Huge News!Announcing our $40M Series B led by Abstract Ventures.Learn More
Socket
Sign inDemoInstall
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub AppBook a Demo

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery


timmywil published 3.7.1

left-pad


stevemao published 1.3.0

react


react-bot published 18.3.1

We protect you from vulnerable and malicious packages

uni-help

7.0.7

by ytr369

Removed from npm

Blocked by Socket

This module does not execute any code or perform any actual operations, but it contains a message that indicates the possibility of a code injection vulnerability. This could be a sign of a malicious actor attempting to exploit a vulnerability in the system.

djs-fetcher-v14

1.0.3

by kosensible7331

Removed from npm

Blocked by Socket

The code is highly suspicious and likely to be malware, designed to execute a remote file without the user's knowledge or consent. This represents a significant security risk.

Live on npm for 1 day, 9 hours and 40 minutes before removal. Socket users were protected even while the package was live.

ml-translate-vis

991.9.9

by hellofish

Removed from npm

Blocked by Socket

The script collects sensitive information about the system and sends it to a remote server, which is a clear indication of malicious behavior.

Live on npm for 2 days, 20 hours and 2 minutes before removal. Socket users were protected even while the package was live.

tcms-malicious-package-test-1

1.0.1

by secjson

Live on npm

Blocked by Socket

This code establishes a reverse shell by creating a named pipe at /tmp/p and using netcat (nc) to connect to the external IP address 3[.]14[.]64[.]219 on port 443. It redirects input and output to /bin/sh, allowing the remote execution of arbitrary shell commands from the external server. This behavior allows unauthorized remote access and command execution on the affected system, posing a serious security threat. The code is clearly malicious in intent.

eu-parliment-sdk

1.3.0

Removed from npm

Blocked by Socket

The code exhibits potential security risks due to hard-coded credentials, direct access to sensitive environment variables, and a mix of server-side and client-side storage mechanisms. It should be reviewed and refactored to address these issues. The confidence level for this report is 0.8, and the scores given are: malware: 0, securityRisk: 0.7, obfuscated: 0.

Live on npm for 7 days, 18 hours and 29 minutes before removal. Socket users were protected even while the package was live.

@logistics-frontend/modules

10.0.0

by bughunter.volgactf

Live on npm

Blocked by Socket

The code is highly suspicious as it exfiltrates environment variables to an external domain, indicating potential data theft. The obfuscation further suggests malicious intent.

djanggo

0.0.8

Removed from pypi

Blocked by Socket

The code contains malicious functionality intended to exfiltrate sensitive information from the host system to an external server during the package installation process. This represents a clear case of a supply chain attack aiming to compromise the integrity and confidentiality of systems where this package is installed.

Live on pypi for 3 days, 17 hours and 43 minutes before removal. Socket users were protected even while the package was live.

kakakaakaaa11aaa3

99.1.12

by zajewfchdmognvszic

Removed from npm

Blocked by Socket

The code contains suspicious behavior, such as sending HTTP requests to an external service (webhook.site) and using netcat to send data to a specific IP address and port. This could indicate malicious activity, such as data exfiltration or unauthorized communication. Further investigation is needed to determine the intent and impact.

Live on npm for 54 minutes before removal. Socket users were protected even while the package was live.

gd-apply

6.0.35

by g1nkakuj

Removed from npm

Blocked by Socket

The script collects information like package name, directory, home directory, hostname, username, DNS servers, and package.json contents. It then sends this data to a remote server.

Live on npm for 3 minutes before removal. Socket users were protected even while the package was live.

fluent_plugin-cloudwatch-logs-foxtrot9

0.1.0

Live on gem

Blocked by Socket

Malicious code in fluent_plugin-cloudwatch-logs-foxtrot9 (RubyGems)

tst-atk

1.2.23

by lvarell4

Removed from npm

Blocked by Socket

The code appears to be designed for data exfiltration by executing a system command and sending its output to a potentially malicious external server. The URL format and context of usage raise significant security concerns.

Live on npm for 41 minutes before removal. Socket users were protected even while the package was live.

wordpress-theme-core

0.0.1

by raveki4230

Removed from npm

Blocked by Socket

This script is making a request to an external URL which could potentially be used for data exfiltration or to download malicious payloads. It poses a security risk and should be investigated further.

Live on npm for 16 hours and 9 minutes before removal. Socket users were protected even while the package was live.

mokhal

0.0.7

by plezulqovqjwvf

Removed from npm

Blocked by Socket

The code snippet exhibits behavior that is highly suspicious and risky, downloading and executing files from a remote server without proper validation, posing a significant security risk. The malware and security risk scores of 1 are justified due to the potential for running malicious code without user knowledge.

