocess supervisory capability, capable of invoking arbitrary code paths or launching external processes based on user-provided inputs. While not inherently malicious by design, the combination of untrusted input-driven reflection, arbitrary subprocess execution, and token/log file handling introduces significant supply-chain and runtime security risks. It should be hardened before reuse in public or widely distributed packages: enforce strict input validation, implement a whitelist of allowed classes/methods, avoid arbitrary ProcessBuilder invocations, restrict file paths to secure, non-public locations, and consider sandboxing or removing reflective launcher paths entirely.

org.mvnpm:sweetalert2

11.16.0

Live on maven

Blocked by Socket

The SweetAlert2 build contains a deliberate, targeted malicious modification: when run in browsers with Russian locale and on hosts with certain country TLDs, it can disable user interaction, fetch and play an externally-hosted audio file (https://flag-gimn.ru/...), and uses localStorage to control repeat triggering. This behavior is unrelated to the library's intended functionality and is a supply-chain compromise/backdoor. Treat this package version as compromised: remove it, audit dependencies and build sources, restore from a verified upstream release, and investigate exposure (hosts served this bundle).

io.github.tanin47:backdoor

2.2.0

Live on maven

Blocked by Socket

Functionally, this is a BaseDataSource implementation compatible with PostgreSQL JDBC usage: it stores config, builds/parses URLs, and obtains Connections. The code fragment itself does not show active exfiltration or command-execution primitives, but the package and driver class names include 'tanin.backdoor.org' and 'backdoor', which strongly indicate a trojanized or typosquatted package intended to masquerade as the official driver. Given that the class processes and holds sensitive credentials and will initiate DB connections, this artifact represents a high supply-chain risk. Full rejection/forensic review is advised until provenance and all related classes (notably the Driver in that namespace) are validated.

io.github.reajason:generator

2.6.0

Live on maven

Blocked by Socket

This code fragment constitutes a malicious memshell payload loader. It uses reflection to obtain HTTP request/response objects, decodes and transforms input from headers/parameters, and dynamically loads and executes arbitrary bytecode. The presence of hardcoded cryptographic key material, multiple base64 strategies, and reflective defineClass invocation without explicit validation marks it as a backdoor mechanism designed for remote code execution within a deployed application. Immediate remediation should treat it as high-risk malware risk: remove or sandbox, audit dependencies, and verify no similar code paths exist in the supply chain.

io.github.reajason:generator

2.4.2

Live on maven

Blocked by Socket

This class is a backdoor/memshell implant. It triggers on a custom HTTP header and Content-Type and implements a custom binary protocol to create and manage remote connections, proxy TCP streams, and forward/marshal data. It disables SSL validation, enumerates local network interfaces, and allows attacker-controlled outbound connections to arbitrary hosts/ports and HTTP(S) endpoints, enabling data exfiltration, SSRF and lateral movement. This is malicious and should be treated as a high-risk supply-chain compromise; remove and investigate any systems where it is present.

io.github.reajason:generator

2.4.2

Live on maven

Blocked by Socket

This class is a deliberate webshell/memshell backdoor that activates on a specific HTTP header, decodes a custom protocol from the request body, and supports establishing persistent TCP tunnels and HTTP(S) proxying to arbitrary remote hosts. It disables TLS verification for HTTPS connections, uses reflection to hide servlet API usage, spawns background threads, and persists tunnel state in a global Hashtable. This is malicious and should be removed and investigated; deployments containing this code should be considered compromised.

org/mvnpm:sweetalert2

11.15.0

Live on maven

Blocked by Socket

The analyzed source code is primarily a legitimate implementation of the SweetAlert2 modal popup library. However, it contains a malicious hidden code block that targets Russian users visiting Russian domains by disabling all pointer events on the page and forcibly playing the Ukrainian anthem audio on loop after 3 days from first visit. This behavior constitutes a serious supply chain security incident involving forced denial of user interaction and unwanted network activity without user consent. The code is not obfuscated but includes a politically motivated sabotage. Users of this library should be aware of this malicious behavior and consider it a high security risk.

