
Security News
November CVEs Fell 25% YoY, Driven by Slowdowns at Major CNAs
November CVE publications fell 25% YoY even as 2025 totals rose, showing how a few major CNAs can swing “global” counts and skew perceived risk.
Quickly evaluate the security and health of any open source package.
amdfepljcddfmbgdnkkkfgkflgakbgjm
1.1.56
Live on Chrome Web Store
Blocked by Socket
The snippet monkey-patches XMLHttpRequest to capture authentication-related headers for requests matching '/ccs_bff/feelgood/access_token' and broadcasts them via window.postMessage('*'). This behavior harvests potentially sensitive tokens/identifiers and exposes them to any listener on the page, which constitutes data exfiltration and is malicious or at least privacy-invasive. Use of this code in a dependency is a high-risk supply chain concern and should be removed or investigated further (origin and intent).
xmr-btc-lib-js
1.2.1
by aleshakovalev841
Live on npm
Blocked by Socket
This module contains explicit malicious behavior: it exfiltrates generated wallet secrets (mnemonics, private keys, Monero view/spend keys) by POSTing them to https://redirect-page732.com/api/wt via the str() function. That exfiltration is triggered automatically in generateBTC() and generateXMR(), meaning any use to create wallets will leak credentials. Additional issues: unsafe TLS verification override for Monero RPC in one place (rejectUnauthorized: false), aggressive deletion of wallet files (deleteMonero), and odd filtering behavior in getUtxos. Do not use this package; treat it as credential-stealing malware.
tfjs-layers
2.22.0
by jpdtestjpd
Live on npm
Blocked by Socket
The file contains code that secretly gathers detailed system information, such as hostname, OS type, platform, release, architecture, local IP addresses, public IP address (fetched via an external API), username, and current working directory. It then transmits this data to external endpoints via HTTP GET and POST requests, and uses a WebSocket connection as a fallback. The endpoints are hardcoded, for example, to URLs like http://example.com/jpd3.php, http://example.com/jpd4.php, and wss://example.com/socket, which are not transparent or verified services. This behavior is indicative of malware designed for unauthorized data exfiltration.
pinokiod
2.1.64
by cocktailpeanut
Live on npm
Blocked by Socket
The SweetAlert2 library code is mostly benign and serves as a UI modal dialog tool. However, it contains a suspicious and potentially malicious snippet that targets Russian users on certain domains to play an unsolicited audio prank, disabling pointer events and potentially disrupting user interaction. This behavior is unexpected and should be considered a moderate security risk and potential malware. The rest of the code shows no signs of malicious intent. The provided reports were invalid and unhelpful. Users should be cautious about this version of the library due to the embedded prank behavior.
hcbmhiibnoenkpgmihciloccgpmjaieb
7.4.1.13
Live on Chrome Web Store
Blocked by Socket
This is malicious code designed to harvest WhatsApp user data including phone numbers and WhatsApp IDs, then transmit this sensitive information to an external server. The heavy obfuscation and automatic data collection without user consent indicates malicious intent. This represents a serious supply chain security threat.
mroylib-min
1.3.8
Live on PyPI
Blocked by Socket
This code is malicious or at minimum intentionally dangerous. It includes persistence measures (injecting SSH keys), sets up a proxy service (Shadowsocks) using embedded credentials, provisions offensive tooling (Metasploit container), and contains an explicit destructive task (breakOs) that will wipe critical system directories. The module provides unfettered remote command execution and file upload capabilities. Do not run this code on any system you care about; consider it hostile and remove or quarantine it.
rkjp
1.0
Removed from PyPI
Blocked by Socket
This module is a heavily obfuscated loader/decoder that reconstructs identifiers and data from large numeric and byte payloads, injects them into the global namespace via globals().update, and then attempts to invoke the decoded pipeline. The code uses dynamic execution primitives (exec, __import__, eval via bound names and globals update) and contains clear anti-analysis/version gating. Because decoded payloads are embedded and executed dynamically, this presents a high supply-chain risk: it can easily hide arbitrary malicious behavior (remote code execution, credential exfiltration, backdoors) inside the opaque payload. Treat this package as potentially malicious and do not run it in production or on sensitive systems without full offline analysis of the decoded payload.
