
Security News
The Changelog Podcast: Practical Steps to Stay Safe on npm
Learn the essential steps every developer should take to stay secure on npm and reduce exposure to supply chain attacks.
Quickly evaluate the security and health of any open source package.
mlladklbipjfnjgjjbkofonboojklnpo
2.19.22
Live on Chrome
Blocked by Socket
This Chrome extension is part of a large-scale commercial spam-automation campaign; while not classic malware, it functions as policy-abuse infrastructure that violates Chrome Web Store spam policies and WhatsApp anti-spam rules, enables bulk sending and scheduling via WhatsApp MAIN-world hooks, and exfiltrates media off-device despite marketing that minimizes or misrepresents these behaviors.
johnsnowlabs-by-ckl
5.1.8rc10
Live on PyPI
Blocked by Socket
This module is a high-risk utility because it fetches Python code from remote URLs and local markdown files and executes that code directly via execute_py_script_string_as_new_proc without validation or sandboxing. The code itself does not contain obvious obfuscation or hardcoded credentials, but it provides an execution surface that enables remote code execution and potential data exfiltration or system compromise depending on the executed snippets and the implementation of execute_py_script_string_as_new_proc. Treat calls that use remote URLs or untrusted markdown as dangerous. Use only with trusted content or add validation/sandboxing (e.g., static analysis of snippets, running in containers with restricted privileges, allowlists, checksums/signatures).
builtin-pages-lib
5.0.2
by thecyberanon
Removed from npm
Blocked by Socket
The code is intended for malicious use, specifically designed to secretly collect and transmit sensitive system information to an external entity. This could be part of a reconnaissance step in a larger attack or a standalone information-gathering script.
Live on npm for 27 minutes before removal. Socket users were protected even while the package was live.
fca-anya-remake
9.4.0
by anyaofficial
Removed from npm
Blocked by Socket
This code is highly suspicious and should not be used without further investigation. The code is heavily obfuscated and could potentially contain malicious code. The purpose of the code is unclear and further investigation is necessary to determine its exact behavior.
Live on npm for 6 minutes before removal. Socket users were protected even while the package was live.
chatgpt-scraper
1.0.0
by vihangayt_npm
Live on npm
Blocked by Socket
The code is heavily obfuscated and uses dynamic code execution and network communication with obfuscated endpoints, which are strong indicators of potentially malicious behavior or backdoor functionality. The lack of meaningful existing reports and the presence of suspicious constructs justify treating this package as high risk and potentially malicious. Further in-depth analysis and deobfuscation are necessary to confirm its intent and impact.
sbcli-dev
10.1.13
Live on PyPI
Blocked by Socket
This module implements privileged node and device management and exposes HTTP endpoints that accept user input used directly in shell commands and Docker operations. Main risks: command injection (unsanitized string interpolation into shell commands and os.popen), destructive device operations (partitioning, bind/unbind), supplying arbitrary images to be pulled and run as privileged containers, and use of an unencrypted/unprotected Docker TCP socket (tcp://...:2375). I assess this as not manifestly malware but a high-risk administrative component that must be strictly access-controlled and hardened (validate/sanitize inputs, avoid passing raw user values into shell/Docker operations, use secure Docker API access, avoid exposing endpoints publicly).
usaa-textarea
4.1.0
by w00dr0w
Removed from npm
Blocked by Socket
This script is performing a DNS lookup on the domain 'preinstall.dns.w00dr0w-usaa.com' with the IP address '3.145.70.183'. This could be used to perform a man-in-the-middle attack or execute malicious code. The user should be cautious when executing this script and should review the contents of index.js and run DNS scan on 'preinstall.dns.w00dr0w-usaa.com' to determine its reputation.
sbcli-new
1.1.6
Live on PyPI
Blocked by Socket
This module is not overtly malicious (no encoded payloads, no external exfiltration, no reverse shell), but it contains high-risk insecure patterns: user-controlled values are directly interpolated into shell command strings and passed to node_utils.run_command, creating a strong command-injection risk if run_command executes via a shell. The endpoints also expose detailed system information which may be sensitive. Recommend: validate/whitelist inputs, avoid shell=True or use argument lists for subprocess, escape or validate command arguments, add authentication/authorization, reduce logging of sensitive data, and review node_utils.run_command implementation. Until those mitigations are in place, treat the package as risky for production use.