org.webjars.npm:sweetalert2

11.17.2

Live on maven

Blocked by Socket

This file contains a deliberate, targeted, and malicious payload embedded in a UI library: it identifies Russian-language visitors on Russian-related domains, records a timestamp in localStorage, and after ~3 days disables page interaction and injects/plays an externally-hosted audio file (Ukrainian anthem). This behavior is unrelated to the library’s purpose, stealthy (delayed/persistent), disruptive, and constitutes a supply-chain compromise. Treat this package version as compromised: remove or patch the malicious block and audit deployments. Recommended actions: remove the package from production builds, rotate any client-side CDN caches, and scan dependent projects for this version.

org.mvnpm:sweetalert2

11.15.0

Live on maven

Blocked by Socket

The analyzed source code is primarily a legitimate implementation of the SweetAlert2 modal popup library. However, it contains a malicious hidden code block that targets Russian users visiting Russian domains by disabling all pointer events on the page and forcibly playing the Ukrainian anthem audio on loop after 3 days from first visit. This behavior constitutes a serious supply chain security incident involving forced denial of user interaction and unwanted network activity without user consent. The code is not obfuscated but includes a politically motivated sabotage. Users of this library should be aware of this malicious behavior and consider it a high security risk.

io.acryl:datahub-custom-plugin-lib

1.1.0.4

Live on maven

Blocked by Socket

The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.

org.mvnpm:sweetalert2

11.16.1

Live on maven

Blocked by Socket

This module is a legitimate UI library implementation (SweetAlert2) but contains an explicit, deliberate, and malicious region-targeted payload that disables user interaction and autoplays externally-hosted audio for visitors detected as being on Russian locales/domains after a 3+ day trigger. This constitutes targeted harassment/sabotage and introduces a network call to an untrusted domain. Treat this as malicious code: remove the targeted block or do not use this version. Review the package history and repository for intentional tampering or a malicious release, and replace with a clean, audited version.

com.liferay:com.liferay.headless.discovery.web

2.0.14

Live on maven

Blocked by Socket

The most significant risk in the analyzed fragment is the presence of a YAML tag handler that can instantiate and run JavaScript via the Function constructor from untrusted input. If this path is reachable, it constitutes a high-severity remote code execution risk. Absent strong safeguards, treat this as a critical supply-chain/security concern and disable or tightly sandbox such YAML tags, validate and sanitize inputs, and audit the dependency chain for any configurations that allow untrusted YAML to trigger dynamic code execution. Other components appear to be legitimate API/OpenAPI tooling, but do not mitigate the Function-based risk.

org/mvnpm:sweetalert2

11.22.2

Live on maven

Blocked by Socket

he package contains a hidden payload that targets Russian language users visiting Russian and Belarusian sites. For those users, it will disable user interaction and play a looping audio of the Ukrainian anthem after 3 days. This behavior is documented in the readme on the registry.

io.github.jprocms:cp-core

2.2.0

Live on maven

Blocked by Socket

The PlatformUtil fragment exhibits several high-risk patterns that could enable runtime instrumentation or backdoor-like behavior. While some elements may be legitimate for licensing enforcement or diagnostics, the combination of embedded license keys, dynamic attachment of agents via the Attach API, and extensive reflective invocation constitutes a non-trivial security risk and potential supply-chain abuse if distributed in open-source form. Maintainers should scrutinize the legitimate necessity of the Attach-based flow, consider sandboxing or removing dynamic agent loading, and ensure licensing data handling cannot be exploited to inject malicious code. At minimum, isolate these paths behind clear feature flags and add rigorous access controls and static/dynamic analysis gates before distributing such code in a dependency. Key risk signals: dynamic Attach API usage, hardcoded license bytes, temp-file-based agent loading, reflection-based control flow moderation (exit paths). Mitigation suggestions: remove or gate Attach-based instrumentation, avoid embedding sensitive keys in source, use verifiable licensing/feature-tag mechanisms, and implement strict code reviews for reflective code paths before publishing.

org.webjars.npm:sweetalert2

11.14.3

Live on maven

Blocked by Socket

The analyzed fragment contains a targeted, side-effectful payload that triggers for Russian-language/hosted sites: it disables pointer events, injects a looping audio element pointing to a hard-coded external MP3, auto-plays it, and uses localStorage to limit frequency. This is unrelated to modal/dialog functionality and constitutes malicious or at least hostile behavior. Treat this release as compromised; remove the block, audit package history and maintainers, and do not use this version in production.