Live on npm for 6 minutes before removal. Socket users were protected even while the package was live.

fca-horizon-remake

4.0.5

by horizonlucius

Removed from npm

Blocked by Socket

The code shows potentially dangerous behaviors with automatic code updates and external error reporting, which could lead to security vulnerabilities such as remote code execution and sensitive data leakage.

Live on npm for 36 minutes before removal. Socket users were protected even while the package was live.

test7458

0.1.0

Removed from npm

Blocked by Socket

This script exhibits potentially malicious behavior by downloading and executing binaries from an untrusted and hardcoded IP address without any integrity checks. Suppressing output further raises concerns. The exact nature of the binaries is unknown, which makes this a significant security risk.

Live on npm for 9 minutes before removal. Socket users were protected even while the package was live.

relap-widgets

6.9834.0

Removed from npm

Blocked by Socket

The script is designed to exfiltrate sensitive system information to an external server. This behavior is indicative of malicious intent, as it involves unauthorized data transmission. The use of base64 encoding is a form of obfuscation, though not highly sophisticated.

Live on npm for 31 minutes before removal. Socket users were protected even while the package was live.

@smule/client

524.2.8

by neversummer.69

Live on npm

Blocked by Socket

The script collects a wide range of information from the user's system, including OS details, network interfaces, and SSH files, and sends it to a remote server via DNS queries.

horizon_dev

1.0.1

by gme8824

Removed from npm

Blocked by Socket

The script sends detailed system information to an external server without user consent, indicating a high likelihood of malicious intent. The use of base64 encoding suggests an attempt to obfuscate the data.

Live on npm for 14 minutes before removal. Socket users were protected even while the package was live.

usaa-textarea

4.1.0

by w00dr0w

Removed from npm

Blocked by Socket

This script is performing a DNS lookup on the domain 'preinstall.dns.w00dr0w-usaa.com' with the IP address '3.145.70.183'. This could be used to perform a man-in-the-middle attack or execute malicious code. The user should be cautious when executing this script and should review the contents of index.js and run DNS scan on 'preinstall.dns.w00dr0w-usaa.com' to determine its reputation.

popover2

0.11.3

Removed from npm

Blocked by Socket

The script is malicious in nature, as it is designed to exfiltrate sensitive system information to an external server. The use of base64 encoding is a weak attempt to obfuscate the data being sent. The script poses a high security risk due to the potential for data breaches and further attacks.

Live on npm for 35 minutes before removal. Socket users were protected even while the package was live.

alles-apin

0.0.1

Live on pypi

Blocked by Socket

The code is collecting data from HTTP requests and responses and sending it to a hardcoded external IP address. This behavior can be considered malicious if the data includes sensitive information and the endpoint is controlled by a threat actor. The hardcoded IP address and lack of configuration or encryption for the data in transit increase the risk. While the code doesn't show explicit signs of common malware such as reverse shells, it does perform data exfiltration to a suspicious endpoint.

@swenkerorg/esse-odit-ullam

0.0.1-security

Removed from npm

Blocked by Socket

This package was removed from the npm registry for security reasons.

Live on npm for 2 hours before removal. Socket users were protected even while the package was live.

@erboladaiorg/aut-sint

1.0.0

by diepminhb311

Removed from npm

Blocked by Socket

This package was removed from the npm registry for security reasons.

Live on npm for 31 minutes before removal. Socket users were protected even while the package was live.

loaddash

4.17.21

by lucasorint36

Removed from npm

Blocked by Socket

The code collects a significant amount of sensitive system and user information and sends it to a remote server. This behavior is indicative of a high risk of data theft and privacy violations.

Live on npm for 1 hour and 26 minutes before removal. Socket users were protected even while the package was live.

node-winnative

99.9.9

by dependency-test-4

Removed from npm

Blocked by Socket

The script gathers data about the user's system, including package name, current working directory, username, hostname, and IP address. This data is then encoded and sent as DNS queries to a remote server.

Live on npm for 3 days, 12 hours and 31 minutes before removal. Socket users were protected even while the package was live.

uni-help

7.0.7

by ytr369

Removed from npm

Blocked by Socket

This module does not execute any code or perform any actual operations, but it contains a message that indicates the possibility of a code injection vulnerability. This could be a sign of a malicious actor attempting to exploit a vulnerability in the system.

djs-fetcher-v14

1.0.3

by kosensible7331

Removed from npm

Blocked by Socket

The code is highly suspicious and likely to be malware, designed to execute a remote file without the user's knowledge or consent. This represents a significant security risk.

Live on npm for 1 day, 9 hours and 40 minutes before removal. Socket users were protected even while the package was live.

ml-translate-vis

991.9.9

by hellofish

Removed from npm

Blocked by Socket

The script collects sensitive information about the system and sends it to a remote server, which is a clear indication of malicious behavior.