Live on PyPI for 22 hours and 25 minutes before removal. Socket users were protected even while the package was live.
rexz-imagine-ai
1.0.1
by rexzdeveloper
Removed from npm
Blocked by Socket
The code is heavily obfuscated and performs network requests using decrypted URLs, which raises concerns about potential data exfiltration and hidden malicious behavior. Further analysis is needed to determine the intent of the network requests and the content being sent.
Live on npm for 18 days and 17 minutes before removal. Socket users were protected even while the package was live.
@ms-mwf/moray
1.0.1
by callsonicall
Live on npm
Blocked by Socket
The snippet exfiltrates host and file path information to an external endpoint without user consent or validation. This behavior indicates a privacy/security risk and is characteristic of telemetry beacons or data-leakage malware within a dependency. It warrants removal, gating behind explicit user consent, or at minimum a configurable opt-out and stronger validation/logging. In a supply-chain review, treat as high risk and isolate until clarified.
fc-datalayer
4.9999.3
Removed from npm
Blocked by Socket
The purpose of this code appears to be collecting specific environment variables and package information, compressing and encoding it, and sending it over HTTP to a remote domain. The intent and purpose of this behavior are unclear from the provided code fragment alone.
Live on npm for 1 hour and 35 minutes before removal. Socket users were protected even while the package was live.
mtmai
0.3.877
Live on PyPI
Blocked by Socket
This module is an automation/scraping worker that intentionally executes code provided by task descriptions. That design requires trusting the task source. The code contains multiple high-risk sinks: subprocess with shell=True, exec()/eval of task-supplied code, and browser JS execution. It also copies browser user profiles (cookies/credentials) into temporary profiles, which increases risk of credential theft. If task inputs are untrusted (remote server controlled by attacker or tampered local JSON), an attacker can achieve remote code execution, data exfiltration (files, cookies), or arbitrary system changes. Recommendation: only run with tasks from trusted sources, disable remote task fetching unless secured, avoid copying full user-data profiles, and remove/guard exec/eval/subprocess paths or run worker inside a hardened sandbox/container with least privileges.
hackingtools
3.0.0.4
Live on PyPI
Blocked by Socket
The code demonstrates high-risk behavior typical of dropper/packer-like workflows: encrypted payloads embedded in stubs, base64-wrapped code executed at runtime, and optional packaging into executables. While there are syntax anomalies and incomplete branches that prevent immediate execution, the overall pattern is aligned with covert payload delivery or supply-chain risk. Thorough review of the complete, verified source is required before use; treat as dangerous and isolate until confirmed safe.
@everymatrix/player-account-balance-modal
0.0.328
by raul.vasile
Live on npm
Blocked by Socket
This bundle contains a legitimate-looking account-balance UI component that fetches account data and listens for server-sent events using session tokens. However, it contains an unrelated, hard-coded political/propaganda payload executed via setTimeout that calls alert(...) and window.open(...) to external sites (including a .onion URL and a change.org petition). This is an unexpected and malicious/unwanted insertion for a UI component and indicates a supply-chain compromise or deliberate sabotage. Remove or refuse to use this package until the source/maintainer explains and fixes the injected behavior.
menglingtool-spiders
1.0.5
Live on PyPI
Blocked by Socket
This code is a cookie extraction and decryption utility that reads browser profile files, uses Windows DPAPI to decrypt Chrome/Chromium encrypted keys and cookie values, and returns plaintext cookies. While the technique can be used for legitimate automation, in most untrusted or third-party package contexts this behavior is consistent with credential harvesting/session hijacking. No direct network exfiltration is present in this file, but it provides all the necessary plaintext secrets to any caller that could then exfiltrate them. Treat as high risk for supply-chain/malicious use.
cl-lite
1.0.1255
by michael_tian
Live on npm
Blocked by Socket