feed-testing-utils
1.1.0
by jpdhackerone03
Live on npm
Blocked by Socket
The source code exhibits behavior consistent with data exfiltration malware. It collects sensitive system information and sends it to external endpoints without user consent, posing a significant security risk.
airbnb-dev
99.9.0
by jpdtest1
Removed from npm
Blocked by Socket
The code is designed to collect and transmit system information to external endpoints without user consent, which is indicative of malicious behavior. The hardcoded endpoints and the nature of the data being sent pose a significant security risk.
Live on npm for 14 hours and 58 minutes before removal. Socket users were protected even while the package was live.
agiilkigodfhimkdcjgbjdlajpjdhaig
1.3
Live on Chrome
Blocked by Socket
The code is highly suspicious and potentially malicious, with a high probability of containing hidden or obfuscated functionality designed to evade detection or analysis. It is not recommended to use or execute this code without further analysis and verification of its safety and legitimacy.
mtmai
0.3.1447
Live on PyPI
Blocked by Socket
This module is an automation/scraping worker that intentionally executes code provided by task descriptions. That design requires trusting the task source. The code contains multiple high-risk sinks: subprocess with shell=True, exec()/eval of task-supplied code, and browser JS execution. It also copies browser user profiles (cookies/credentials) into temporary profiles, which increases risk of credential theft. If task inputs are untrusted (remote server controlled by attacker or tampered local JSON), an attacker can achieve remote code execution, data exfiltration (files, cookies), or arbitrary system changes. Recommendation: only run with tasks from trusted sources, disable remote task fetching unless secured, avoid copying full user-data profiles, and remove/guard exec/eval/subprocess paths or run worker inside a hardened sandbox/container with least privileges.
healenium
1.0.1
by aagiubkagf
Removed from npm
Blocked by Socket
The code connects to a hardcoded IP address (47[.]251[.]102[.]182) on port 8057 without user consent. It sends system information, including OS type and architecture, to this remote server. The code listens for commands from the server and executes them locally using the `exec()` function, which can lead to arbitrary code execution. Additionally, it can receive files from the server and write them to the local filesystem, potentially introducing malicious files. It includes a scheduled task that collects and sends user information at a specific date and time. These behaviors represent unauthorized remote control and data exfiltration, posing significant security risks.
Live on npm for 22 days, 3 hours and 3 minutes before removal. Socket users were protected even while the package was live.
gulp-mix-keywords
1.0.3
by blackmao
Live on npm
Blocked by Socket
This is malicious software designed for supply chain attacks. It connects to a suspicious private IP to fetch obfuscation instructions and dynamically modifies code during build processes. The obfuscation mechanism can hide malicious functionality or inject backdoors. This represents an extremely high security risk and should not be used.
frankyu
202504029.1
Live on PyPI
Blocked by Socket
This module contains a high-risk, privacy-invasive function (jietu2mail) that captures the entire virtual desktop, saves it to a public path, and sends it via the user's Outlook account to hardcoded external email addresses. That capability constitutes a direct data-exfiltration backdoor. Other functions (os.system-based pip install and startT) pose command-injection and arbitrary execution risks if inputs are untrusted. Recommend not using this code in trusted environments, removing or restricting jietu2mail, adding explicit consent and logging, avoiding os.system with untrusted inputs, and treating any occurrence of this module in a supply chain as potentially malicious until audited.
anrk
0.1.1
Live on PyPI
Blocked by Socket
