This package version is identified as malware. It has been flagged either by Socket's AI scanner and confirmed by our threat research team, or is listed as malicious in security databases and other sources.
Contains a dependency which resolves to a remote git URL. Dependencies fetched from git URLs are not immutable and can be used to inject untrusted code or reduce the likelihood of a reproducible install.
Contains a dependency which resolves to a GitHub URL. Dependencies fetched from GitHub specifiers are not immutable can be used to inject untrusted code or reduce the likelihood of a reproducible install.
Contains a dependency which resolves to a remote HTTP URL which could be used to inject untrusted code and reduce overall package reliability.
Obfuscated files are intentionally packed to hide their behavior. This could be a sign of malware.
Suspicious Stars on GitHub The GitHub repository of this package may have been artificially inflated with stars (from bots, crowdsourcing, etc.).
This package contains telemetry which tracks how it is used.
A new collaborator has begun publishing package versions. Package stability and security risk may be elevated.
AI-detected possible typosquat AI has identified this package as a potential typosquat of a more popular package. This suggests that the package may be intentionally mimicking another package's name, description, or other metadata.
Contains native code (e.g., compiled binaries or shared libraries). Including native code can obscure malicious behavior.
The package was published by an npm account that no longer exists.
This module accesses the network.
Initial human review suggests the presence of a vulnerability in this package. It is pending further analysis and confirmation.
This module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Packages less than 10 lines of code are easily copied into your own project and may not warrant the additional supply chain risk of an external dependency.
Package uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Accesses the file system, and could potentially read sensitive data.
Contains high entropy strings. This could be a sign of encrypted data, leaked secrets or obfuscated code.
A new npm collaborator published a version of the package for the first time. New collaborators are usually benign additions to a project, but do indicate a change to the security surface area of a package.
Package contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Ecosystem-Specific Alerts
Chrome Extensions
This Chrome extension requests permissions to access browser APIs, user data, or system features.
This Chrome extension includes content scripts that execute JavaScript on specified websites.
This Chrome extension requests host permissions to access specific websites or domains.
NPM
Package contains a shrinkwrap file. This may allow the package to bypass normal install procedures.
Install scripts are run when the package is installed. The majority of malware in npm is hidden in install scripts.
This package has inconsistent metadata. This could be malicious or caused by an error when publishing the package.
Uses debug, reflection and dynamic code execution features.
Dynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
VS Code Extensions
This extension packs other extensions.