
Research
2025 Report: Destructive Malware in Open Source Packages
Destructive malware is rising across open source registries, using delays and kill switches to wipe code, break builds, and disrupt CI/CD.
stringine
Advanced tools
A simple cross-platform string manipulation utility
We’re aiming to build a string library available for as many languages as possible, with as similar functionality as possible for all platforms.
Stringine’s functionality ranges from light functions (such as string capitalization and reversing) to more advanced functions (such as translating strings with character maps). The reason why we have lighter features that a developer could implement themselves is being all-in-one: a developer only has to use Stringine and no other modules or implementations to achieve even the simplest functionality in their application!
A developer can also easily move the exact same line of code to another language and achieve the same result: that’s what Stringine is all about.
Stringine is currently under development and there’s still a lot to be done! If you want to help, you are welcome to contribute.
FAQs
A simple cross-platform string manipulation utility.
We found that stringine demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Research
Destructive malware is rising across open source registries, using delays and kill switches to wipe code, break builds, and disrupt CI/CD.

Security News
Socket CTO Ahmad Nassri shares practical AI coding techniques, tools, and team workflows, plus what still feels noisy and why shipping remains human-led.

Research
/Security News
A five-month operation turned 27 npm packages into durable hosting for browser-run lures that mimic document-sharing portals and Microsoft sign-in, targeting 25 organizations across manufacturing, industrial automation, plastics, and healthcare for credential theft.