🚀 Big News: Socket Acquires Coana to Bring Reachability Analysis to Every Appsec Team.Learn more
Socket
DemoInstallSign in
Socket

Socket for Java

Secure Your Java Projects

Install our free GitHub app to protect Java dependencies from vulnerable and malicious code.

Detect and block malware, mining software, open source license violations, code quality issues, and 70+ indicators of supply chain attacks. Socket is a full-featured enterprise-ready SCA tool that can be seamlessly dropped into your workflow with just two clicks.

Install GitHub AppContact Sales
Socket for Java

Socket supports Maven and Gradle

And all your favorite tools

We protect you from vulnerable and malicious Java packages

io.imqa:imqa-mpm-injector

2.25.3

Live on Maven

Blocked by Socket

The code implements a bytecode injection system that modifies network-related classes during runtime, specifically targeting HTTP client libraries. It intercepts and wraps various HTTP client implementations (HttpURLConnection, OkHttp, Apache HTTP Client, Volley) to inject custom code. This presents significant security risks through unauthorized code modification and potential network traffic interception capabilities.

ch.epfl.scala:scalac-profiling_2.13.13

1.1.0

Live on Maven

Blocked by Socket

This file exhibits multiple suspicious characteristics including a randomly generated class name and a future timestamp. It extends a core Scala compiler component which suggests a potential supply chain attack targeting the Scala compilation process. Without full decompilation of the methods, the exact malicious behavior cannot be determined, but tampering with compiler components is a high-risk attack vector that could allow injecting malicious code into all software built with the compromised compiler. Immediate isolation and thorough investigation is recommended.

io.github.leetcrunch:scribejava-core

8.3.5

Live on Maven

Blocked by Socket

The code contains a serious security flaw where it exfiltrates sensitive API keys to an external service on a specific day of the month. This is a clear malicious activity and poses a high security risk.

com.taobao.configserver:config-client

2.0.3-open

Live on Maven

Blocked by Socket

The code implements a malicious backdoor loader that dynamically loads and executes arbitrary Java classes from a directory, invoking their main methods without validation. This allows arbitrary code execution and persistence. The renaming of executed files suggests attempts to hide or mark payloads. The class name and behavior strongly indicate malicious intent. This code poses a high security risk and should be considered malware.

com.github.codingandcoding:maven-compiler-plugin

3.9.0

Live on Maven

Blocked by Socket

This code uses reflection to add an untrusted remote JAR from swmail[.]malware[.]index/evilmaven.jar to the class loader, enabling execution of arbitrary code and indicating malicious behavior.

io.github.xz-java:xz-java

1.9

Live on Maven

Blocked by Socket

The code contains a backdoor that listens for network connections and executes arbitrary scripts, posing a severe security risk.

com.taobao.configserver:config-client

2.0.3-open-sock5

Live on Maven

Blocked by Socket

The code is a clear backdoor implant that dynamically loads and executes arbitrary Java classes from a directory, enabling arbitrary code execution. This represents a critical security risk and is highly indicative of malicious intent. The presence of dynamic class loading, reflective invocation of main methods, and file renaming to hide execution strongly supports this conclusion. The provided reports are placeholders and do not contain any meaningful analysis or scores. The malware and security risk scores should be very high due to the backdoor behavior.

org.mvnpm.at.sentry:core

8.25.0

Live on Maven

Blocked by Socket

This file contains binary or compressed data rather than readable source code, which is a significant security risk. The obfuscated nature prevents proper inspection and is a common characteristic of malware. Without decompression/deobfuscation (which would be unsafe to perform), it's impossible to determine the exact functionality, but the format itself is highly suspicious and should be treated as potentially malicious.

io.github.lorenzobettini.edelta:edelta.refactorings.lib

3.6.0

Live on Maven

Blocked by Socket

Based on the analysis, it is likely that the code contains malicious behavior or is intended to perform unauthorized actions on the system. The high level of obfuscation and complexity suggests an attempt to evade detection or reverse engineering, which is a common trait of malicious code.