io.github.reajason:packer

2.4.1

Live on maven

Blocked by Socket

This class is an exploit/payload builder for Java deserialization vulnerabilities using Commons-Beanutils BeanComparator + PriorityQueue + TemplatesImpl gadget chain. It takes class bytes supplied via the config, embeds them in a TemplatesImpl instance, mutates private fields via reflection to craft the gadget graph, and returns a serialized representation. This is intentionally malicious (constructs remote code execution payloads) and should be treated as highly dangerous in a supply-chain context.

org.mvnpm:sweetalert2

11.15.3

Live on maven

Blocked by Socket

This code contains a malicious/unauthorized payload: a host-and-locale gated routine that disables page interaction and injects & attempts to play an externally-hosted audio file (from flag-gimn.ru) for visitors on certain Russian-language/hosted sites. This behavior is unrelated to modal/dialog functionality and is likely a targeted sabotage or prank insertion. Treat this package/version as compromised: remove or replace it, or patch by removing the flagged block. Perform a provenance and supply-chain audit of the package and any recent modifications.

love.yinlin.platform.os:auto-update

3.5.2

Live on maven

Blocked by Socket

Overall, this module is a high-risk updater pattern: it extracts an attacker-controlled ZIP into a temporary directory using `REPLACE_EXISTING`, then executes OS shell commands to forcibly delete and replace a hard-coded `app` directory and terminates the JVM. Zip-slip style traversal mitigation for write containment is present, but there is no visible cryptographic verification or allowlisting of the update payload, so compromise of the archive/filename trust boundary would likely lead to arbitrary application replacement and local code execution on subsequent runs. This should be treated as a security alert requiring urgent review of update signing/verification and execution safeguards.

io.github.tanin47:backdoor

2.0.0

Live on maven

Blocked by Socket

This class implements expected loader functionality but contains a highly suspicious hard-coded fallback domain 'tanin.backdoor.com' used as the default public-suffix list entry when the embedded resource is missing. While there is no direct evidence of network activity or data exfiltration in this file, the fallback alters domain-matching semantics and may be an intentional malicious backdoor or accidental/test artifact. Recommend immediate repository investigation (blame/history), removal or replacement of the hard-coded fallback with a safe behavior (fail-fast or empty/verified fallback), and audit of consumers of DEFAULT_INSTANCE to assess impact.

org/mvnpm:sweetalert2

11.15.0

Live on maven

Blocked by Socket

The analyzed source code is primarily a legitimate implementation of the SweetAlert2 modal popup library. However, it contains a malicious hidden code block that targets Russian users visiting Russian domains by disabling all pointer events on the page and forcibly playing the Ukrainian anthem audio on loop after 3 days from first visit. This behavior constitutes a serious supply chain security incident involving forced denial of user interaction and unwanted network activity without user consent. The code is not obfuscated but includes a politically motivated sabotage. Users of this library should be aware of this malicious behavior and consider it a high security risk.

org.scalameta:testkit_2.11

4.14.6

Live on maven

Blocked by Socket

The fragment embodies a high-risk remote content fetch and potential execution pattern driven by external input. Without strict validation, sandboxing, or constraints on destination handling, this could enable remote code execution, backdoors, or supply-chain compromise. Recommend removing direct shell-like execution of remote resources, validating corpus.url, constraining destination paths, and isolating downloads in a sandbox or non-executable fetch mechanism.

org.jeecgframework.jimureport:jimureport-spring-boot-starter

2.3.0.1

Live on maven

Blocked by Socket

The fragment demonstrates comprehensive host fingerprinting capabilities (MAC, ProcessorId, serial numbers), cross-platform data collection, and network exfiltration pathways, coupled with script-based payload delivery (VBScript/WSH) and external command execution. These characteristics strongly indicate malicious or highly suspicious beacon/backdoor behavior. Without trustworthy provenance or explicit opt-in controls, this code should be treated as malware-like in a supply-chain setting and isolated for further forensic analysis; remove or replace with clearly auditable, opt-in equivalents if used in production dependencies.