This module behaves as a dropper: it fetches an executable from a remote hardcoded URL and executes it in a user-writable profile directory without validation or user interaction. This is consistent with malicious delivery techniques and represents a high security risk. Treat the code as hostile until proven otherwise. Do not run it on trusted systems; remove or quarantine the code and investigate upstream provenance and the referenced URL.
ecofkipcicjifkppbgnkaghcfofmpkia
2.6.6
Live on Chrome
Blocked by Socket
The fragment implements covert data collection and exfiltration. It intercepts targeted network responses and forwards the captured data via a cross-context messaging bridge to an external consumer. The combination of endpoint-bound data capture, a namespace/instanceId-based messaging protocol, and lack of explicit user consent signals a high risk of privacy invasion and supply-chain misuse when embedded in open-source code. Thorough auditing and removal or strict scoping is recommended before use in any production or widely distributed package.
cbdev2024test
15.0.0
by cbdev2024
Removed from npm
Blocked by Socket
The script sends data to an external URL, which is a significant security risk, and then runs a local script that may contain harmful behavior. This raises serious concerns about data exfiltration and untrusted code execution.
Live on npm for 28 minutes before removal. Socket users were protected even while the package was live.
runbooks
0.9.2
Removed from PyPI
Blocked by Socket
This file is a legitimate-looking destructive cleanup script for removing AWS Landing Zone resources across an AWS Organization. It contains no signs of data-exfiltration, obfuscation, or third-party command-and-control. However, it performs many high-impact destructive AWS operations (deleting stacks, buckets, StackSets, moving accounts, deleting OUs, etc.) and thus is extremely dangerous to run with privileged credentials. Treat as a destructive tool: do not run in production unless you intend to irreversibly remove the listed resources and have backups/approval.
Live on PyPI for 9 days, 12 hours and 13 minutes before removal. Socket users were protected even while the package was live.
cdanjbjbcljfjkbmfcpljdjhcfkfamgg
2.2.1
Live on Chrome
Blocked by Socket
This Chrome extension’s background script defines a capture() function that invokes chrome.tabs.captureVisibleTab to take a PNG screenshot of the user’s currently visible tab. The screenshot is then passed to a function named sendProviderDealsMismatchBE, which transmits the image data to an external backend service. No user prompt, consent dialogue, or indication in the UI discloses this behavior. Because it silently collects potentially sensitive screen content (passwords, personal or financial information) and sends it off-device, this constitutes covert data exfiltration and a clear privacy-violating malware capability.
ljbdocmmfpejofpcldginbilddlifjek
2.97.11
Live on Chrome
Blocked by Socket
This code implements an automated mass-messaging/spam tool integrated into a client page/extension. It programmatically scrapes recipients, constructs personalized messages, automates sending (including captcha solving), and reports usage/telemetry to external domains (notably ukrainiangirls.pw). It asks the user for captcha service API keys (which it stores) and accepts captcha keys via postMessage. The behavior is abusive (spam) and leaks activity metadata externally; it should be considered malicious for most legitimate uses. Remove or block this script/extension unless you explicitly want this automated spam functionality and trust the external telemetry domains.
kfsd
0.0.106
Live on PyPI
Blocked by Socket
This module contains a critical vulnerability: unconstrained eval() of attacker-controlled 'input.expr' with access to local variables (including a formatted request object). This yields remote code execution and potential data exfiltration. The code likely represents an insecure design/bug rather than intentionally malicious code, but it must be remediated before handling untrusted inputs. Also fix the apparent syntax error in getAttr.
sbcli-dev
6.0.5
Live on PyPI
Blocked by Socket
This module implements privileged node and device management and exposes HTTP endpoints that accept user input used directly in shell commands and Docker operations. Main risks: command injection (unsanitized string interpolation into shell commands and os.popen), destructive device operations (partitioning, bind/unbind), supplying arbitrary images to be pulled and run as privileged containers, and use of an unencrypted/unprotected Docker TCP socket (tcp://...:2375). I assess this as not manifestly malware but a high-risk administrative component that must be strictly access-controlled and hardened (validate/sanitize inputs, avoid passing raw user values into shell/Docker operations, use secure Docker API access, avoid exposing endpoints publicly).