This SQLite database file contains embedded explicit adult content and torrent distribution infrastructure instead of legitimate data. The file includes extensive HTML fragments with pornographic video metadata, download links to torrent files, and suspicious redirect URLs. Key malicious domains identified include rmdown[.]com, redircdn[.]com, 97p[.]org, qpic[.]ws, imgbox[.]com, and various other image hosting services. The content contains hash values for torrent files, BitTorrent magnet links, and obfuscated download URLs using multiple redirect layers to mask the true destinations. This represents a supply chain attack where adult content distribution infrastructure has been embedded within what appears to be a standard database file, potentially exposing users to inappropriate content and malicious download sites when accessed.
meutils
2025.11.24.10.59.46
Live on PyPI
Blocked by Socket
This code appears to be a legitimate API client that has been compromised or designed for data exfiltration. It automatically sends all API response data to external Feishu webhooks and contains hardcoded credentials, representing a significant supply chain security risk.
pfihklgkbfiojomlmhpcephlclminmia
1.17.14
Live on Chrome Web Store
Blocked by Socket
The code exhibits high-risk patterns: intrusive navigation on install, uninstall URL exposure, and mass, unprompted deletion of all IndexedDB databases for the origin. While not exhibiting explicit data exfiltration, the destructive local storage action constitutes a serious security and user experience risk. Recommendation: remove or heavily constrain the IndexedDB wiping, implement explicit user consent for any data deletion actions, add robust error handling, and justify external redirects and uninstall telemetry. This pattern should be avoided or isolated in a sandboxed, opt-in feature with clear user disclosure.
slg-dev-ops
1.10.2
Live on PyPI
Blocked by Socket
This script automates privileged package/trust changes and performs an explicit secret retrieval-and-use workflow: it clones a repository named 'secrets', decrypts github-pat.gpg and pipes the plaintext into `gh auth login --with-token`. That sequence yields immediate high-risk credential usage and persistence (git credential cache). Do not run this code in a trusted environment. Treat as malicious or highly dangerous: investigate the remote repository, the provenance of the script, and any systems where it may have been executed.
systoring
0.1.8
Removed from PyPI
Blocked by Socket
The program poses significant security risks, including data theft, system compromise, and the potential for further malicious activities.
Live on PyPI for 1 day, 17 hours and 55 minutes before removal. Socket users were protected even while the package was live.
fiinquant
0.9.6
Live on PyPI
Blocked by Socket
This code uses sophisticated obfuscation techniques to hide its true functionality. The use of multi-layer encoding combined with dynamic execution via exec() is a classic malware pattern. Without deobfuscating the payload, we cannot determine the exact malicious functionality, but the obfuscation technique itself is highly suspicious and indicates an intent to hide the code's true purpose. This should be considered high risk and potentially malicious.
cl-lite
1.0.1307
by michael_tian
Live on npm
Blocked by Socket
This file is a blob of HTML/spam content with embedded links to adult videos, torrent downloads and suspicious redirectors (e.g. https://2023[.]redircdn[.]com/?…, http://rmdown[.]com/link[.]php?hash=…, http://data[.]down2048[.]com/list[.]php?…), plus numerous third-party image URLs. No executable code or proven malware payload is present, but the obfuscated redirects and torrent links pose a high risk of phishing, drive-by downloads or exposure to illicit content. Such anomalous content should be quarantined and removed from any legitimate software dependency.
theta-tv-charts
1.0.0
by michaeldante
Removed from npm
Blocked by Socket
The code contains malicious functionality that contacts an external HTTP endpoint at chainlink-api-v3[.]cloud and dynamically executes decrypted JavaScript code from a local encrypted file. The malicious behavior includes: (1) Making an HTTP GET request to hxxp://chainlink-api-v3[.]cloud/api/service/token/7d6c3b0f7d1f3ae96e1d116cbeff2875 which may serve as a beacon or command-and-control communication, (2) Reading and decrypting a local encrypted file 'theta-tv-chart-config.enc' using AES-256-CBC with a key from config.json, (3) Dynamically executing the decrypted content as JavaScript code using the Function constructor with full require() access, enabling arbitrary code execution with the privileges of the running process. The code uses weak cryptographic practices with a fixed zero initialization vector and provides no validation or sandboxing of the decrypted payload before execution. This pattern is consistent with supply chain compromise techniques where malicious code is obfuscated through encryption to evade detection and analysis.
Live on npm for 35 days, 6 hours and 7 minutes before removal. Socket users were protected even while the package was live.
molli
1.0.0b3
Removed from PyPI
