Security News
Input Validation Vulnerabilities Dominate MITRE's 2024 CWE Top 25 List
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Quickly evaluate the security and health of any open source package.
@zitterorg/laudantium-rerum
2.2.18
by loandinhb931
Live on npm
Blocked by Socket
Malicious code in @zitterorg/laudantium-rerum (npm) Source: ghsa-malware (e45ff91dd83cc149d7abc8c6fb2c74e3509aa341e23c72cfac0a34868a4e2637) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
@zitterorg/laudantium-rerum
2.1.9
by loandinhb931
Live on npm
Blocked by Socket
Malicious code in @zitterorg/laudantium-rerum (npm) Source: ghsa-malware (e45ff91dd83cc149d7abc8c6fb2c74e3509aa341e23c72cfac0a34868a4e2637) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
stars-colors
1.4.0
by kakauandkozune
Removed from npm
Blocked by Socket
The code is highly obfuscated and contains elements that suggest potential malicious activity, such as data exfiltration and command execution. Further analysis is needed to confirm its intent.
Live on npm for 21 minutes before removal. Socket users were protected even while the package was live.
@zitterorg/laudantium-rerum
2.1.17
by loandinhb931
Live on npm
Blocked by Socket
Malicious code in @zitterorg/laudantium-rerum (npm) Source: ghsa-malware (e45ff91dd83cc149d7abc8c6fb2c74e3509aa341e23c72cfac0a34868a4e2637) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
comcast.github.io
210.2.1
by mansih_singhsss
Live on npm
Blocked by Socket
This file contains code that establishes a reverse shell to a specified IP address and port using netcat ('nc'). It imports the 'exec' function from the 'child_process' module, defines a command to connect to the IP address '192.168.98.136' on port '4444', and executes it. This reverse shell allows unauthorized remote access and control over the system, posing a significant security risk.
kasms
1.0.153
by psych0124
Removed from npm
Blocked by Socket
The code takes a base64 encoded string, decodes it, and evaluates it using the 'eval' function. This introduces a significant security risk as it allows arbitrary code execution. The code should be considered dangerous and should not be used.
Live on npm for 49 minutes before removal. Socket users were protected even while the package was live.
botprotect-v13
13.0.0
by orozderetour
Removed from npm
Blocked by Socket
This package was removed from the npm registry for security reasons.
Live on npm for 45 minutes before removal. Socket users were protected even while the package was live.
@zitterorg/laudantium-rerum
3.4.46
by loandinhb931
Live on npm
Blocked by Socket
Malicious code in @zitterorg/laudantium-rerum (npm) Source: ghsa-malware (e45ff91dd83cc149d7abc8c6fb2c74e3509aa341e23c72cfac0a34868a4e2637) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
jessa-vue-components
5.3.1563
Removed from npm
Blocked by Socket
The code is likely malicious, as it collects and transmits system information to an external domain using obfuscation techniques. This behavior indicates potential data exfiltration.
Live on npm for 26 minutes before removal. Socket users were protected even while the package was live.
anymacth
3.1.2
by nsrvmzuq
Removed from npm
Blocked by Socket
The code is dangerous and should not be used. The file downloaded from the external source should be verified and validated before being executed, and errors and exceptions should be handled properly.
Live on npm for 2 minutes before removal. Socket users were protected even while the package was live.
mkt-worker-loader
6.5.8
by taka14176
Live on npm
Blocked by Socket
The code exhibits malicious behavior by collecting and transmitting sensitive system information to an external server without user consent. This poses a high security risk and potential for data theft.
rocket-balcony-fxb605-project
1.0.0
by afifcapcut112
Removed from npm
Blocked by Socket
The code imports several modules with unusual names and uses their functame() method without revealing what these methods do, which can be suspicious. The createSentence function itself does not pose a threat. However, the reliance on these non-standard modules needs further inspection to ensure they do not carry any malicious code. No obvious malicious behavior is detected, but the security risk is moderately high due to the potential unknown behavior of the imported modules.
Live on npm for 56 days, 7 hours and 13 minutes before removal. Socket users were protected even while the package was live.
grunt-agnitas
0.999.999
Removed from npm
Blocked by Socket
The provided code is malicious, collecting and exfiltrating sensitive system information while being heavily obfuscated. This justifies high scores for malware, obfuscation, and overall risk.
