Security News
Input Validation Vulnerabilities Dominate MITRE's 2024 CWE Top 25 List
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Quickly evaluate the security and health of any open source package.
uni-help
7.0.7
by ytr369
Removed from npm
Blocked by Socket
This module does not execute any code or perform any actual operations, but it contains a message that indicates the possibility of a code injection vulnerability. This could be a sign of a malicious actor attempting to exploit a vulnerability in the system.
djs-fetcher-v14
1.0.3
by kosensible7331
Removed from npm
Blocked by Socket
The code is highly suspicious and likely to be malware, designed to execute a remote file without the user's knowledge or consent. This represents a significant security risk.
Live on npm for 1 day, 9 hours and 40 minutes before removal. Socket users were protected even while the package was live.
ml-translate-vis
991.9.9
by hellofish
Removed from npm
Blocked by Socket
The script collects sensitive information about the system and sends it to a remote server, which is a clear indication of malicious behavior.
Live on npm for 2 days, 20 hours and 2 minutes before removal. Socket users were protected even while the package was live.
tcms-malicious-package-test-1
1.0.1
by secjson
Live on npm
Blocked by Socket
This code establishes a reverse shell by creating a named pipe at /tmp/p and using netcat (nc) to connect to the external IP address 3[.]14[.]64[.]219 on port 443. It redirects input and output to /bin/sh, allowing the remote execution of arbitrary shell commands from the external server. This behavior allows unauthorized remote access and command execution on the affected system, posing a serious security threat. The code is clearly malicious in intent.
eu-parliment-sdk
1.3.0
Removed from npm
Blocked by Socket
The code exhibits potential security risks due to hard-coded credentials, direct access to sensitive environment variables, and a mix of server-side and client-side storage mechanisms. It should be reviewed and refactored to address these issues. The confidence level for this report is 0.8, and the scores given are: malware: 0, securityRisk: 0.7, obfuscated: 0.
Live on npm for 7 days, 18 hours and 29 minutes before removal. Socket users were protected even while the package was live.
@logistics-frontend/modules
10.0.0
by bughunter.volgactf
Live on npm
Blocked by Socket
The code is highly suspicious as it exfiltrates environment variables to an external domain, indicating potential data theft. The obfuscation further suggests malicious intent.
djanggo
0.0.8
Removed from pypi
Blocked by Socket
The code contains malicious functionality intended to exfiltrate sensitive information from the host system to an external server during the package installation process. This represents a clear case of a supply chain attack aiming to compromise the integrity and confidentiality of systems where this package is installed.
Live on pypi for 3 days, 17 hours and 43 minutes before removal. Socket users were protected even while the package was live.
kakakaakaaa11aaa3
99.1.12
by zajewfchdmognvszic
Removed from npm
Blocked by Socket
The code contains suspicious behavior, such as sending HTTP requests to an external service (webhook.site) and using netcat to send data to a specific IP address and port. This could indicate malicious activity, such as data exfiltration or unauthorized communication. Further investigation is needed to determine the intent and impact.
Live on npm for 54 minutes before removal. Socket users were protected even while the package was live.
gd-apply
6.0.35
by g1nkakuj
Removed from npm
Blocked by Socket
The script collects information like package name, directory, home directory, hostname, username, DNS servers, and package.json contents. It then sends this data to a remote server.
Live on npm for 3 minutes before removal. Socket users were protected even while the package was live.
fluent_plugin-cloudwatch-logs-foxtrot9
0.1.0
Live on gem
Blocked by Socket
Malicious code in fluent_plugin-cloudwatch-logs-foxtrot9 (RubyGems)
tst-atk
1.2.23
by lvarell4
Removed from npm
Blocked by Socket
The code appears to be designed for data exfiltration by executing a system command and sending its output to a potentially malicious external server. The URL format and context of usage raise significant security concerns.
Live on npm for 41 minutes before removal. Socket users were protected even while the package was live.
wordpress-theme-core
0.0.1
by raveki4230
Removed from npm
Blocked by Socket
This script is making a request to an external URL which could potentially be used for data exfiltration or to download malicious payloads. It poses a security risk and should be investigated further.
Live on npm for 16 hours and 9 minutes before removal. Socket users were protected even while the package was live.
mokhal
0.0.7
by plezulqovqjwvf
Removed from npm
Blocked by Socket
The code snippet exhibits behavior that is highly suspicious and risky, downloading and executing files from a remote server without proper validation, posing a significant security risk. The malware and security risk scores of 1 are justified due to the potential for running malicious code without user knowledge.