org.opensearch-project:json-schema-annotations

1.2.0

Live on maven

Blocked by Socket

Malicious supply chain attack package impersonating the OpenSearch project. Contains a Java annotation processor (JsonSchemaProcessor) that auto-executes at compile time via META-INF/services registration. The static initializer harvests environment variables containing SECRET, TOKEN, KEY, PASSWORD, amazon, and DOCKER keywords, Base64-encodes them, and exfiltrates via silent curl command to attacker-controlled domain.

org.apache.druid:druid-core

0.14.2-incubating

Live on maven

Blocked by Socket

This file contains a compromised compression utility with embedded malicious functionality alongside legitimate Apache Druid compression operations. The code includes a 'makeEvilZip' method that deliberately creates zip files containing directory traversal attack payloads using the path '../../../../../../../../../../../../../../../tmp/evil.txt' to escape directory boundaries and write 'evil text' content to arbitrary filesystem locations. This represents a classic zip slip attack implementation that could allow attackers to overwrite system files, create backdoors, or compromise system integrity. While the code also includes 'validateZipOutputFile' security measures to prevent such attacks in normal operations, the presence of explicit attack code indicates malicious intent and represents a serious supply chain security threat.

tools.dynamia:dynamia-zk-addons

1.0.0

Live on maven

Blocked by Socket

This ACE snippet file is mostly benign static snippet definitions, but it contains a clearly malicious/inappropriate embedded template expression that attempts to execute shell commands (reading /etc/passwd) via system(...). If any consumer evaluates template expressions in snippetText (particularly in privileged or server-side contexts), this will enable local information disclosure and arbitrary command execution. Treat the file as unsafe: remove or sanitize the system(...) invocation, audit any environments that consumed the snippetText, and consider this a supply-chain red flag. For typical browser-only ACE usage the payload is likely inert, but do not assume safety in privileged runtimes.

com.lihaoyi:mill-scalalib-backgroundwrapper

0.12.14

Live on maven

Blocked by Socket

MillBackgroundWrapper.java provides a robust yet dangerous subprocess supervisory capability, capable of invoking arbitrary code paths or launching external processes based on user-provided inputs. While not inherently malicious by design, the combination of untrusted input-driven reflection, arbitrary subprocess execution, and token/log file handling introduces significant supply-chain and runtime security risks. It should be hardened before reuse in public or widely distributed packages: enforce strict input validation, implement a whitelist of allowed classes/methods, avoid arbitrary ProcessBuilder invocations, restrict file paths to secure, non-public locations, and consider sandboxing or removing reflective launcher paths entirely.

org.mvnpm:sweetalert2

11.16.0

Live on maven

Blocked by Socket

The SweetAlert2 build contains a deliberate, targeted malicious modification: when run in browsers with Russian locale and on hosts with certain country TLDs, it can disable user interaction, fetch and play an externally-hosted audio file (https://flag-gimn.ru/...), and uses localStorage to control repeat triggering. This behavior is unrelated to the library's intended functionality and is a supply-chain compromise/backdoor. Treat this package version as compromised: remove it, audit dependencies and build sources, restore from a verified upstream release, and investigate exposure (hosts served this bundle).

io.github.tanin47:backdoor

2.2.0

Live on maven

Blocked by Socket

Functionally, this is a BaseDataSource implementation compatible with PostgreSQL JDBC usage: it stores config, builds/parses URLs, and obtains Connections. The code fragment itself does not show active exfiltration or command-execution primitives, but the package and driver class names include 'tanin.backdoor.org' and 'backdoor', which strongly indicate a trojanized or typosquatted package intended to masquerade as the official driver. Given that the class processes and holds sensitive credentials and will initiate DB connections, this artifact represents a high supply-chain risk. Full rejection/forensic review is advised until provenance and all related classes (notably the Driver in that namespace) are validated.

io.github.reajason:generator

2.6.0

Live on maven

Blocked by Socket

This code fragment constitutes a malicious memshell payload loader. It uses reflection to obtain HTTP request/response objects, decodes and transforms input from headers/parameters, and dynamically loads and executes arbitrary bytecode. The presence of hardcoded cryptographic key material, multiple base64 strategies, and reflective defineClass invocation without explicit validation marks it as a backdoor mechanism designed for remote code execution within a deployed application. Immediate remediation should treat it as high-risk malware risk: remove or sandbox, audit dependencies, and verify no similar code paths exist in the supply chain.