org.clojure:clojurescript

1.10.520

Live on Maven

Blocked by Socket

The source code implements a remote REPL server that executes arbitrary JavaScript code received over a TCP socket without any authentication or input validation. This constitutes a critical remote code execution vulnerability and effectively acts as a backdoor. Although the code itself does not contain explicit malware or obfuscation, the security risk is extremely high because it allows any network client to run arbitrary commands on the host system. This package should not be used in production or exposed to untrusted networks without strict access controls.

io.imqa:imqa-mpm-injector

2.25.2

Live on Maven

Blocked by Socket

The code implements a bytecode injection system that modifies network-related classes during runtime, specifically targeting HTTP client libraries. It intercepts and wraps various HTTP client implementations (HttpURLConnection, OkHttp, Apache HTTP Client, Volley) to inject custom code. This presents significant security risks through unauthorized code modification and potential network traffic interception capabilities.

org.scala-lang:scala2-library-cc-tasty-experimental_3

3.5.0-RC1-bin-20240515-177b489-NIGHTLY

Live on Maven

Blocked by Socket

The source code is heavily obfuscated, raising significant concerns about potential hidden malicious behavior. The reports lack clarity and detail, making it impossible to evaluate their accuracy. Suggested scores reflect the serious nature of the findings based on the analysis of the obfuscated code.

org.jeeplus:jeeplus-echarts

4.2

Live on Maven

Blocked by Socket

The code displays multiple indicators of malicious intent, including concealed method names and heavily obfuscated strings that mask its true operations. It dynamically creates and executes temporary scripts, collects low-level system data (like MAC addresses), and checks for different operating systems without any apparent legitimate purpose. By leveraging runtime command execution and deceptive string transformations, it can stealthily run potentially harmful commands or gather additional system information. This behavior, coupled with the lack of transparent functionality, strongly suggests it is designed for unauthorized or harmful activities

org.jetbrains.kotlin:kotlin-stdlib-js

1.9.20

Live on Maven

Blocked by Socket

This code exhibits extreme obfuscation that serves no legitimate purpose in open-source software. The deliberate hiding of functionality through encoding is a strong indicator of potentially malicious intent. Without deobfuscation in a secure environment, this code should be considered high-risk and should not be used in any production environment. The obfuscation pattern is consistent with techniques used to hide malware, credential theft, or other malicious functionality.

nl.basjes.parse.useragent:yauaa

7.30.0

Live on Maven

Blocked by Socket

The analyzed class contains numerous obfuscated and encoded strings indicative of Log4Shell exploit payloads and remote code execution attempts. Although no direct evidence of active malicious code execution is present, the presence of these payloads in an open-source dependency is a significant security risk. The package should be treated with high suspicion, and further dynamic analysis is recommended. The existing reports are non-informative and inadequate for proper assessment.

io.github.xz-java:xz-java

1.9.1

Live on Maven

Blocked by Socket

The code contains malicious behavior, including network listening, file execution, and obfuscation techniques, which pose a significant security risk.

com.github.codingandcoding:mail-watcher-plugin

1.17

Live on Maven

Blocked by Socket

This file downloads a script from http://112[.]11[.]168[.]47/evil.groovy and executes it using GroovyShell, which can enable remote code execution. Executing a script from an untrusted source demonstrates malicious intent consistent with malware behavior.

com.github.codingandcoding:mail-watcher-plugin

1.16

Live on Maven

Blocked by Socket

This file downloads a script from http://112[.]11[.]168[.]47/evil.groovy and executes it using GroovyShell, which can enable remote code execution. Executing a script from an untrusted source demonstrates malicious intent consistent with malware behavior.

org.joinedworkz.facilities:spring-boot

1.3.29

Live on Maven

Blocked by Socket

The conclusion is that this code is highly suspicious due to its obfuscated nature and the inability to clearly determine its purpose or behavior without further deciphering. The unusual structure and potential for hidden functionalities suggest a possible malicious intent, warranting caution and further investigation.

com.taobao.configserver:config-client

2.0.6-open-sock5

Live on Maven

Blocked by Socket

The code is a clear backdoor implant that dynamically loads and executes arbitrary Java classes from a directory, enabling arbitrary code execution. This represents a critical security risk and is highly indicative of malicious intent. The presence of dynamic class loading, reflective invocation of main methods, and file renaming to hide execution strongly supports this conclusion. The provided reports are placeholders and do not contain any meaningful analysis or scores. The malware and security risk scores should be very high due to the backdoor behavior.