Live on npm for 6 minutes before removal. Socket users were protected even while the package was live.
fca-horizon-remake
4.0.5
by horizonlucius
Removed from npm
Blocked by Socket
The code shows potentially dangerous behaviors with automatic code updates and external error reporting, which could lead to security vulnerabilities such as remote code execution and sensitive data leakage.
Live on npm for 36 minutes before removal. Socket users were protected even while the package was live.
test7458
0.1.0
Removed from npm
Blocked by Socket
This script exhibits potentially malicious behavior by downloading and executing binaries from an untrusted and hardcoded IP address without any integrity checks. Suppressing output further raises concerns. The exact nature of the binaries is unknown, which makes this a significant security risk.
Live on npm for 9 minutes before removal. Socket users were protected even while the package was live.
relap-widgets
6.9834.0
Removed from npm
Blocked by Socket
The script is designed to exfiltrate sensitive system information to an external server. This behavior is indicative of malicious intent, as it involves unauthorized data transmission. The use of base64 encoding is a form of obfuscation, though not highly sophisticated.
Live on npm for 31 minutes before removal. Socket users were protected even while the package was live.
@smule/client
524.2.8
by neversummer.69
Live on npm
Blocked by Socket
The script collects a wide range of information from the user's system, including OS details, network interfaces, and SSH files, and sends it to a remote server via DNS queries.
horizon_dev
1.0.1
by gme8824
Removed from npm
Blocked by Socket
The script sends detailed system information to an external server without user consent, indicating a high likelihood of malicious intent. The use of base64 encoding suggests an attempt to obfuscate the data.
Live on npm for 14 minutes before removal. Socket users were protected even while the package was live.
usaa-textarea
4.1.0
by w00dr0w
Removed from npm
Blocked by Socket
This script is performing a DNS lookup on the domain 'preinstall.dns.w00dr0w-usaa.com' with the IP address '3.145.70.183'. This could be used to perform a man-in-the-middle attack or execute malicious code. The user should be cautious when executing this script and should review the contents of index.js and run DNS scan on 'preinstall.dns.w00dr0w-usaa.com' to determine its reputation.
popover2
0.11.3
Removed from npm
Blocked by Socket
The script is malicious in nature, as it is designed to exfiltrate sensitive system information to an external server. The use of base64 encoding is a weak attempt to obfuscate the data being sent. The script poses a high security risk due to the potential for data breaches and further attacks.
Live on npm for 35 minutes before removal. Socket users were protected even while the package was live.
alles-apin
0.0.1
Live on pypi
Blocked by Socket
The code is collecting data from HTTP requests and responses and sending it to a hardcoded external IP address. This behavior can be considered malicious if the data includes sensitive information and the endpoint is controlled by a threat actor. The hardcoded IP address and lack of configuration or encryption for the data in transit increase the risk. While the code doesn't show explicit signs of common malware such as reverse shells, it does perform data exfiltration to a suspicious endpoint.
@swenkerorg/esse-odit-ullam
0.0.1-security
Removed from npm
Blocked by Socket
This package was removed from the npm registry for security reasons.
Live on npm for 2 hours before removal. Socket users were protected even while the package was live.
@erboladaiorg/aut-sint
1.0.0
by diepminhb311
Removed from npm
Blocked by Socket
This package was removed from the npm registry for security reasons.
Live on npm for 31 minutes before removal. Socket users were protected even while the package was live.
loaddash
4.17.21
by lucasorint36
Removed from npm
Blocked by Socket
The code collects a significant amount of sensitive system and user information and sends it to a remote server. This behavior is indicative of a high risk of data theft and privacy violations.
Live on npm for 1 hour and 26 minutes before removal. Socket users were protected even while the package was live.
node-winnative
99.9.9
by dependency-test-4
Removed from npm
Blocked by Socket
The script gathers data about the user's system, including package name, current working directory, username, hostname, and IP address. This data is then encoded and sent as DNS queries to a remote server.
Live on npm for 3 days, 12 hours and 31 minutes before removal. Socket users were protected even while the package was live.
uni-help
7.0.7
by ytr369
Removed from npm
Blocked by Socket
This module does not execute any code or perform any actual operations, but it contains a message that indicates the possibility of a code injection vulnerability. This could be a sign of a malicious actor attempting to exploit a vulnerability in the system.
djs-fetcher-v14
1.0.3
by kosensible7331
Removed from npm
Blocked by Socket
The code is highly suspicious and likely to be malware, designed to execute a remote file without the user's knowledge or consent. This represents a significant security risk.