ryry-cli
2.67
Removed from PyPI
Blocked by Socket
The code contains risky operations that can enable supply-chain attacks and remote code execution: it downloads remote zip packages and extracts them without validation, and runs pip install/uninstall via shell subprocesses with unverified inputs. It also leaks host identification to an external notify endpoint. There is no evidence of deliberately hidden malware in this fragment (no obfuscation, no hardcoded credentials or reverse shell code), but the behavior (automatic fetching and installing of packages from remote URLs without integrity checks) presents a significant security risk. Recommend treating remote package sources as untrusted, adding integrity checks (hash/signature verification), avoiding shell=True, sanitizing zip entries before extraction, and limiting or requiring user confirmation for installs.
Live on PyPI for 12 hours and 2 minutes before removal. Socket users were protected even while the package was live.
mtmai
0.3.911
Live on PyPI
Blocked by Socket
This module is an automation/scraping worker that intentionally executes code provided by task descriptions. That design requires trusting the task source. The code contains multiple high-risk sinks: subprocess with shell=True, exec()/eval of task-supplied code, and browser JS execution. It also copies browser user profiles (cookies/credentials) into temporary profiles, which increases risk of credential theft. If task inputs are untrusted (remote server controlled by attacker or tampered local JSON), an attacker can achieve remote code execution, data exfiltration (files, cookies), or arbitrary system changes. Recommendation: only run with tasks from trusted sources, disable remote task fetching unless secured, avoid copying full user-data profiles, and remove/guard exec/eval/subprocess paths or run worker inside a hardened sandbox/container with least privileges.
mlladklbipjfnjgjjbkofonboojklnpo
2.19.22
Live on Chrome
Blocked by Socket
This Chrome extension is part of a large-scale commercial spam-automation campaign; while not classic malware, it functions as policy-abuse infrastructure that violates Chrome Web Store spam policies and WhatsApp anti-spam rules, enables bulk sending and scheduling via WhatsApp MAIN-world hooks, and exfiltrates media off-device despite marketing that minimizes or misrepresents these behaviors.
johnsnowlabs-by-ckl
5.1.8rc10
Live on PyPI
Blocked by Socket
This module is a high-risk utility because it fetches Python code from remote URLs and local markdown files and executes that code directly via execute_py_script_string_as_new_proc without validation or sandboxing. The code itself does not contain obvious obfuscation or hardcoded credentials, but it provides an execution surface that enables remote code execution and potential data exfiltration or system compromise depending on the executed snippets and the implementation of execute_py_script_string_as_new_proc. Treat calls that use remote URLs or untrusted markdown as dangerous. Use only with trusted content or add validation/sandboxing (e.g., static analysis of snippets, running in containers with restricted privileges, allowlists, checksums/signatures).
builtin-pages-lib
5.0.2
by thecyberanon
Removed from npm
Blocked by Socket
The code is intended for malicious use, specifically designed to secretly collect and transmit sensitive system information to an external entity. This could be part of a reconnaissance step in a larger attack or a standalone information-gathering script.
Live on npm for 27 minutes before removal. Socket users were protected even while the package was live.
fca-anya-remake
9.4.0
by anyaofficial
Removed from npm
Blocked by Socket
This code is highly suspicious and should not be used without further investigation. The code is heavily obfuscated and could potentially contain malicious code. The purpose of the code is unclear and further investigation is necessary to determine its exact behavior.
Live on npm for 6 minutes before removal. Socket users were protected even while the package was live.
chatgpt-scraper
1.0.0
by vihangayt_npm
Live on npm
Blocked by Socket
The code is heavily obfuscated and uses dynamic code execution and network communication with obfuscated endpoints, which are strong indicators of potentially malicious behavior or backdoor functionality. The lack of meaningful existing reports and the presence of suspicious constructs justify treating this package as high risk and potentially malicious. Further in-depth analysis and deobfuscation are necessary to confirm its intent and impact.