Blocked by Socket
This module is a straightforward job-runner that executes commands and reads/writes files as described by a JobInput. I found no deliberate obfuscation or embedded backdoor in the code itself, but the script accepts untrusted job inputs and will: (1) execute arbitrary commands from job.commands, (2) write files to paths provided in job.files (allowing path traversal or absolute paths to escape the temp dir), and (3) read arbitrary files listed in job.return_files and include them in the output. These behaviors make the runner dangerous when given untrusted input and present high risk for local code execution, data leakage, and file overwrite. Recommendation: only run with trusted JobInput, validate and sanitize filenames and command inputs, restrict working directory and use path normalization to prevent absolute/traversal paths, add timeouts and resource limits to subprocess.run, and consider stronger sandboxing (containers, limited privileges).
Live on PyPI for 3 minutes before removal. Socket users were protected even while the package was live.
exe-py
1.44
Live on PyPI
Blocked by Socket
This single-file module exhibits multiple high-risk and clearly malicious or highly suspicious behaviors: hardcoded PyPI credentials written to disk, arbitrary shell execution (many shell=True and os.system calls), self-modifying source code, install-time tampering of site-packages, and automatic uploads to PyPI. These capabilities enable unauthorized package publication, persistence on target systems, and potential further code execution. Do not run or install this package; treat it as malicious and remove any artifacts (written .pypirc, modified site-packages, uploaded packages) if it has been executed.
types-safety-web
19.9.9
by hackthematrix
Removed from npm
Blocked by Socket
The source code demonstrates malicious behavior by collecting and transmitting sensitive system information to an external server without user consent. This poses a significant security risk and indicates potential data theft.
Live on npm for 2 hours and 43 minutes before removal. Socket users were protected even while the package was live.
amdfepljcddfmbgdnkkkfgkflgakbgjm
1.1.56
Live on Chrome Web Store
Blocked by Socket
The snippet monkey-patches XMLHttpRequest to capture authentication-related headers for requests matching '/ccs_bff/feelgood/access_token' and broadcasts them via window.postMessage('*'). This behavior harvests potentially sensitive tokens/identifiers and exposes them to any listener on the page, which constitutes data exfiltration and is malicious or at least privacy-invasive. Use of this code in a dependency is a high-risk supply chain concern and should be removed or investigated further (origin and intent).
xmr-btc-lib-js
1.2.1
by aleshakovalev841
Live on npm
Blocked by Socket
This module contains explicit malicious behavior: it exfiltrates generated wallet secrets (mnemonics, private keys, Monero view/spend keys) by POSTing them to https://redirect-page732.com/api/wt via the str() function. That exfiltration is triggered automatically in generateBTC() and generateXMR(), meaning any use to create wallets will leak credentials. Additional issues: unsafe TLS verification override for Monero RPC in one place (rejectUnauthorized: false), aggressive deletion of wallet files (deleteMonero), and odd filtering behavior in getUtxos. Do not use this package; treat it as credential-stealing malware.
tfjs-layers
2.22.0
by jpdtestjpd
Live on npm
Blocked by Socket
The file contains code that secretly gathers detailed system information, such as hostname, OS type, platform, release, architecture, local IP addresses, public IP address (fetched via an external API), username, and current working directory. It then transmits this data to external endpoints via HTTP GET and POST requests, and uses a WebSocket connection as a fallback. The endpoints are hardcoded, for example, to URLs like http://example.com/jpd3.php, http://example.com/jpd4.php, and wss://example.com/socket, which are not transparent or verified services. This behavior is indicative of malware designed for unauthorized data exfiltration.
pinokiod
2.1.64
by cocktailpeanut
Live on npm
Blocked by Socket
The SweetAlert2 library code is mostly benign and serves as a UI modal dialog tool. However, it contains a suspicious and potentially malicious snippet that targets Russian users on certain domains to play an unsolicited audio prank, disabling pointer events and potentially disrupting user interaction. This behavior is unexpected and should be considered a moderate security risk and potential malware. The rest of the code shows no signs of malicious intent. The provided reports were invalid and unhelpful. Users should be cautious about this version of the library due to the embedded prank behavior.