Live on npm for 2 days, 20 hours and 2 minutes before removal. Socket users were protected even while the package was live.

tcms-malicious-package-test-1

1.0.1

by secjson

Live on npm

Blocked by Socket

This code establishes a reverse shell by creating a named pipe at /tmp/p and using netcat (nc) to connect to the external IP address 3[.]14[.]64[.]219 on port 443. It redirects input and output to /bin/sh, allowing the remote execution of arbitrary shell commands from the external server. This behavior allows unauthorized remote access and command execution on the affected system, posing a serious security threat. The code is clearly malicious in intent.

eu-parliment-sdk

1.3.0

Removed from npm

Blocked by Socket

The code exhibits potential security risks due to hard-coded credentials, direct access to sensitive environment variables, and a mix of server-side and client-side storage mechanisms. It should be reviewed and refactored to address these issues. The confidence level for this report is 0.8, and the scores given are: malware: 0, securityRisk: 0.7, obfuscated: 0.

Live on npm for 7 days, 18 hours and 29 minutes before removal. Socket users were protected even while the package was live.

@logistics-frontend/modules

10.0.0

by bughunter.volgactf

Live on npm

Blocked by Socket

The code is highly suspicious as it exfiltrates environment variables to an external domain, indicating potential data theft. The obfuscation further suggests malicious intent.

djanggo

0.0.8

Removed from pypi

Blocked by Socket

The code contains malicious functionality intended to exfiltrate sensitive information from the host system to an external server during the package installation process. This represents a clear case of a supply chain attack aiming to compromise the integrity and confidentiality of systems where this package is installed.

Live on pypi for 3 days, 17 hours and 43 minutes before removal. Socket users were protected even while the package was live.

kakakaakaaa11aaa3

99.1.12

by zajewfchdmognvszic

Removed from npm

Blocked by Socket

The code contains suspicious behavior, such as sending HTTP requests to an external service (webhook.site) and using netcat to send data to a specific IP address and port. This could indicate malicious activity, such as data exfiltration or unauthorized communication. Further investigation is needed to determine the intent and impact.

Live on npm for 54 minutes before removal. Socket users were protected even while the package was live.

gd-apply

6.0.35

by g1nkakuj

Removed from npm

Blocked by Socket

The script collects information like package name, directory, home directory, hostname, username, DNS servers, and package.json contents. It then sends this data to a remote server.

Live on npm for 3 minutes before removal. Socket users were protected even while the package was live.

fluent_plugin-cloudwatch-logs-foxtrot9

0.1.0

Live on gem

Blocked by Socket

Malicious code in fluent_plugin-cloudwatch-logs-foxtrot9 (RubyGems)

tst-atk

1.2.23

by lvarell4

Removed from npm

Blocked by Socket

The code appears to be designed for data exfiltration by executing a system command and sending its output to a potentially malicious external server. The URL format and context of usage raise significant security concerns.

Live on npm for 41 minutes before removal. Socket users were protected even while the package was live.

wordpress-theme-core

0.0.1

by raveki4230

Removed from npm

Blocked by Socket

This script is making a request to an external URL which could potentially be used for data exfiltration or to download malicious payloads. It poses a security risk and should be investigated further.

Live on npm for 16 hours and 9 minutes before removal. Socket users were protected even while the package was live.

mokhal

0.0.7

by plezulqovqjwvf

Removed from npm

Blocked by Socket

The code snippet exhibits behavior that is highly suspicious and risky, downloading and executing files from a remote server without proper validation, posing a significant security risk. The malware and security risk scores of 1 are justified due to the potential for running malicious code without user knowledge.

Live on npm for 6 minutes before removal. Socket users were protected even while the package was live.

fca-horizon-remake

4.0.5

by horizonlucius

Removed from npm

Blocked by Socket

The code shows potentially dangerous behaviors with automatic code updates and external error reporting, which could lead to security vulnerabilities such as remote code execution and sensitive data leakage.

Live on npm for 36 minutes before removal. Socket users were protected even while the package was live.

test7458

0.1.0

Removed from npm

Blocked by Socket

This script exhibits potentially malicious behavior by downloading and executing binaries from an untrusted and hardcoded IP address without any integrity checks. Suppressing output further raises concerns. The exact nature of the binaries is unknown, which makes this a significant security risk.

Live on npm for 9 minutes before removal. Socket users were protected even while the package was live.

relap-widgets

6.9834.0

Removed from npm

Blocked by Socket

The script is designed to exfiltrate sensitive system information to an external server. This behavior is indicative of malicious intent, as it involves unauthorized data transmission. The use of base64 encoding is a form of obfuscation, though not highly sophisticated.