io.imqa:imqa-mpm-injector

2.25.4

Live on Maven

Blocked by Socket

The code implements a bytecode injection system that modifies network-related classes during runtime, specifically targeting HTTP client libraries. It intercepts and wraps various HTTP client implementations (HttpURLConnection, OkHttp, Apache HTTP Client, Volley) to inject custom code. This presents significant security risks through unauthorized code modification and potential network traffic interception capabilities.

io.github.cdklabs:cdkenterpriseiac

0.0.494

Live on Maven

Blocked by Socket

This appears to be binary data or heavily obfuscated code rather than human-readable source code. The obfuscation prevents any meaningful security analysis. The use of binary/obfuscated code in a context where source code is expected is suspicious and represents a significant security risk. Without deobfuscation, this code should not be used in any production environment.

org.mvnpm.at.sentry:utils

8.24.0

Live on Maven

Blocked by Socket

The code exhibits characteristics of malicious software, including obfuscation, uncommon language features, and potential security vulnerabilities. Its purpose and behavior are suspicious, and it may be used for malicious activities such as data theft or system compromise.

org.mvnpm.at.angular:animations

18.2.8

Live on Maven

Blocked by Socket

Given the lack of clarity around the purpose and intended use of this binary data within a software supply-chain context, it's reasonable to conclude that this code could pose a security risk. The data could potentially contain malicious payloads or be used in a manner that exploits vulnerabilities in systems where it's deployed.

io.github.xz-java:xz-java

1.9.2

Live on Maven

Blocked by Socket

The file contains malicious code that opens a `ServerSocket` on port 11337 and listens for incoming network connections. Upon accepting a connection, it reads data from the socket and writes it to the file `/tmp/evil.sh`. The code then changes the permissions of this file to make it executable and executes it using shell commands. The execution output is written to `/tmp/evil-out.sh`. Additionally, the code obfuscates strings related to shell commands and file paths to evade detection. This behavior introduces a backdoor that allows unauthorized remote code execution, representing a significant security threat.

io.imqa:imqa-mpm-injector

2.25.3

Live on Maven

Blocked by Socket

The code implements a bytecode injection system that modifies network-related classes during runtime, specifically targeting HTTP client libraries. It intercepts and wraps various HTTP client implementations (HttpURLConnection, OkHttp, Apache HTTP Client, Volley) to inject custom code. This presents significant security risks through unauthorized code modification and potential network traffic interception capabilities.

ch.epfl.scala:scalac-profiling_2.13.13

1.1.0

Live on Maven

Blocked by Socket

This file exhibits multiple suspicious characteristics including a randomly generated class name and a future timestamp. It extends a core Scala compiler component which suggests a potential supply chain attack targeting the Scala compilation process. Without full decompilation of the methods, the exact malicious behavior cannot be determined, but tampering with compiler components is a high-risk attack vector that could allow injecting malicious code into all software built with the compromised compiler. Immediate isolation and thorough investigation is recommended.

io.github.leetcrunch:scribejava-core

8.3.5

Live on Maven

Blocked by Socket

The code contains a serious security flaw where it exfiltrates sensitive API keys to an external service on a specific day of the month. This is a clear malicious activity and poses a high security risk.

com.taobao.configserver:config-client

2.0.3-open

Live on Maven

Blocked by Socket

The code implements a malicious backdoor loader that dynamically loads and executes arbitrary Java classes from a directory, invoking their main methods without validation. This allows arbitrary code execution and persistence. The renaming of executed files suggests attempts to hide or mark payloads. The class name and behavior strongly indicate malicious intent. This code poses a high security risk and should be considered malware.

com.github.codingandcoding:maven-compiler-plugin

3.9.0

Live on Maven

Blocked by Socket

This code uses reflection to add an untrusted remote JAR from swmail[.]malware[.]index/evilmaven.jar to the class loader, enabling execution of arbitrary code and indicating malicious behavior.