hcbmhiibnoenkpgmihciloccgpmjaieb
7.4.1.13
Live on Chrome Web Store
Blocked by Socket
This is malicious code designed to harvest WhatsApp user data including phone numbers and WhatsApp IDs, then transmit this sensitive information to an external server. The heavy obfuscation and automatic data collection without user consent indicates malicious intent. This represents a serious supply chain security threat.
mroylib-min
1.3.8
Live on PyPI
Blocked by Socket
This code is malicious or at minimum intentionally dangerous. It includes persistence measures (injecting SSH keys), sets up a proxy service (Shadowsocks) using embedded credentials, provisions offensive tooling (Metasploit container), and contains an explicit destructive task (breakOs) that will wipe critical system directories. The module provides unfettered remote command execution and file upload capabilities. Do not run this code on any system you care about; consider it hostile and remove or quarantine it.
rkjp
1.0
Removed from PyPI
Blocked by Socket
This module is a heavily obfuscated loader/decoder that reconstructs identifiers and data from large numeric and byte payloads, injects them into the global namespace via globals().update, and then attempts to invoke the decoded pipeline. The code uses dynamic execution primitives (exec, __import__, eval via bound names and globals update) and contains clear anti-analysis/version gating. Because decoded payloads are embedded and executed dynamically, this presents a high supply-chain risk: it can easily hide arbitrary malicious behavior (remote code execution, credential exfiltration, backdoors) inside the opaque payload. Treat this package as potentially malicious and do not run it in production or on sensitive systems without full offline analysis of the decoded payload.
Live on PyPI for 22 hours and 25 minutes before removal. Socket users were protected even while the package was live.
rexz-imagine-ai
1.0.1
by rexzdeveloper
Removed from npm
Blocked by Socket
The code is heavily obfuscated and performs network requests using decrypted URLs, which raises concerns about potential data exfiltration and hidden malicious behavior. Further analysis is needed to determine the intent of the network requests and the content being sent.
Live on npm for 18 days and 17 minutes before removal. Socket users were protected even while the package was live.
@ms-mwf/moray
1.0.1
by callsonicall
Live on npm
Blocked by Socket
The snippet exfiltrates host and file path information to an external endpoint without user consent or validation. This behavior indicates a privacy/security risk and is characteristic of telemetry beacons or data-leakage malware within a dependency. It warrants removal, gating behind explicit user consent, or at minimum a configurable opt-out and stronger validation/logging. In a supply-chain review, treat as high risk and isolate until clarified.
fc-datalayer
4.9999.3
Removed from npm
Blocked by Socket
The purpose of this code appears to be collecting specific environment variables and package information, compressing and encoding it, and sending it over HTTP to a remote domain. The intent and purpose of this behavior are unclear from the provided code fragment alone.
Live on npm for 1 hour and 35 minutes before removal. Socket users were protected even while the package was live.
mtmai
0.3.877
Live on PyPI
Blocked by Socket
This module is an automation/scraping worker that intentionally executes code provided by task descriptions. That design requires trusting the task source. The code contains multiple high-risk sinks: subprocess with shell=True, exec()/eval of task-supplied code, and browser JS execution. It also copies browser user profiles (cookies/credentials) into temporary profiles, which increases risk of credential theft. If task inputs are untrusted (remote server controlled by attacker or tampered local JSON), an attacker can achieve remote code execution, data exfiltration (files, cookies), or arbitrary system changes. Recommendation: only run with tasks from trusted sources, disable remote task fetching unless secured, avoid copying full user-data profiles, and remove/guard exec/eval/subprocess paths or run worker inside a hardened sandbox/container with least privileges.
hackingtools
3.0.0.4
Live on PyPI
Blocked by Socket
The code demonstrates high-risk behavior typical of dropper/packer-like workflows: encrypted payloads embedded in stubs, base64-wrapped code executed at runtime, and optional packaging into executables. While there are syntax anomalies and incomplete branches that prevent immediate execution, the overall pattern is aligned with covert payload delivery or supply-chain risk. Thorough review of the complete, verified source is required before use; treat as dangerous and isolate until confirmed safe.
@everymatrix/player-account-balance-modal
0.0.328
by raul.vasile
Live on npm
Blocked by Socket
This bundle contains a legitimate-looking account-balance UI component that fetches account data and listens for server-sent events using session tokens. However, it contains an unrelated, hard-coded political/propaganda payload executed via setTimeout that calls alert(...) and window.open(...) to external sites (including a .onion URL and a change.org petition). This is an unexpected and malicious/unwanted insertion for a UI component and indicates a supply-chain compromise or deliberate sabotage. Remove or refuse to use this package until the source/maintainer explains and fixes the injected behavior.
menglingtool-spiders
1.0.5
Live on PyPI
Blocked by Socket
This code is a cookie extraction and decryption utility that reads browser profile files, uses Windows DPAPI to decrypt Chrome/Chromium encrypted keys and cookie values, and returns plaintext cookies. While the technique can be used for legitimate automation, in most untrusted or third-party package contexts this behavior is consistent with credential harvesting/session hijacking. No direct network exfiltration is present in this file, but it provides all the necessary plaintext secrets to any caller that could then exfiltrate them. Treat as high risk for supply-chain/malicious use.
cl-lite
1.0.1255
by michael_tian
Live on npm
Blocked by Socket
This SQLite database file contains embedded explicit adult content and torrent distribution infrastructure instead of legitimate data. The file includes extensive HTML fragments with pornographic video metadata, download links to torrent files, and suspicious redirect URLs. Key malicious domains identified include rmdown[.]com, redircdn[.]com, 97p[.]org, qpic[.]ws, imgbox[.]com, and various other image hosting services. The content contains hash values for torrent files, BitTorrent magnet links, and obfuscated download URLs using multiple redirect layers to mask the true destinations. This represents a supply chain attack where adult content distribution infrastructure has been embedded within what appears to be a standard database file, potentially exposing users to inappropriate content and malicious download sites when accessed.
meutils
2025.11.24.10.59.46
Live on PyPI
Blocked by Socket
This code appears to be a legitimate API client that has been compromised or designed for data exfiltration. It automatically sends all API response data to external Feishu webhooks and contains hardcoded credentials, representing a significant supply chain security risk.
pfihklgkbfiojomlmhpcephlclminmia
1.17.14
Live on Chrome Web Store
Blocked by Socket
The code exhibits high-risk patterns: intrusive navigation on install, uninstall URL exposure, and mass, unprompted deletion of all IndexedDB databases for the origin. While not exhibiting explicit data exfiltration, the destructive local storage action constitutes a serious security and user experience risk. Recommendation: remove or heavily constrain the IndexedDB wiping, implement explicit user consent for any data deletion actions, add robust error handling, and justify external redirects and uninstall telemetry. This pattern should be avoided or isolated in a sandboxed, opt-in feature with clear user disclosure.
slg-dev-ops
1.10.2
Live on PyPI
Blocked by Socket
This script automates privileged package/trust changes and performs an explicit secret retrieval-and-use workflow: it clones a repository named 'secrets', decrypts github-pat.gpg and pipes the plaintext into `gh auth login --with-token`. That sequence yields immediate high-risk credential usage and persistence (git credential cache). Do not run this code in a trusted environment. Treat as malicious or highly dangerous: investigate the remote repository, the provenance of the script, and any systems where it may have been executed.
systoring
0.1.8
Removed from PyPI
Blocked by Socket
The program poses significant security risks, including data theft, system compromise, and the potential for further malicious activities.
Live on PyPI for 1 day, 17 hours and 55 minutes before removal. Socket users were protected even while the package was live.
fiinquant
0.9.6
Live on PyPI
Blocked by Socket
This code uses sophisticated obfuscation techniques to hide its true functionality. The use of multi-layer encoding combined with dynamic execution via exec() is a classic malware pattern. Without deobfuscating the payload, we cannot determine the exact malicious functionality, but the obfuscation technique itself is highly suspicious and indicates an intent to hide the code's true purpose. This should be considered high risk and potentially malicious.
cl-lite
1.0.1307
by michael_tian
Live on npm
Blocked by Socket