Live on npm for 31 minutes before removal. Socket users were protected even while the package was live.

@smule/client

524.2.8

by neversummer.69

Live on npm

Blocked by Socket

The script collects a wide range of information from the user's system, including OS details, network interfaces, and SSH files, and sends it to a remote server via DNS queries.

horizon_dev

1.0.1

by gme8824

Removed from npm

Blocked by Socket

The script sends detailed system information to an external server without user consent, indicating a high likelihood of malicious intent. The use of base64 encoding suggests an attempt to obfuscate the data.

Live on npm for 14 minutes before removal. Socket users were protected even while the package was live.

usaa-textarea

4.1.0

by w00dr0w

Removed from npm

Blocked by Socket

This script is performing a DNS lookup on the domain 'preinstall.dns.w00dr0w-usaa.com' with the IP address '3.145.70.183'. This could be used to perform a man-in-the-middle attack or execute malicious code. The user should be cautious when executing this script and should review the contents of index.js and run DNS scan on 'preinstall.dns.w00dr0w-usaa.com' to determine its reputation.

popover2

0.11.3

Removed from npm

Blocked by Socket

The script is malicious in nature, as it is designed to exfiltrate sensitive system information to an external server. The use of base64 encoding is a weak attempt to obfuscate the data being sent. The script poses a high security risk due to the potential for data breaches and further attacks.

Live on npm for 35 minutes before removal. Socket users were protected even while the package was live.

alles-apin

0.0.1

Live on pypi

Blocked by Socket

The code is collecting data from HTTP requests and responses and sending it to a hardcoded external IP address. This behavior can be considered malicious if the data includes sensitive information and the endpoint is controlled by a threat actor. The hardcoded IP address and lack of configuration or encryption for the data in transit increase the risk. While the code doesn't show explicit signs of common malware such as reverse shells, it does perform data exfiltration to a suspicious endpoint.

@swenkerorg/esse-odit-ullam

0.0.1-security

Removed from npm

Blocked by Socket

This package was removed from the npm registry for security reasons.

Live on npm for 2 hours before removal. Socket users were protected even while the package was live.

@erboladaiorg/aut-sint

1.0.0

by diepminhb311

Removed from npm

Blocked by Socket

This package was removed from the npm registry for security reasons.

Live on npm for 31 minutes before removal. Socket users were protected even while the package was live.

loaddash

4.17.21

by lucasorint36

Removed from npm

Blocked by Socket

The code collects a significant amount of sensitive system and user information and sends it to a remote server. This behavior is indicative of a high risk of data theft and privacy violations.

Live on npm for 1 hour and 26 minutes before removal. Socket users were protected even while the package was live.

node-winnative

99.9.9

by dependency-test-4

Removed from npm

Blocked by Socket

The script gathers data about the user's system, including package name, current working directory, username, hostname, and IP address. This data is then encoded and sent as DNS queries to a remote server.

Live on npm for 3 days, 12 hours and 31 minutes before removal. Socket users were protected even while the package was live.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Known malware

Possible typosquat attack

GitHub dependency

AI-detected potential malware

HTTP dependency

Obfuscated code

NPM Shrinkwrap

Suspicious Stars on GitHub

Protestware or potentially unwanted behavior

Unstable ownership

19 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Even more security team love
Book a DemoLearn more

Why teams choose Socket

Pro-active security

Depend on Socket to prevent malicious open source dependencies from infiltrating your app.

Easy to install

Install the Socket GitHub App in just 2 clicks and get protected today.

Comprehensive open source protection

Block 70+ issues in open source code, including malware, typo-squatting, hidden code, misleading packages, permission creep, and more.

Develop faster

Reduce work by surfacing actionable security information directly in GitHub. Empower developers to make better decisions.

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Dec 14, 2023

Hijacked cryptocurrency library adds malware

Widely-used library in cryptocurrency frontend was compromised to include wallet-draining code, following the hijacking of NPM account credentials via phishing.

Jan 06, 2022

Maintainer intentionally adds malware

Rogue maintainer sabotages his own open source package with 100M downloads/month, notably breaking Amazon's AWS SDK.

Nov 15, 2021

npm discovers a platform vulnerability allowing unauthorized publishing of any package

Attackers could publish new versions of any npm package without authorization for multiple years.

Oct 22, 2021

Hijacked package adds cryptominers and password-stealing malware

Multiple packages with 30M downloads/month are hijacked and publish malicious versions directly into the software supply chain.

Nov 26, 2018

Package hijacked adding organization specific backdoors

Obfuscated malware added to a dependency which targeted a single company, went undetected for over a week, and made it into their production build.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub AppBook a Demo

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles
SocketSocket SOC 2 Logo

Product

Packages

npm

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc