
Research
2025 Report: Destructive Malware in Open Source Packages
Destructive malware is rising across open source registries, using delays and kill switches to wipe code, break builds, and disrupt CI/CD.
tunnelproxy
Advanced tools
This is a small HTTP CONNECT proxy, with a target host whitelist.
Implemented in Python on top of trio and h11, it is written for ease of comprehension and auditing. (This makes it easy to adopt in situations where you'd want such a proxy.)
A secondary goal is to be flexible. It can be used in two ways:
As a stand-alone proxy. Just run the module:
python -m tunnelproxy --address localhost --port 8080 --config example-config.json
As a library.
The proxy (TunnelProxy) always runs in Trio's event loop, but a
wrapper (SynchronousTunnelProxy) lets you run it from normal code.
Make it your own!
For example of (2), see tunnelproxy/__main__.py.
The proxy is single-threaded.
On an AMD Ryzen 9 7900, it handles 1000 connections per second at <5ms maximal latency, as measured on a 10s burst. (See benchmarking for details.)
It's not much, but enough for many use cases.
See docs/CHANGELOG.md.
This project is MIT licensed. TrioHTTPConnection from adapter.py is
based on h11's example server, by Nathaniel J. Smith. The rest is written
by Antun Maldini.
FAQs
A small whitelisting HTTP CONNECT proxy
We found that tunnelproxy demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Research
Destructive malware is rising across open source registries, using delays and kill switches to wipe code, break builds, and disrupt CI/CD.

Security News
Socket CTO Ahmad Nassri shares practical AI coding techniques, tools, and team workflows, plus what still feels noisy and why shipping remains human-led.

Research
/Security News
A five-month operation turned 27 npm packages into durable hosting for browser-run lures that mimic document-sharing portals and Microsoft sign-in, targeting 25 organizations across manufacturing, industrial automation, plastics, and healthcare for credential theft.