sbcli-dev
10.1.13
Live on PyPI
Blocked by Socket
This module implements privileged node and device management and exposes HTTP endpoints that accept user input used directly in shell commands and Docker operations. Main risks: command injection (unsanitized string interpolation into shell commands and os.popen), destructive device operations (partitioning, bind/unbind), supplying arbitrary images to be pulled and run as privileged containers, and use of an unencrypted/unprotected Docker TCP socket (tcp://...:2375). I assess this as not manifestly malware but a high-risk administrative component that must be strictly access-controlled and hardened (validate/sanitize inputs, avoid passing raw user values into shell/Docker operations, use secure Docker API access, avoid exposing endpoints publicly).
usaa-textarea
4.1.0
by w00dr0w
Removed from npm
Blocked by Socket
This script is performing a DNS lookup on the domain 'preinstall.dns.w00dr0w-usaa.com' with the IP address '3.145.70.183'. This could be used to perform a man-in-the-middle attack or execute malicious code. The user should be cautious when executing this script and should review the contents of index.js and run DNS scan on 'preinstall.dns.w00dr0w-usaa.com' to determine its reputation.
sbcli-new
1.1.6
Live on PyPI
Blocked by Socket
This module is not overtly malicious (no encoded payloads, no external exfiltration, no reverse shell), but it contains high-risk insecure patterns: user-controlled values are directly interpolated into shell command strings and passed to node_utils.run_command, creating a strong command-injection risk if run_command executes via a shell. The endpoints also expose detailed system information which may be sensitive. Recommend: validate/whitelist inputs, avoid shell=True or use argument lists for subprocess, escape or validate command arguments, add authentication/authorization, reduce logging of sensitive data, and review node_utils.run_command implementation. Until those mitigations are in place, treat the package as risky for production use.
feed-testing-utils
1.1.0
by jpdhackerone03
Live on npm
Blocked by Socket
The source code exhibits behavior consistent with data exfiltration malware. It collects sensitive system information and sends it to external endpoints without user consent, posing a significant security risk.
airbnb-dev
99.9.0
by jpdtest1
Removed from npm
Blocked by Socket
The code is designed to collect and transmit system information to external endpoints without user consent, which is indicative of malicious behavior. The hardcoded endpoints and the nature of the data being sent pose a significant security risk.
Live on npm for 14 hours and 58 minutes before removal. Socket users were protected even while the package was live.
agiilkigodfhimkdcjgbjdlajpjdhaig
1.3
Live on Chrome
Blocked by Socket
The code is highly suspicious and potentially malicious, with a high probability of containing hidden or obfuscated functionality designed to evade detection or analysis. It is not recommended to use or execute this code without further analysis and verification of its safety and legitimacy.
mtmai
0.3.1447
Live on PyPI
Blocked by Socket
This module is an automation/scraping worker that intentionally executes code provided by task descriptions. That design requires trusting the task source. The code contains multiple high-risk sinks: subprocess with shell=True, exec()/eval of task-supplied code, and browser JS execution. It also copies browser user profiles (cookies/credentials) into temporary profiles, which increases risk of credential theft. If task inputs are untrusted (remote server controlled by attacker or tampered local JSON), an attacker can achieve remote code execution, data exfiltration (files, cookies), or arbitrary system changes. Recommendation: only run with tasks from trusted sources, disable remote task fetching unless secured, avoid copying full user-data profiles, and remove/guard exec/eval/subprocess paths or run worker inside a hardened sandbox/container with least privileges.
healenium
1.0.1
by aagiubkagf
Removed from npm
Blocked by Socket
The code connects to a hardcoded IP address (47[.]251[.]102[.]182) on port 8057 without user consent. It sends system information, including OS type and architecture, to this remote server. The code listens for commands from the server and executes them locally using the `exec()` function, which can lead to arbitrary code execution. Additionally, it can receive files from the server and write them to the local filesystem, potentially introducing malicious files. It includes a scheduled task that collects and sends user information at a specific date and time. These behaviors represent unauthorized remote control and data exfiltration, posing significant security risks.