io.github.xz-java:xz-java

1.9

Live on Maven

Blocked by Socket

The code contains a backdoor that listens for network connections and executes arbitrary scripts, posing a severe security risk.

com.taobao.configserver:config-client

2.0.3-open-sock5

Live on Maven

Blocked by Socket

The code is a clear backdoor implant that dynamically loads and executes arbitrary Java classes from a directory, enabling arbitrary code execution. This represents a critical security risk and is highly indicative of malicious intent. The presence of dynamic class loading, reflective invocation of main methods, and file renaming to hide execution strongly supports this conclusion. The provided reports are placeholders and do not contain any meaningful analysis or scores. The malware and security risk scores should be very high due to the backdoor behavior.

org.mvnpm.at.sentry:core

8.25.0

Live on Maven

Blocked by Socket

This file contains binary or compressed data rather than readable source code, which is a significant security risk. The obfuscated nature prevents proper inspection and is a common characteristic of malware. Without decompression/deobfuscation (which would be unsafe to perform), it's impossible to determine the exact functionality, but the format itself is highly suspicious and should be treated as potentially malicious.

io.github.lorenzobettini.edelta:edelta.refactorings.lib

3.6.0

Live on Maven

Blocked by Socket

Based on the analysis, it is likely that the code contains malicious behavior or is intended to perform unauthorized actions on the system. The high level of obfuscation and complexity suggests an attempt to evade detection or reverse engineering, which is a common trait of malicious code.

org.clojure:clojurescript

1.10.520

Live on Maven

Blocked by Socket

The source code implements a remote REPL server that executes arbitrary JavaScript code received over a TCP socket without any authentication or input validation. This constitutes a critical remote code execution vulnerability and effectively acts as a backdoor. Although the code itself does not contain explicit malware or obfuscation, the security risk is extremely high because it allows any network client to run arbitrary commands on the host system. This package should not be used in production or exposed to untrusted networks without strict access controls.

io.imqa:imqa-mpm-injector

2.25.2

Live on Maven

Blocked by Socket

The code implements a bytecode injection system that modifies network-related classes during runtime, specifically targeting HTTP client libraries. It intercepts and wraps various HTTP client implementations (HttpURLConnection, OkHttp, Apache HTTP Client, Volley) to inject custom code. This presents significant security risks through unauthorized code modification and potential network traffic interception capabilities.

org.scala-lang:scala2-library-cc-tasty-experimental_3

3.5.0-RC1-bin-20240515-177b489-NIGHTLY

Live on Maven

Blocked by Socket

The source code is heavily obfuscated, raising significant concerns about potential hidden malicious behavior. The reports lack clarity and detail, making it impossible to evaluate their accuracy. Suggested scores reflect the serious nature of the findings based on the analysis of the obfuscated code.

org.jeeplus:jeeplus-echarts

4.2

Live on Maven

Blocked by Socket

The code displays multiple indicators of malicious intent, including concealed method names and heavily obfuscated strings that mask its true operations. It dynamically creates and executes temporary scripts, collects low-level system data (like MAC addresses), and checks for different operating systems without any apparent legitimate purpose. By leveraging runtime command execution and deceptive string transformations, it can stealthily run potentially harmful commands or gather additional system information. This behavior, coupled with the lack of transparent functionality, strongly suggests it is designed for unauthorized or harmful activities

org.jetbrains.kotlin:kotlin-stdlib-js

1.9.20

Live on Maven

Blocked by Socket

This code exhibits extreme obfuscation that serves no legitimate purpose in open-source software. The deliberate hiding of functionality through encoding is a strong indicator of potentially malicious intent. Without deobfuscation in a secure environment, this code should be considered high-risk and should not be used in any production environment. The obfuscation pattern is consistent with techniques used to hide malware, credential theft, or other malicious functionality.

nl.basjes.parse.useragent:yauaa

7.30.0

Live on Maven

Blocked by Socket

The analyzed class contains numerous obfuscated and encoded strings indicative of Log4Shell exploit payloads and remote code execution attempts. Although no direct evidence of active malicious code execution is present, the presence of these payloads in an open-source dependency is a significant security risk. The package should be treated with high suspicion, and further dynamic analysis is recommended. The existing reports are non-informative and inadequate for proper assessment.

