New Research: Supply Chain Attack on Axios Pulls Malicious Dependency from npm.Details →
Socket
Book a DemoSign in
Socket

arangoql

Package Overview
Dependencies
Maintainers
1
Versions
4
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

arangoql

⚠️ PROOF-OF-CONCEPT: A simple ArangoDB client demonstrating 'slopsquatting' risks from LLM hallucinations

latest
Source
npmnpm
Version
1.0.3
Version published
Weekly downloads
7
40%
Maintainers
1
Weekly downloads
 
Created
Source

ArangoQL - Proof-of-Concept

⚠️ SECURITY RESEARCH PROJECT ⚠️

GitHub: github.com/groovecoder/arangoql NPM: npmjs.com/package/arangoql

What is this?

This is a proof-of-concept demonstrating "slopsquatting" - a supply chain attack vector where:

  • An LLM (like ChatGPT, Claude, etc.) hallucinates a package name
  • A developer trusts the LLM and runs npm install <hallucinated-name>
  • An attacker has registered that hallucinated name with malicious code
  • The malicious code runs on the developer's machine

This package is harmless - it only displays a warning message. But it proves that if you installed this by mistake, malicious code could have:

  • Stolen your environment variables (API keys, secrets)
  • Exfiltrated source code
  • Modified your files
  • Installed backdoors

Did you mean arangojs?

If an LLM suggested you install "arangoql" for ArangoDB support, it likely meant the official package: arangojs

To fix this:

npm uninstall arangoql
npm install arangojs

Using this package (for research)

If you intentionally want to use this proof-of-concept:

const ArangoQL = require('arangoql');

const db = new ArangoQL({
  url: 'http://localhost:8529',
  database: '_system',
  username: 'root',
  password: ''
});

// Execute AQL queries
const result = await db.query('FOR doc IN myCollection RETURN doc');

// Work with collections
const users = db.collection('users');
await users.save({ name: 'Alice', age: 30 });
await users.find({ name: 'Alice' });
await users.remove('user-key');

Note: This is a minimal implementation. For production use, use the official arangojs package.

Why does this matter?

The Problem

  • LLMs are increasingly used for coding assistance
  • They sometimes "hallucinate" package names that don't exist
  • Developers often trust and execute LLM suggestions without verification
  • Attackers can register these hallucinated names preemptively

Real-world examples

  • Typosquatting: crossenv instead of cross-env (malicious version downloaded 700k+ times)
  • Dependency confusion attacks on major companies
  • Supply chain compromises through package registries

How to protect yourself

  • Verify package names - Check npm before installing
  • Review install scripts - Check package.json for postinstall hooks
  • Check package stats - Look at download counts, age, and maintainers
  • Use lock files - Prevent unexpected package resolution
  • Audit dependencies - Use tools like npm audit and Snyk
  • Don't blindly trust LLMs - Verify all suggestions

Educational Resources

License

MIT License - This is an educational/research project.

Contributing

Found a way to improve this proof-of-concept? Pull requests welcome!

Visit the repository: github.com/groovecoder/arangoql

Disclaimer

This package is for educational and research purposes only. It contains no malicious code and only displays warning messages. The author is not responsible for misuse of this concept.

Keywords

arangodb

FAQs

Package last updated on 24 Jan 2026

Did you know?

Socket

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Install

Related posts