Live on npm for 22 days, 3 hours and 3 minutes before removal. Socket users were protected even while the package was live.
gulp-mix-keywords
1.0.3
by blackmao
Live on npm
Blocked by Socket
This is malicious software designed for supply chain attacks. It connects to a suspicious private IP to fetch obfuscation instructions and dynamically modifies code during build processes. The obfuscation mechanism can hide malicious functionality or inject backdoors. This represents an extremely high security risk and should not be used.
frankyu
202504029.1
Live on PyPI
Blocked by Socket
This module contains a high-risk, privacy-invasive function (jietu2mail) that captures the entire virtual desktop, saves it to a public path, and sends it via the user's Outlook account to hardcoded external email addresses. That capability constitutes a direct data-exfiltration backdoor. Other functions (os.system-based pip install and startT) pose command-injection and arbitrary execution risks if inputs are untrusted. Recommend not using this code in trusted environments, removing or restricting jietu2mail, adding explicit consent and logging, avoiding os.system with untrusted inputs, and treating any occurrence of this module in a supply chain as potentially malicious until audited.
anrk
0.1.1
Live on PyPI
Blocked by Socket
This module behaves as a dropper: it fetches an executable from a remote hardcoded URL and executes it in a user-writable profile directory without validation or user interaction. This is consistent with malicious delivery techniques and represents a high security risk. Treat the code as hostile until proven otherwise. Do not run it on trusted systems; remove or quarantine the code and investigate upstream provenance and the referenced URL.
ecofkipcicjifkppbgnkaghcfofmpkia
2.6.6
Live on Chrome
Blocked by Socket
The fragment implements covert data collection and exfiltration. It intercepts targeted network responses and forwards the captured data via a cross-context messaging bridge to an external consumer. The combination of endpoint-bound data capture, a namespace/instanceId-based messaging protocol, and lack of explicit user consent signals a high risk of privacy invasion and supply-chain misuse when embedded in open-source code. Thorough auditing and removal or strict scoping is recommended before use in any production or widely distributed package.
cbdev2024test
15.0.0
by cbdev2024
Removed from npm
Blocked by Socket
The script sends data to an external URL, which is a significant security risk, and then runs a local script that may contain harmful behavior. This raises serious concerns about data exfiltration and untrusted code execution.
Live on npm for 28 minutes before removal. Socket users were protected even while the package was live.
runbooks
0.9.2
Removed from PyPI
Blocked by Socket
This file is a legitimate-looking destructive cleanup script for removing AWS Landing Zone resources across an AWS Organization. It contains no signs of data-exfiltration, obfuscation, or third-party command-and-control. However, it performs many high-impact destructive AWS operations (deleting stacks, buckets, StackSets, moving accounts, deleting OUs, etc.) and thus is extremely dangerous to run with privileged credentials. Treat as a destructive tool: do not run in production unless you intend to irreversibly remove the listed resources and have backups/approval.
Live on PyPI for 9 days, 12 hours and 13 minutes before removal. Socket users were protected even while the package was live.
cdanjbjbcljfjkbmfcpljdjhcfkfamgg
2.2.1
Live on Chrome
Blocked by Socket
This Chrome extension’s background script defines a capture() function that invokes chrome.tabs.captureVisibleTab to take a PNG screenshot of the user’s currently visible tab. The screenshot is then passed to a function named sendProviderDealsMismatchBE, which transmits the image data to an external backend service. No user prompt, consent dialogue, or indication in the UI discloses this behavior. Because it silently collects potentially sensitive screen content (passwords, personal or financial information) and sends it off-device, this constitutes covert data exfiltration and a clear privacy-violating malware capability.
ljbdocmmfpejofpcldginbilddlifjek
2.97.11
Live on Chrome
Blocked by Socket
This code implements an automated mass-messaging/spam tool integrated into a client page/extension. It programmatically scrapes recipients, constructs personalized messages, automates sending (including captcha solving), and reports usage/telemetry to external domains (notably ukrainiangirls.pw). It asks the user for captcha service API keys (which it stores) and accepts captcha keys via postMessage. The behavior is abusive (spam) and leaks activity metadata externally; it should be considered malicious for most legitimate uses. Remove or block this script/extension unless you explicitly want this automated spam functionality and trust the external telemetry domains.
kfsd
0.0.106
Live on PyPI
Blocked by Socket
This module contains a critical vulnerability: unconstrained eval() of attacker-controlled 'input.expr' with access to local variables (including a formatted request object). This yields remote code execution and potential data exfiltration. The code likely represents an insecure design/bug rather than intentionally malicious code, but it must be remediated before handling untrusted inputs. Also fix the apparent syntax error in getAttr.
sbcli-dev
6.0.5
Live on PyPI
Blocked by Socket
This module implements privileged node and device management and exposes HTTP endpoints that accept user input used directly in shell commands and Docker operations. Main risks: command injection (unsanitized string interpolation into shell commands and os.popen), destructive device operations (partitioning, bind/unbind), supplying arbitrary images to be pulled and run as privileged containers, and use of an unencrypted/unprotected Docker TCP socket (tcp://...:2375). I assess this as not manifestly malware but a high-risk administrative component that must be strictly access-controlled and hardened (validate/sanitize inputs, avoid passing raw user values into shell/Docker operations, use secure Docker API access, avoid exposing endpoints publicly).
ryry-cli
2.67
Removed from PyPI
Blocked by Socket
The code contains risky operations that can enable supply-chain attacks and remote code execution: it downloads remote zip packages and extracts them without validation, and runs pip install/uninstall via shell subprocesses with unverified inputs. It also leaks host identification to an external notify endpoint. There is no evidence of deliberately hidden malware in this fragment (no obfuscation, no hardcoded credentials or reverse shell code), but the behavior (automatic fetching and installing of packages from remote URLs without integrity checks) presents a significant security risk. Recommend treating remote package sources as untrusted, adding integrity checks (hash/signature verification), avoiding shell=True, sanitizing zip entries before extraction, and limiting or requiring user confirmation for installs.
Live on PyPI for 12 hours and 2 minutes before removal. Socket users were protected even while the package was live.
mtmai
0.3.911
Live on PyPI
Blocked by Socket
This module is an automation/scraping worker that intentionally executes code provided by task descriptions. That design requires trusting the task source. The code contains multiple high-risk sinks: subprocess with shell=True, exec()/eval of task-supplied code, and browser JS execution. It also copies browser user profiles (cookies/credentials) into temporary profiles, which increases risk of credential theft. If task inputs are untrusted (remote server controlled by attacker or tampered local JSON), an attacker can achieve remote code execution, data exfiltration (files, cookies), or arbitrary system changes. Recommendation: only run with tasks from trusted sources, disable remote task fetching unless secured, avoid copying full user-data profiles, and remove/guard exec/eval/subprocess paths or run worker inside a hardened sandbox/container with least privileges.
Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.
Possible typosquat attack
GitHub Actions: GitHub context variable flows to dangerous sink
Known malware
Unstable ownership
GitHub Actions: Input argument flows to dangerous sink
GitHub Actions: Environment variable flows to dangerous sink
Git dependency
GitHub dependency
AI-detected potential malware
HTTP dependency
Critical CVE
High CVE
Medium CVE
Low CVE
Unpopular package
Minified code
Bad dependency semver
Wildcard dependency
Socket optimized override available
Deprecated
Unmaintained
Explicitly Unlicensed Item
License Policy Violation
Misc. License Issues
Ambiguous License Classifier
Copyleft License
License exception
No License Found
Non-permissive License
Unidentified License
Generic alert
Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.
Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Nat Friedman
CEO at GitHub