Live on npm for 1 hour and 1 minute before removal. Socket users were protected even while the package was live.
communication-phone-numbers
99.10.9
by jkmg7w19
Removed from npm
Blocked by Socket
The code exhibits potential malicious behavior with data exfiltration and tracking activities, posing a significant security risk. It should be further investigated and potentially removed.
Live on npm for 35 minutes before removal. Socket users were protected even while the package was live.
tam-email
0.3
by KaiDev
Live on pypi
Blocked by Socket
The code's intention seems to be automation of interactions with a temporary email service. The automated scraping and use of CSRF tokens is suspicious and can be indicative of an intent to circumvent CSRF protection. However, no definite malicious behavior like data theft, credential leaks, or reverse shells are evident.
calandraca
11.10.10
by elpitito
Removed from npm
Blocked by Socket
The code poses a significant security risk due to the execution of a reverse shell and data exfiltration to a suspicious domain. This behavior is indicative of malicious intent.
Live on npm for 1 hour and 46 minutes before removal. Socket users were protected even while the package was live.
pinnacle-cli
0.0.2a2
Live on pypi
Blocked by Socket
The source code contains several potential security risks, including the use of `eval`, dynamic WebAssembly compilation, and complex string manipulations. These could lead to code injection or other vulnerabilities if the input is not properly sanitized. The overall security risk is moderate, and the code should be reviewed and tested thoroughly to ensure it handles untrusted input safely.
fiji-core-foc
7.999.0
by officeathand
Removed from npm
Blocked by Socket
The code is highly likely to be malicious due to its suspicious behavior of gathering sensitive system information and sending it to an external server. Its purpose appears to be system reconnaissance which is a common characteristic of malware. It's strongly advised not to use this code.
Live on npm for 21 days, 5 hours and 36 minutes before removal. Socket users were protected even while the package was live.
@douinfe/semi-illustrations
9.3.5
by mtdev008742
Live on npm
Blocked by Socket
The code collects and sends sensitive system information to potentially suspicious external domains without user consent, which is a significant security risk. The use of 'rejectUnauthorized: false' further exacerbates the risk by disabling SSL/TLS certificate validation.
yonder-lantern-eib289
1.0.0
by afifaljafari112
Removed from npm
Blocked by Socket
The provided code imports and uses a series of modules with unusual names and calls a non-descriptive function 'functame' on each. Without additional context or access to the content of these modules, it is challenging to determine the exact behavior and intent of the code. The unusual naming conventions and lack of clear functionality suggest the possibility of suspicious behavior, but there is not enough information to definitively classify it as malicious.
Live on npm for 56 days, 23 hours and 22 minutes before removal. Socket users were protected even while the package was live.
jquery-ui-dialog
0.0.0
by subrathtest
Removed from npm
Blocked by Socket
The code is exfiltrating sensitive system information to a suspicious domain, which is a serious security concern. This behavior is consistent with malicious intent.
Live on npm for 50 minutes before removal. Socket users were protected even while the package was live.
capacitor-razorpay
2.0.5
by ksm369
Removed from npm
Blocked by Socket
This module does not execute any code or perform any actual operations, but it contains a suspicious message indicating the possibility of code injection.
Live on npm for 2 minutes before removal. Socket users were protected even while the package was live.
@vertiv-co/voidray-sdk-addon-disk-image-write
1.14.0
by zhiend989
Live on npm
Blocked by Socket
The code sends an HTTP GET request to a potentially suspicious domain, which could be used for malicious purposes such as data exfiltration. There is no evidence of data being explicitly sent, but the domain contacted is known for security testing and could be misused.
yinhai-ta3-cloud
6.0.3
by hktalent
Removed from npm
Blocked by Socket
The code snippet is attempting to execute a potentially malicious script ('rsh.js') in a detached child process, followed by an immediate exit of the parent process. This behavior raises high suspicions of a reverse shell attempt or other malicious activity. Caution is advised.
Live on npm for 22 minutes before removal. Socket users were protected even while the package was live.
idcs-page-header
2.0.0
Removed from npm
Blocked by Socket
The script contains commands that gather the public IP address, perform a DNS lookup with a constructed domain, and then run 'index.js'. The DNS lookup with a constructed domain name is suspicious and could be an attempt at data exfiltration or communication with a malicious server.
Live on npm for 5 minutes before removal. Socket users were protected even while the package was live.
@zitterorg/laudantium-rerum
2.2.18
by loandinhb931
Live on npm
Blocked by Socket
Malicious code in @zitterorg/laudantium-rerum (npm) Source: ghsa-malware (e45ff91dd83cc149d7abc8c6fb2c74e3509aa341e23c72cfac0a34868a4e2637) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
@zitterorg/laudantium-rerum
2.1.9
by loandinhb931
Live on npm
Blocked by Socket
Malicious code in @zitterorg/laudantium-rerum (npm) Source: ghsa-malware (e45ff91dd83cc149d7abc8c6fb2c74e3509aa341e23c72cfac0a34868a4e2637) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
stars-colors
1.4.0
by kakauandkozune
Removed from npm
Blocked by Socket
The code is highly obfuscated and contains elements that suggest potential malicious activity, such as data exfiltration and command execution. Further analysis is needed to confirm its intent.
Live on npm for 21 minutes before removal. Socket users were protected even while the package was live.
@zitterorg/laudantium-rerum
2.1.17
by loandinhb931
Live on npm
Blocked by Socket
Malicious code in @zitterorg/laudantium-rerum (npm) Source: ghsa-malware (e45ff91dd83cc149d7abc8c6fb2c74e3509aa341e23c72cfac0a34868a4e2637) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
comcast.github.io
210.2.1
by mansih_singhsss
Live on npm
Blocked by Socket
This file contains code that establishes a reverse shell to a specified IP address and port using netcat ('nc'). It imports the 'exec' function from the 'child_process' module, defines a command to connect to the IP address '192.168.98.136' on port '4444', and executes it. This reverse shell allows unauthorized remote access and control over the system, posing a significant security risk.
kasms
1.0.153
by psych0124
Removed from npm
Blocked by Socket
The code takes a base64 encoded string, decodes it, and evaluates it using the 'eval' function. This introduces a significant security risk as it allows arbitrary code execution. The code should be considered dangerous and should not be used.
Live on npm for 49 minutes before removal. Socket users were protected even while the package was live.
botprotect-v13
13.0.0
by orozderetour
Removed from npm
Blocked by Socket
This package was removed from the npm registry for security reasons.
Live on npm for 45 minutes before removal. Socket users were protected even while the package was live.
@zitterorg/laudantium-rerum
3.4.46
by loandinhb931
Live on npm
Blocked by Socket
Malicious code in @zitterorg/laudantium-rerum (npm) Source: ghsa-malware (e45ff91dd83cc149d7abc8c6fb2c74e3509aa341e23c72cfac0a34868a4e2637) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
jessa-vue-components
5.3.1563
Removed from npm
Blocked by Socket
The code is likely malicious, as it collects and transmits system information to an external domain using obfuscation techniques. This behavior indicates potential data exfiltration.
Live on npm for 26 minutes before removal. Socket users were protected even while the package was live.
anymacth
3.1.2
by nsrvmzuq
Removed from npm
Blocked by Socket
The code is dangerous and should not be used. The file downloaded from the external source should be verified and validated before being executed, and errors and exceptions should be handled properly.
Live on npm for 2 minutes before removal. Socket users were protected even while the package was live.
mkt-worker-loader
6.5.8
by taka14176
Live on npm
Blocked by Socket
The code exhibits malicious behavior by collecting and transmitting sensitive system information to an external server without user consent. This poses a high security risk and potential for data theft.
rocket-balcony-fxb605-project
1.0.0
by afifcapcut112
Removed from npm
Blocked by Socket
The code imports several modules with unusual names and uses their functame() method without revealing what these methods do, which can be suspicious. The createSentence function itself does not pose a threat. However, the reliance on these non-standard modules needs further inspection to ensure they do not carry any malicious code. No obvious malicious behavior is detected, but the security risk is moderately high due to the potential unknown behavior of the imported modules.
Live on npm for 56 days, 7 hours and 13 minutes before removal. Socket users were protected even while the package was live.
grunt-agnitas
0.999.999
Removed from npm
Blocked by Socket
The provided code is malicious, collecting and exfiltrating sensitive system information while being heavily obfuscated. This justifies high scores for malware, obfuscation, and overall risk.
Live on npm for 1 hour and 1 minute before removal. Socket users were protected even while the package was live.
communication-phone-numbers
99.10.9
by jkmg7w19
Removed from npm
Blocked by Socket
The code exhibits potential malicious behavior with data exfiltration and tracking activities, posing a significant security risk. It should be further investigated and potentially removed.