Live on npm for 1 day, 9 hours and 40 minutes before removal. Socket users were protected even while the package was live.
ml-translate-vis
991.9.9
by hellofish
Removed from npm
Blocked by Socket
The script collects sensitive information about the system and sends it to a remote server, which is a clear indication of malicious behavior.
Live on npm for 2 days, 20 hours and 2 minutes before removal. Socket users were protected even while the package was live.
tcms-malicious-package-test-1
1.0.1
by secjson
Live on npm
Blocked by Socket
This code establishes a reverse shell by creating a named pipe at /tmp/p and using netcat (nc) to connect to the external IP address 3[.]14[.]64[.]219 on port 443. It redirects input and output to /bin/sh, allowing the remote execution of arbitrary shell commands from the external server. This behavior allows unauthorized remote access and command execution on the affected system, posing a serious security threat. The code is clearly malicious in intent.
eu-parliment-sdk
1.3.0
Removed from npm
Blocked by Socket
The code exhibits potential security risks due to hard-coded credentials, direct access to sensitive environment variables, and a mix of server-side and client-side storage mechanisms. It should be reviewed and refactored to address these issues. The confidence level for this report is 0.8, and the scores given are: malware: 0, securityRisk: 0.7, obfuscated: 0.
Live on npm for 7 days, 18 hours and 29 minutes before removal. Socket users were protected even while the package was live.
@logistics-frontend/modules
10.0.0
by bughunter.volgactf
Live on npm
Blocked by Socket
The code is highly suspicious as it exfiltrates environment variables to an external domain, indicating potential data theft. The obfuscation further suggests malicious intent.
djanggo
0.0.8
Removed from pypi
Blocked by Socket
The code contains malicious functionality intended to exfiltrate sensitive information from the host system to an external server during the package installation process. This represents a clear case of a supply chain attack aiming to compromise the integrity and confidentiality of systems where this package is installed.
Live on pypi for 3 days, 17 hours and 43 minutes before removal. Socket users were protected even while the package was live.
kakakaakaaa11aaa3
99.1.12
by zajewfchdmognvszic
Removed from npm
Blocked by Socket
The code contains suspicious behavior, such as sending HTTP requests to an external service (webhook.site) and using netcat to send data to a specific IP address and port. This could indicate malicious activity, such as data exfiltration or unauthorized communication. Further investigation is needed to determine the intent and impact.
Live on npm for 54 minutes before removal. Socket users were protected even while the package was live.
gd-apply
6.0.35
by g1nkakuj
Removed from npm
Blocked by Socket
The script collects information like package name, directory, home directory, hostname, username, DNS servers, and package.json contents. It then sends this data to a remote server.
Live on npm for 3 minutes before removal. Socket users were protected even while the package was live.
fluent_plugin-cloudwatch-logs-foxtrot9
0.1.0
Live on gem
Blocked by Socket
Malicious code in fluent_plugin-cloudwatch-logs-foxtrot9 (RubyGems)
tst-atk
1.2.23
by lvarell4
Removed from npm
Blocked by Socket
The code appears to be designed for data exfiltration by executing a system command and sending its output to a potentially malicious external server. The URL format and context of usage raise significant security concerns.
Live on npm for 41 minutes before removal. Socket users were protected even while the package was live.
wordpress-theme-core
0.0.1
by raveki4230
Removed from npm
Blocked by Socket
This script is making a request to an external URL which could potentially be used for data exfiltration or to download malicious payloads. It poses a security risk and should be investigated further.
Live on npm for 16 hours and 9 minutes before removal. Socket users were protected even while the package was live.
mokhal
0.0.7
by plezulqovqjwvf
Removed from npm
Blocked by Socket
The code snippet exhibits behavior that is highly suspicious and risky, downloading and executing files from a remote server without proper validation, posing a significant security risk. The malware and security risk scores of 1 are justified due to the potential for running malicious code without user knowledge.
Live on npm for 6 minutes before removal. Socket users were protected even while the package was live.
fca-horizon-remake
4.0.5
by horizonlucius
Removed from npm
Blocked by Socket
The code shows potentially dangerous behaviors with automatic code updates and external error reporting, which could lead to security vulnerabilities such as remote code execution and sensitive data leakage.
Live on npm for 36 minutes before removal. Socket users were protected even while the package was live.
test7458
0.1.0
Removed from npm
Blocked by Socket
This script exhibits potentially malicious behavior by downloading and executing binaries from an untrusted and hardcoded IP address without any integrity checks. Suppressing output further raises concerns. The exact nature of the binaries is unknown, which makes this a significant security risk.
Live on npm for 9 minutes before removal. Socket users were protected even while the package was live.
relap-widgets
6.9834.0
Removed from npm
Blocked by Socket
The script is designed to exfiltrate sensitive system information to an external server. This behavior is indicative of malicious intent, as it involves unauthorized data transmission. The use of base64 encoding is a form of obfuscation, though not highly sophisticated.
Live on npm for 31 minutes before removal. Socket users were protected even while the package was live.
@smule/client
524.2.8
by neversummer.69
Live on npm
Blocked by Socket
The script collects a wide range of information from the user's system, including OS details, network interfaces, and SSH files, and sends it to a remote server via DNS queries.
horizon_dev
1.0.1
by gme8824
Removed from npm
Blocked by Socket
The script sends detailed system information to an external server without user consent, indicating a high likelihood of malicious intent. The use of base64 encoding suggests an attempt to obfuscate the data.
Live on npm for 14 minutes before removal. Socket users were protected even while the package was live.
usaa-textarea
4.1.0
by w00dr0w
Removed from npm
Blocked by Socket
This script is performing a DNS lookup on the domain 'preinstall.dns.w00dr0w-usaa.com' with the IP address '3.145.70.183'. This could be used to perform a man-in-the-middle attack or execute malicious code. The user should be cautious when executing this script and should review the contents of index.js and run DNS scan on 'preinstall.dns.w00dr0w-usaa.com' to determine its reputation.
popover2
0.11.3
Removed from npm
Blocked by Socket
The script is malicious in nature, as it is designed to exfiltrate sensitive system information to an external server. The use of base64 encoding is a weak attempt to obfuscate the data being sent. The script poses a high security risk due to the potential for data breaches and further attacks.
Live on npm for 35 minutes before removal. Socket users were protected even while the package was live.
alles-apin
0.0.1
Live on pypi
Blocked by Socket
The code is collecting data from HTTP requests and responses and sending it to a hardcoded external IP address. This behavior can be considered malicious if the data includes sensitive information and the endpoint is controlled by a threat actor. The hardcoded IP address and lack of configuration or encryption for the data in transit increase the risk. While the code doesn't show explicit signs of common malware such as reverse shells, it does perform data exfiltration to a suspicious endpoint.
@swenkerorg/esse-odit-ullam
0.0.1-security
Removed from npm
Blocked by Socket
This package was removed from the npm registry for security reasons.
Live on npm for 2 hours before removal. Socket users were protected even while the package was live.
@erboladaiorg/aut-sint
1.0.0
by diepminhb311
Removed from npm
Blocked by Socket
This package was removed from the npm registry for security reasons.
Live on npm for 31 minutes before removal. Socket users were protected even while the package was live.
loaddash
4.17.21
by lucasorint36
Removed from npm
Blocked by Socket
The code collects a significant amount of sensitive system and user information and sends it to a remote server. This behavior is indicative of a high risk of data theft and privacy violations.
Live on npm for 1 hour and 26 minutes before removal. Socket users were protected even while the package was live.
node-winnative
99.9.9
by dependency-test-4
Removed from npm
Blocked by Socket
The script gathers data about the user's system, including package name, current working directory, username, hostname, and IP address. This data is then encoded and sent as DNS queries to a remote server.
Live on npm for 3 days, 12 hours and 31 minutes before removal. Socket users were protected even while the package was live.
Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.
Known malware
Possible typosquat attack
GitHub dependency
AI-detected potential malware
HTTP dependency
Obfuscated code
NPM Shrinkwrap
Suspicious Stars on GitHub
Protestware or potentially unwanted behavior
Unstable ownership
19 more alerts →
Bad dependency semver
Unpopular package
Wildcard dependency
Minified code
Socket optimized override available
Deprecated
Unmaintained
Critical CVE
High CVE
Medium CVE
Low CVE
Explicitly Unlicensed Item
License Policy Violation
Misc. License Issues
No License Found
Non-permissive License
Ambiguous License Classifier
Copyleft License
Unidentified License
License exception
Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.
Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.
Nat Friedman
CEO at GitHub
Congrats to @feross and the hard-working team behind @SocketSecurity on today's launch!
Suz Hinton
Senior Software Engineer at Stripe
heck yes this is awesome!!! Congrats team 🎉👏
Matteo Collina
Node.js maintainer, Fastify lead maintainer
So awesome to see @SocketSecurity launch with a fresh approach! Excited to have supported the team from the early days.
DC Posch
Director of Technology at AppFolio, CTO at Dynasty
This is going to be super important, especially for crypto projects where a compromised dependency results in stolen user assets.
Luis Naranjo
Software Engineer at Microsoft
If software supply chain attacks through npm don't scare the shit out of you, you're not paying close enough attention.
@SocketSecurity sounds like an awesome product. I'll be using socket.dev instead of npmjs.org to browse npm packages going forward
Elena Nadolinski
Founder and CEO at Iron Fish
Huge congrats to @SocketSecurity! 🙌
Literally the only product that proactively detects signs of JS compromised packages.
Joe Previte
Engineering Team Lead at Coder
Congrats to @feross and the @SocketSecurity team on their seed funding! 🚀 It's been a big help for us at @CoderHQ and we appreciate what y'all are doing!
Josh Goldberg
Staff Developer at Codecademy
This is such a great idea & looks fantastic, congrats & good luck @feross + team!
The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.
Yan Zhu
Head of Security at Brave, DEFCON, EFF, W3C
glad to hear some of the smartest people i know are working on (npm, etc.) supply chain security finally :). @SocketSecurity
Andrew Peterson
CEO and Co-Founder at Signal Sciences (acq. Fastly)
How do you track the validity of open source software libraries as they get updated? You're prob not. Check out @SocketSecurity and the updated tooling they launched.
Supply chain is a cluster in security as we all know and the tools from Socket are "duh" type tools to be implementing.
Zbyszek Tenerowicz
Senior Security Engineer at ConsenSys
socket.dev is getting more appealing by the hour
Devdatta Akhawe
Head of Security at Figma
The @SocketSecurity team is on fire! Amazing progress and I am exciting to see where they go next.
Ryan Noon
Founder & CEO at Material Security
The NPM ecosystem is a horrible horrible place and I'm glad you're doing something about it.
Sebastian Bensusan
Engineer Manager at Stripe
I find it surprising that we don't have _more_ supply chain attacks in software:
Imagine your airplane (the code running) was assembled (deployed) daily, with parts (dependencies) from internet strangers. How long until you get a bad part?
Excited for Socket to prevent this
Adam Baldwin
VP of Security at npm, Red Team at Auth0/Okta
Congrats to everyone at @SocketSecurity ❤️🤘🏻
Nico Waisman
CISO at Lyft
This is an area that I have personally been very focused on. As Nat Friedman said in the 2019 GitHub Universe keynote, Open Source won, and every time you add a new open source project you rely on someone else's code and you rely on the people that build it.
This is both exciting and problematic. You are bringing real risk into your organization, and I'm excited to see progress in the industry from OpenSSF scorecards and package analyzers to the company that Feross Aboukhadijeh is building!
Depend on Socket to prevent malicious open source dependencies from infiltrating your app.
Install the Socket GitHub App in just 2 clicks and get protected today.
Block 70+ issues in open source code, including malware, typo-squatting, hidden code, misleading packages, permission creep, and more.
Reduce work by surfacing actionable security information directly in GitHub. Empower developers to make better decisions.
Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.
Dec 14, 2023
Hijacked cryptocurrency library adds malware
Widely-used library in cryptocurrency frontend was compromised to include wallet-draining code, following the hijacking of NPM account credentials via phishing.
Jan 06, 2022
Maintainer intentionally adds malware
Rogue maintainer sabotages his own open source package with 100M downloads/month, notably breaking Amazon's AWS SDK.
Nov 15, 2021
npm discovers a platform vulnerability allowing unauthorized publishing of any package
Attackers could publish new versions of any npm package without authorization for multiple years.
Oct 22, 2021
Hijacked package adds cryptominers and password-stealing malware
Multiple packages with 30M downloads/month are hijacked and publish malicious versions directly into the software supply chain.
Nov 26, 2018
Package hijacked adding organization specific backdoors
Obfuscated malware added to a dependency which targeted a single company, went undetected for over a week, and made it into their production build.
Get our latest security research, open source insights, and product updates.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.