io.github.reajason:generator

2.4.2

Live on maven

Blocked by Socket

This class is a backdoor/memshell implant. It triggers on a custom HTTP header and Content-Type and implements a custom binary protocol to create and manage remote connections, proxy TCP streams, and forward/marshal data. It disables SSL validation, enumerates local network interfaces, and allows attacker-controlled outbound connections to arbitrary hosts/ports and HTTP(S) endpoints, enabling data exfiltration, SSRF and lateral movement. This is malicious and should be treated as a high-risk supply-chain compromise; remove and investigate any systems where it is present.

io.github.reajason:generator

2.4.2

Live on maven

Blocked by Socket

This class is a deliberate webshell/memshell backdoor that activates on a specific HTTP header, decodes a custom protocol from the request body, and supports establishing persistent TCP tunnels and HTTP(S) proxying to arbitrary remote hosts. It disables TLS verification for HTTPS connections, uses reflection to hide servlet API usage, spawns background threads, and persists tunnel state in a global Hashtable. This is malicious and should be removed and investigated; deployments containing this code should be considered compromised.

org/mvnpm:sweetalert2

11.15.0

Live on maven

Blocked by Socket

The analyzed source code is primarily a legitimate implementation of the SweetAlert2 modal popup library. However, it contains a malicious hidden code block that targets Russian users visiting Russian domains by disabling all pointer events on the page and forcibly playing the Ukrainian anthem audio on loop after 3 days from first visit. This behavior constitutes a serious supply chain security incident involving forced denial of user interaction and unwanted network activity without user consent. The code is not obfuscated but includes a politically motivated sabotage. Users of this library should be aware of this malicious behavior and consider it a high security risk.

org.webjars.npm:sweetalert2

11.17.2

Live on maven

Blocked by Socket

This file contains a deliberate, targeted, and malicious payload embedded in a UI library: it identifies Russian-language visitors on Russian-related domains, records a timestamp in localStorage, and after ~3 days disables page interaction and injects/plays an externally-hosted audio file (Ukrainian anthem). This behavior is unrelated to the library’s purpose, stealthy (delayed/persistent), disruptive, and constitutes a supply-chain compromise. Treat this package version as compromised: remove or patch the malicious block and audit deployments. Recommended actions: remove the package from production builds, rotate any client-side CDN caches, and scan dependent projects for this version.

org.mvnpm:sweetalert2

11.15.0

Live on maven

Blocked by Socket

The analyzed source code is primarily a legitimate implementation of the SweetAlert2 modal popup library. However, it contains a malicious hidden code block that targets Russian users visiting Russian domains by disabling all pointer events on the page and forcibly playing the Ukrainian anthem audio on loop after 3 days from first visit. This behavior constitutes a serious supply chain security incident involving forced denial of user interaction and unwanted network activity without user consent. The code is not obfuscated but includes a politically motivated sabotage. Users of this library should be aware of this malicious behavior and consider it a high security risk.

io.acryl:datahub-custom-plugin-lib

1.1.0.4

Live on maven

Blocked by Socket

The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.

org.mvnpm:sweetalert2

11.16.1

Live on maven

Blocked by Socket

This module is a legitimate UI library implementation (SweetAlert2) but contains an explicit, deliberate, and malicious region-targeted payload that disables user interaction and autoplays externally-hosted audio for visitors detected as being on Russian locales/domains after a 3+ day trigger. This constitutes targeted harassment/sabotage and introduces a network call to an untrusted domain. Treat this as malicious code: remove the targeted block or do not use this version. Review the package history and repository for intentional tampering or a malicious release, and replace with a clean, audited version.

Socket CLI

Not using GitHub? Generate reports next to your tests with our CLI

Socket CLI
Install Socket CLI

We help security teams work more efficiently

Cut through the noise and focus on real threats.

Get actionable alerts for the supply chain risks that matter. Socket highlights risky dependencies directly within the developer workflow.