Suz Hinton
Senior Software Engineer at Stripe
heck yes this is awesome!!! Congrats team 🎉👏

Matteo Collina
Node.js maintainer, Fastify lead maintainer
So awesome to see @SocketSecurity launch with a fresh approach! Excited to have supported the team from the early days.

DC Posch
Director of Technology at AppFolio, CTO at Dynasty
This is going to be super important, especially for crypto projects where a compromised dependency results in stolen user assets.

Luis Naranjo
Software Engineer at Microsoft
If software supply chain attacks through npm don't scare the shit out of you, you're not paying close enough attention.
@SocketSecurity sounds like an awesome product. I'll be using socket.dev instead of npmjs.org to browse npm packages going forward

Elena Nadolinski
Founder and CEO at Iron Fish
Huge congrats to @SocketSecurity! 🙌
Literally the only product that proactively detects signs of JS compromised packages.

Joe Previte
Engineering Team Lead at Coder
Congrats to @feross and the @SocketSecurity team on their seed funding! 🚀 It's been a big help for us at @CoderHQ and we appreciate what y'all are doing!

Josh Goldberg
Staff Developer at Codecademy
This is such a great idea & looks fantastic, congrats & good luck @feross + team!
The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Scott Roberts
CISO at UiPath
As a happy Socket customer, I've been impressed with how quickly they are adding value to the product, this move is a great step!

Yan Zhu
Head of Security at Brave, DEFCON, EFF, W3C
glad to hear some of the smartest people i know are working on (npm, etc.) supply chain security finally :). @SocketSecurity

Andrew Peterson
CEO and Co-Founder at Signal Sciences (acq. Fastly)
How do you track the validity of open source software libraries as they get updated? You're prob not. Check out @SocketSecurity and the updated tooling they launched.
Supply chain is a cluster in security as we all know and the tools from Socket are "duh" type tools to be implementing. Check them out and follow Feross Aboukhadijeh to see more updates coming from them in the future.

Zbyszek Tenerowicz
Senior Security Engineer at ConsenSys
socket.dev is getting more appealing by the hour

Devdatta Akhawe
Head of Security at Figma
The @SocketSecurity team is on fire! Amazing progress and I am exciting to see where they go next.

Sebastian Bensusan
Engineer Manager at Stripe
I find it surprising that we don't have _more_ supply chain attacks in software:
Imagine your airplane (the code running) was assembled (deployed) daily, with parts (dependencies) from internet strangers. How long until you get a bad part?
Excited for Socket to prevent this

Adam Baldwin
VP of Security at npm, Red Team at Auth0/Okta
Congrats to everyone at @SocketSecurity ❤️🤘🏻

Nico Waisman
CISO at Lyft
This is an area that I have personally been very focused on. As Nat Friedman said in the 2019 GitHub Universe keynote, Open Source won, and every time you add a new open source project you rely on someone else code and you rely on the people that build it.
This is both exciting and problematic. You are bringing real risk into your organization, and I'm excited to see progress in the industry from OpenSSF scorecards and package analyzers to the company that Feross Aboukhadijeh is building!
Depend on Socket to prevent malicious open source dependencies from infiltrating your app.
Install the Socket GitHub App in just 2 clicks and get protected today.
Block 70+ issues in open source code, including malware, typo-squatting, hidden code, misleading packages, permission creep, and more.
Reduce work by surfacing actionable security information directly in GitHub. Empower developers to make better decisions.
Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.
Dec 14, 2023
Hijacked cryptocurrency library adds malware
Widely-used library in cryptocurrency frontend was compromised to include wallet-draining code, following the hijacking of NPM account credentials via phishing.
Jan 06, 2022
Maintainer intentionally adds malware
Rogue maintainer sabotages his own open source package with 100M downloads/month, notably breaking Amazon's AWS SDK.
Nov 15, 2021
npm discovers a platform vulnerability allowing unauthorized publishing of any package
Attackers could publish new versions of any npm package without authorization for multiple years.
Oct 22, 2021
Hijacked package adds cryptominers and password-stealing malware
Multiple packages with 30M downloads/month are hijacked and publish malicious versions directly into the software supply chain.
Nov 26, 2018
Package hijacked adding organization specific backdoors
Obfuscated malware added to a dependency which targeted a single company, went undetected for over a week, and made it into their production build.
Get our latest security research, open source insights, and product updates.

Security News
Learn the essential steps every developer should take to stay secure on npm and reduce exposure to supply chain attacks.

Security News
Experts push back on new claims about AI-driven ransomware, warning that hype and sponsored research are distorting how the threat is understood.

Security News
Ruby's creator Matz assumes control of RubyGems and Bundler repositories while former maintainers agree to step back and transfer all rights to end the dispute.