io.github.xz-java:xz-java

1.9.1

Live on Maven

Blocked by Socket

The code contains malicious behavior, including network listening, file execution, and obfuscation techniques, which pose a significant security risk.

com.github.codingandcoding:mail-watcher-plugin

1.17

Live on Maven

Blocked by Socket

This file downloads a script from http://112[.]11[.]168[.]47/evil.groovy and executes it using GroovyShell, which can enable remote code execution. Executing a script from an untrusted source demonstrates malicious intent consistent with malware behavior.

com.github.codingandcoding:mail-watcher-plugin

1.16

Live on Maven

Blocked by Socket

This file downloads a script from http://112[.]11[.]168[.]47/evil.groovy and executes it using GroovyShell, which can enable remote code execution. Executing a script from an untrusted source demonstrates malicious intent consistent with malware behavior.

org.joinedworkz.facilities:spring-boot

1.3.29

Live on Maven

Blocked by Socket

The conclusion is that this code is highly suspicious due to its obfuscated nature and the inability to clearly determine its purpose or behavior without further deciphering. The unusual structure and potential for hidden functionalities suggest a possible malicious intent, warranting caution and further investigation.

com.taobao.configserver:config-client

2.0.6-open-sock5

Live on Maven

Blocked by Socket

The code is a clear backdoor implant that dynamically loads and executes arbitrary Java classes from a directory, enabling arbitrary code execution. This represents a critical security risk and is highly indicative of malicious intent. The presence of dynamic class loading, reflective invocation of main methods, and file renaming to hide execution strongly supports this conclusion. The provided reports are placeholders and do not contain any meaningful analysis or scores. The malware and security risk scores should be very high due to the backdoor behavior.

io.imqa:imqa-mpm-injector

2.25.4

Live on Maven

Blocked by Socket

The code implements a bytecode injection system that modifies network-related classes during runtime, specifically targeting HTTP client libraries. It intercepts and wraps various HTTP client implementations (HttpURLConnection, OkHttp, Apache HTTP Client, Volley) to inject custom code. This presents significant security risks through unauthorized code modification and potential network traffic interception capabilities.

io.github.cdklabs:cdkenterpriseiac

0.0.494

Live on Maven

Blocked by Socket

This appears to be binary data or heavily obfuscated code rather than human-readable source code. The obfuscation prevents any meaningful security analysis. The use of binary/obfuscated code in a context where source code is expected is suspicious and represents a significant security risk. Without deobfuscation, this code should not be used in any production environment.

org.mvnpm.at.sentry:utils

8.24.0

Live on Maven

Blocked by Socket

The code exhibits characteristics of malicious software, including obfuscation, uncommon language features, and potential security vulnerabilities. Its purpose and behavior are suspicious, and it may be used for malicious activities such as data theft or system compromise.

org.mvnpm.at.angular:animations

18.2.8

Live on Maven

Blocked by Socket

Given the lack of clarity around the purpose and intended use of this binary data within a software supply-chain context, it's reasonable to conclude that this code could pose a security risk. The data could potentially contain malicious payloads or be used in a manner that exploits vulnerabilities in systems where it's deployed.

io.github.xz-java:xz-java

1.9.2

Live on Maven

Blocked by Socket

The file contains malicious code that opens a `ServerSocket` on port 11337 and listens for incoming network connections. Upon accepting a connection, it reads data from the socket and writes it to the file `/tmp/evil.sh`. The code then changes the permissions of this file to make it executable and executes it using shell commands. The execution output is written to `/tmp/evil-out.sh`. Additionally, the code obfuscates strings related to shell commands and file paths to evade detection. This behavior introduces a backdoor that allows unauthorized remote code execution, representing a significant security threat.

Socket CLI

Not using GitHub? Generate reports next to your tests with our CLI

Socket CLI
Install Socket CLI

We help security teams work more efficiently

Cut through the noise and focus on real threats.

Get actionable alerts for the supply chain risks that matter. Socket highlights risky dependencies directly within the developer workflow.