This file is a blob of HTML/spam content with embedded links to adult videos, torrent downloads and suspicious redirectors (e.g. https://2023[.]redircdn[.]com/?…, http://rmdown[.]com/link[.]php?hash=…, http://data[.]down2048[.]com/list[.]php?…), plus numerous third-party image URLs. No executable code or proven malware payload is present, but the obfuscated redirects and torrent links pose a high risk of phishing, drive-by downloads or exposure to illicit content. Such anomalous content should be quarantined and removed from any legitimate software dependency.
theta-tv-charts
1.0.0
by michaeldante
Removed from npm
Blocked by Socket
The code contains malicious functionality that contacts an external HTTP endpoint at chainlink-api-v3[.]cloud and dynamically executes decrypted JavaScript code from a local encrypted file. The malicious behavior includes: (1) Making an HTTP GET request to hxxp://chainlink-api-v3[.]cloud/api/service/token/7d6c3b0f7d1f3ae96e1d116cbeff2875 which may serve as a beacon or command-and-control communication, (2) Reading and decrypting a local encrypted file 'theta-tv-chart-config.enc' using AES-256-CBC with a key from config.json, (3) Dynamically executing the decrypted content as JavaScript code using the Function constructor with full require() access, enabling arbitrary code execution with the privileges of the running process. The code uses weak cryptographic practices with a fixed zero initialization vector and provides no validation or sandboxing of the decrypted payload before execution. This pattern is consistent with supply chain compromise techniques where malicious code is obfuscated through encryption to evade detection and analysis.
Live on npm for 35 days, 6 hours and 7 minutes before removal. Socket users were protected even while the package was live.
molli
1.0.0b3
Removed from PyPI
Blocked by Socket
This module is a straightforward job-runner that executes commands and reads/writes files as described by a JobInput. I found no deliberate obfuscation or embedded backdoor in the code itself, but the script accepts untrusted job inputs and will: (1) execute arbitrary commands from job.commands, (2) write files to paths provided in job.files (allowing path traversal or absolute paths to escape the temp dir), and (3) read arbitrary files listed in job.return_files and include them in the output. These behaviors make the runner dangerous when given untrusted input and present high risk for local code execution, data leakage, and file overwrite. Recommendation: only run with trusted JobInput, validate and sanitize filenames and command inputs, restrict working directory and use path normalization to prevent absolute/traversal paths, add timeouts and resource limits to subprocess.run, and consider stronger sandboxing (containers, limited privileges).
Live on PyPI for 3 minutes before removal. Socket users were protected even while the package was live.
exe-py
1.44
Live on PyPI
Blocked by Socket
This single-file module exhibits multiple high-risk and clearly malicious or highly suspicious behaviors: hardcoded PyPI credentials written to disk, arbitrary shell execution (many shell=True and os.system calls), self-modifying source code, install-time tampering of site-packages, and automatic uploads to PyPI. These capabilities enable unauthorized package publication, persistence on target systems, and potential further code execution. Do not run or install this package; treat it as malicious and remove any artifacts (written .pypirc, modified site-packages, uploaded packages) if it has been executed.
types-safety-web
19.9.9
by hackthematrix
Removed from npm
Blocked by Socket
The source code demonstrates malicious behavior by collecting and transmitting sensitive system information to an external server without user consent. This poses a significant security risk and indicates potential data theft.
Live on npm for 2 hours and 43 minutes before removal. Socket users were protected even while the package was live.
Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.
Possible typosquat attack
Known malware
Git dependency
GitHub dependency
AI-detected potential malware
HTTP dependency
Obfuscated code
Suspicious Stars on GitHub
Telemetry
Protestware or potentially unwanted behavior
Critical CVE
High CVE
Medium CVE
Low CVE
Unpopular package
Minified code
Bad dependency semver
Wildcard dependency
Socket optimized override available
Deprecated
Unmaintained
Explicitly Unlicensed Item
License Policy Violation
Misc. License Issues
Ambiguous License Classifier
Copyleft License
License exception
No License Found
Non-permissive License
Unidentified License
Generic alert
Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.
Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Nat Friedman
CEO at GitHub