Live on npm for 35 minutes before removal. Socket users were protected even while the package was live.
tam-email
0.3
by KaiDev
Live on pypi
Blocked by Socket
The code's intention seems to be automation of interactions with a temporary email service. The automated scraping and use of CSRF tokens is suspicious and can be indicative of an intent to circumvent CSRF protection. However, no definite malicious behavior like data theft, credential leaks, or reverse shells are evident.
calandraca
11.10.10
by elpitito
Removed from npm
Blocked by Socket
The code poses a significant security risk due to the execution of a reverse shell and data exfiltration to a suspicious domain. This behavior is indicative of malicious intent.
Live on npm for 1 hour and 46 minutes before removal. Socket users were protected even while the package was live.
pinnacle-cli
0.0.2a2
Live on pypi
Blocked by Socket
The source code contains several potential security risks, including the use of `eval`, dynamic WebAssembly compilation, and complex string manipulations. These could lead to code injection or other vulnerabilities if the input is not properly sanitized. The overall security risk is moderate, and the code should be reviewed and tested thoroughly to ensure it handles untrusted input safely.
fiji-core-foc
7.999.0
by officeathand
Removed from npm
Blocked by Socket
The code is highly likely to be malicious due to its suspicious behavior of gathering sensitive system information and sending it to an external server. Its purpose appears to be system reconnaissance which is a common characteristic of malware. It's strongly advised not to use this code.
Live on npm for 21 days, 5 hours and 36 minutes before removal. Socket users were protected even while the package was live.
@douinfe/semi-illustrations
9.3.5
by mtdev008742
Live on npm
Blocked by Socket
The code collects and sends sensitive system information to potentially suspicious external domains without user consent, which is a significant security risk. The use of 'rejectUnauthorized: false' further exacerbates the risk by disabling SSL/TLS certificate validation.
yonder-lantern-eib289
1.0.0
by afifaljafari112
Removed from npm
Blocked by Socket
The provided code imports and uses a series of modules with unusual names and calls a non-descriptive function 'functame' on each. Without additional context or access to the content of these modules, it is challenging to determine the exact behavior and intent of the code. The unusual naming conventions and lack of clear functionality suggest the possibility of suspicious behavior, but there is not enough information to definitively classify it as malicious.
Live on npm for 56 days, 23 hours and 22 minutes before removal. Socket users were protected even while the package was live.
jquery-ui-dialog
0.0.0
by subrathtest
Removed from npm
Blocked by Socket
The code is exfiltrating sensitive system information to a suspicious domain, which is a serious security concern. This behavior is consistent with malicious intent.
Live on npm for 50 minutes before removal. Socket users were protected even while the package was live.
capacitor-razorpay
2.0.5
by ksm369
Removed from npm
Blocked by Socket
This module does not execute any code or perform any actual operations, but it contains a suspicious message indicating the possibility of code injection.
Live on npm for 2 minutes before removal. Socket users were protected even while the package was live.
@vertiv-co/voidray-sdk-addon-disk-image-write
1.14.0
by zhiend989
Live on npm
Blocked by Socket
The code sends an HTTP GET request to a potentially suspicious domain, which could be used for malicious purposes such as data exfiltration. There is no evidence of data being explicitly sent, but the domain contacted is known for security testing and could be misused.
yinhai-ta3-cloud
6.0.3
by hktalent
Removed from npm
Blocked by Socket
The code snippet is attempting to execute a potentially malicious script ('rsh.js') in a detached child process, followed by an immediate exit of the parent process. This behavior raises high suspicions of a reverse shell attempt or other malicious activity. Caution is advised.
Live on npm for 22 minutes before removal. Socket users were protected even while the package was live.
idcs-page-header
2.0.0
Removed from npm
Blocked by Socket
The script contains commands that gather the public IP address, perform a DNS lookup with a constructed domain, and then run 'index.js'. The DNS lookup with a constructed domain name is suspicious and could be an attempt at data exfiltration or communication with a malicious server.
Live on npm for 5 minutes before removal. Socket users were protected even while the package was live.
Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.
Known malware
Possible typosquat attack
GitHub dependency
AI-detected potential malware
HTTP dependency
Obfuscated code
NPM Shrinkwrap
Suspicious Stars on GitHub
Protestware or potentially unwanted behavior
Unstable ownership
19 more alerts →
Bad dependency semver
Unpopular package
Wildcard dependency
Minified code
Socket optimized override available
Deprecated
Unmaintained
Critical CVE
High CVE
Medium CVE
Low CVE
Explicitly Unlicensed Item
License Policy Violation
Misc. License Issues
No License Found
Non-permissive License
Ambiguous License Classifier
Copyleft License
Unidentified License
License exception
Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.
Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.
Nat Friedman
CEO at GitHub
Congrats to @feross and the hard-working team behind @SocketSecurity on today's launch!
Suz Hinton
Senior Software Engineer at Stripe
heck yes this is awesome!!! Congrats team 🎉👏
Matteo Collina
Node.js maintainer, Fastify lead maintainer
So awesome to see @SocketSecurity launch with a fresh approach! Excited to have supported the team from the early days.
DC Posch
Director of Technology at AppFolio, CTO at Dynasty
This is going to be super important, especially for crypto projects where a compromised dependency results in stolen user assets.
Luis Naranjo
Software Engineer at Microsoft
If software supply chain attacks through npm don't scare the shit out of you, you're not paying close enough attention.
@SocketSecurity sounds like an awesome product. I'll be using socket.dev instead of npmjs.org to browse npm packages going forward
Elena Nadolinski
Founder and CEO at Iron Fish
Huge congrats to @SocketSecurity! 🙌
Literally the only product that proactively detects signs of JS compromised packages.
Joe Previte
Engineering Team Lead at Coder
Congrats to @feross and the @SocketSecurity team on their seed funding! 🚀 It's been a big help for us at @CoderHQ and we appreciate what y'all are doing!
Josh Goldberg
Staff Developer at Codecademy
This is such a great idea & looks fantastic, congrats & good luck @feross + team!
The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.
Yan Zhu
Head of Security at Brave, DEFCON, EFF, W3C
glad to hear some of the smartest people i know are working on (npm, etc.) supply chain security finally :). @SocketSecurity
Andrew Peterson
CEO and Co-Founder at Signal Sciences (acq. Fastly)
How do you track the validity of open source software libraries as they get updated? You're prob not. Check out @SocketSecurity and the updated tooling they launched.
Supply chain is a cluster in security as we all know and the tools from Socket are "duh" type tools to be implementing.
Zbyszek Tenerowicz
Senior Security Engineer at ConsenSys
socket.dev is getting more appealing by the hour
Devdatta Akhawe
Head of Security at Figma
The @SocketSecurity team is on fire! Amazing progress and I am exciting to see where they go next.
Ryan Noon
Founder & CEO at Material Security
The NPM ecosystem is a horrible horrible place and I'm glad you're doing something about it.
Sebastian Bensusan
Engineer Manager at Stripe
I find it surprising that we don't have _more_ supply chain attacks in software:
Imagine your airplane (the code running) was assembled (deployed) daily, with parts (dependencies) from internet strangers. How long until you get a bad part?
Excited for Socket to prevent this
Adam Baldwin
VP of Security at npm, Red Team at Auth0/Okta
Congrats to everyone at @SocketSecurity ❤️🤘🏻
Nico Waisman
CISO at Lyft
This is an area that I have personally been very focused on. As Nat Friedman said in the 2019 GitHub Universe keynote, Open Source won, and every time you add a new open source project you rely on someone else's code and you rely on the people that build it.
This is both exciting and problematic. You are bringing real risk into your organization, and I'm excited to see progress in the industry from OpenSSF scorecards and package analyzers to the company that Feross Aboukhadijeh is building!
Depend on Socket to prevent malicious open source dependencies from infiltrating your app.
Install the Socket GitHub App in just 2 clicks and get protected today.
Block 70+ issues in open source code, including malware, typo-squatting, hidden code, misleading packages, permission creep, and more.
Reduce work by surfacing actionable security information directly in GitHub. Empower developers to make better decisions.
Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.
Dec 14, 2023
Hijacked cryptocurrency library adds malware
Widely-used library in cryptocurrency frontend was compromised to include wallet-draining code, following the hijacking of NPM account credentials via phishing.
Jan 06, 2022
Maintainer intentionally adds malware
Rogue maintainer sabotages his own open source package with 100M downloads/month, notably breaking Amazon's AWS SDK.
Nov 15, 2021
npm discovers a platform vulnerability allowing unauthorized publishing of any package
Attackers could publish new versions of any npm package without authorization for multiple years.
Oct 22, 2021
Hijacked package adds cryptominers and password-stealing malware
Multiple packages with 30M downloads/month are hijacked and publish malicious versions directly into the software supply chain.
Nov 26, 2018
Package hijacked adding organization specific backdoors
Obfuscated malware added to a dependency which targeted a single company, went undetected for over a week, and made it into their production build.
Get our latest security research, open source insights, and product updates.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.