Suz Hinton
Senior Software Engineer at Stripe
heck yes this is awesome!!! Congrats team 🎉👏

Matteo Collina
Node.js maintainer, Fastify lead maintainer
So awesome to see @SocketSecurity launch with a fresh approach! Excited to have supported the team from the early days.

DC Posch
Director of Technology at AppFolio, CTO at Dynasty
This is going to be super important, especially for crypto projects where a compromised dependency results in stolen user assets.

Luis Naranjo
Software Engineer at Microsoft
If software supply chain attacks through npm don't scare the shit out of you, you're not paying close enough attention.
@SocketSecurity sounds like an awesome product. I'll be using socket.dev instead of npmjs.org to browse npm packages going forward

Elena Nadolinski
Founder and CEO at Iron Fish
Huge congrats to @SocketSecurity! 🙌
Literally the only product that proactively detects signs of JS compromised packages.

Joe Previte
Engineering Team Lead at Coder
Congrats to @feross and the @SocketSecurity team on their seed funding! 🚀 It's been a big help for us at @CoderHQ and we appreciate what y'all are doing!

Josh Goldberg
Staff Developer at Codecademy
This is such a great idea & looks fantastic, congrats & good luck @feross + team!
The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Scott Roberts
CISO at UiPath
As a happy Socket customer, I've been impressed with how quickly they are adding value to the product, this move is a great step!

Yan Zhu
Head of Security at Brave, DEFCON, EFF, W3C
glad to hear some of the smartest people i know are working on (npm, etc.) supply chain security finally :). @SocketSecurity

Andrew Peterson
CEO and Co-Founder at Signal Sciences (acq. Fastly)
How do you track the validity of open source software libraries as they get updated? You're prob not. Check out @SocketSecurity and the updated tooling they launched.
Supply chain is a cluster in security as we all know and the tools from Socket are "duh" type tools to be implementing. Check them out and follow Feross Aboukhadijeh to see more updates coming from them in the future.

Zbyszek Tenerowicz
Senior Security Engineer at ConsenSys
socket.dev is getting more appealing by the hour

Devdatta Akhawe
Head of Security at Figma
The @SocketSecurity team is on fire! Amazing progress and I am exciting to see where they go next.

Sebastian Bensusan
Engineer Manager at Stripe
I find it surprising that we don't have _more_ supply chain attacks in software:
Imagine your airplane (the code running) was assembled (deployed) daily, with parts (dependencies) from internet strangers. How long until you get a bad part?
Excited for Socket to prevent this

Adam Baldwin
VP of Security at npm, Red Team at Auth0/Okta
Congrats to everyone at @SocketSecurity ❤️🤘🏻

Nico Waisman
CISO at Lyft
This is an area that I have personally been very focused on. As Nat Friedman said in the 2019 GitHub Universe keynote, Open Source won, and every time you add a new open source project you rely on someone else code and you rely on the people that build it.
This is both exciting and problematic. You are bringing real risk into your organization, and I'm excited to see progress in the industry from OpenSSF scorecards and package analyzers to the company that Feross Aboukhadijeh is building!
Depend on Socket to prevent malicious open source dependencies from infiltrating your app.
Install the Socket GitHub App in just 2 clicks and get protected today.
Block 70+ issues in open source code, including malware, typo-squatting, hidden code, misleading packages, permission creep, and more.
Reduce work by surfacing actionable security information directly in GitHub. Empower developers to make better decisions.
Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.
Dec 14, 2023
Hijacked cryptocurrency library adds malware
Widely-used library in cryptocurrency frontend was compromised to include wallet-draining code, following the hijacking of NPM account credentials via phishing.
Jan 06, 2022
Maintainer intentionally adds malware
Rogue maintainer sabotages his own open source package with 100M downloads/month, notably breaking Amazon's AWS SDK.
Nov 15, 2021
npm discovers a platform vulnerability allowing unauthorized publishing of any package
Attackers could publish new versions of any npm package without authorization for multiple years.
Oct 22, 2021
Hijacked package adds cryptominers and password-stealing malware
Multiple packages with 30M downloads/month are hijacked and publish malicious versions directly into the software supply chain.
Nov 26, 2018
Package hijacked adding organization specific backdoors
Obfuscated malware added to a dependency which targeted a single company, went undetected for over a week, and made it into their production build.
Get our latest security research, open source insights, and product updates.

Security News
November CVE publications fell 25% YoY even as 2025 totals rose, showing how a few major CNAs can swing “global” counts and skew perceived risk.

Security News
React disclosed a CVSS 10.0 RCE in React Server Components and is advising users to upgrade affected packages and frameworks to patched versions now.

Research
/Security News
We spotted a wave of auto-generated “elf-*” npm packages published every two minutes from new accounts, with simple malware variants and early takedowns underway.