Huge News!Announcing our $40M Series B led by Abstract Ventures.Learn More
Socket
Sign inDemoInstall
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub AppBook a Demo

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery


timmywil published 3.7.1

left-pad


stevemao published 1.3.0

react


react-bot published 18.3.1

We protect you from vulnerable and malicious packages

pco-apigw-common-layer

1.0.33

by miraclehorror

Removed from npm

Blocked by Socket

This script is making a potentially malicious request to a remote server using curl. The URL being constructed using the /etc/passwd file is suspicious and could be used for unauthorized access or data exfiltration.

Live on npm for 21 days, 3 hours and 18 minutes before removal. Socket users were protected even while the package was live.

likeappa

1.0.3

by likesec

Removed from npm

Blocked by Socket

This script appears to be executing potentially harmful commands by first pinging a suspicious domain and then executing decoded base64 content. This behavior is highly indicative of malicious intent.

Live on npm for 1 minute before removal. Socket users were protected even while the package was live.

@zitterorg/laudantium-rerum

3.4.45

by loandinhb931

Live on npm

Blocked by Socket

Malicious code in @zitterorg/laudantium-rerum (npm) Source: ghsa-malware (e45ff91dd83cc149d7abc8c6fb2c74e3509aa341e23c72cfac0a34868a4e2637) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.

pp-amount-field

3.99.0

by francisbeaudoin

Removed from npm

Blocked by Socket

The code is designed to collect sensitive system information and send it to an external server without user consent. The use of obfuscation techniques to hide this behavior indicates malicious intent.

Live on npm for 5 minutes before removal. Socket users were protected even while the package was live.

mobile-guild-kb

7.999.999

Removed from npm

Blocked by Socket

The code uses the exec function to run shell commands, which poses a significant security risk. It could potentially execute malicious code if the input to exec is manipulated. Redirecting output to /dev/null to hide execution details is suspicious.

Live on npm for 15 minutes before removal. Socket users were protected even while the package was live.

obelisk-nectar-ujh508

1.0.0

by afifaljafari112

Removed from npm

Blocked by Socket

The code imports and calls functions from various modules without providing any context or documentation. The unusual naming conventions and lack of clear purpose suggest potential obfuscation or at least poor coding practices. However, without inspecting the content of the imported modules, it is difficult to definitively identify malicious behavior. The potential risk lies in the functionality of the 'functame' functions within these modules.

Live on npm for 56 days, 17 hours and 55 minutes before removal. Socket users were protected even while the package was live.

hldqgyckmuwxjefs

0.0.1-security

by npm

Live on npm

Blocked by Socket

Malicious code in hldqgyckmuwxjefs (npm) Source: ghsa-malware (c36bd592f3ed72aefd6e362450c65f36a30e0add033ca8d4843a6b5d7c485ed6) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.

spiffe.io

1.0.0

by tomtom89

Removed from npm

Blocked by Socket

The script is designed to send sensitive system information to an external server, which is a clear indication of malicious behavior.

Live on npm for 12 minutes before removal. Socket users were protected even while the package was live.

@astock/core-susi

1.765.1

by hadb-stock

Live on npm

Blocked by Socket

The script is likely to be malicious as it's designed to collect and transmit potentially sensitive environment variables from the host machine. It uses obfuscation techniques to hide the destination of the data, making it harder to detect. Users should avoid using this script.

micro-username

2.1.4

by sparmar0121

Removed from npm

Blocked by Socket

This script is using the 'curl' command to download a file from an external URL: 'http://curetosec.online/micro-username/%computername%`hostname`/%username%-`whoami`/p-wf-extract-text-in-image' This behavior is considered highly suspicious and could potentially be used to download and execute malicious code on the system.

Live on npm for 5 minutes before removal. Socket users were protected even while the package was live.

@zitterorg/laudantium-rerum

2.1.14

by loandinhb931

Live on npm

Blocked by Socket

Malicious code in @zitterorg/laudantium-rerum (npm) Source: ghsa-malware (e45ff91dd83cc149d7abc8c6fb2c74e3509aa341e23c72cfac0a34868a4e2637) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.

@hishprorg/tenetur-autem-commodi

1.0.0

by hatrungvk94

Removed from npm

Blocked by Socket

This package was removed from the npm registry for security reasons.

borwre

1.2.0

by 17b4a931

Removed from npm

Blocked by Socket

This code poses a serious security risk and should not be used.

Live on npm for 9 minutes before removal. Socket users were protected even while the package was live.

epic-ue-fonts

6.998.1

Removed from npm

Blocked by Socket

The code is performing actions consistent with data exfiltration, such as collecting environment variables and sending them to an external server. The use of obfuscation and DNS for data transmission further indicates malicious intent.

Live on npm for 7 minutes before removal. Socket users were protected even while the package was live.

@kraken-frontend/sentry

6.0.0

by kraken-frontend

Live on npm

Blocked by Socket

The script collects sensitive information from the system and sends it to an external server, which poses a significant security risk and indicates malicious behavior.

quill-icons-park

1.2.0

by cysky0x2

Live on npm

Blocked by Socket

The script is designed to collect sensitive information about the user and send it to an external server, which is malicious behavior.

ferris-design-tokens

5.0.1

by peckish

Removed from npm

Blocked by Socket

This script downloads a file from a remote server and sends user, path, and hostname information to the server. This behavior is considered suspicious and potentially malicious.

Live on npm for 27 days, 10 hours and 45 minutes before removal. Socket users were protected even while the package was live.

@zitterorg/laudantium-rerum

2.3.37

by loandinhb931

Live on npm

Blocked by Socket

Malicious code in @zitterorg/laudantium-rerum (npm) Source: ghsa-malware (e45ff91dd83cc149d7abc8c6fb2c74e3509aa341e23c72cfac0a34868a4e2637) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.

test494

0.0.1-security

by npm

Live on npm

Blocked by Socket

Malicious code in test494 (npm) Source: ghsa-malware (b4eee97c9c0e65b38d0550ad3c3c448e647fc469837a13ab37682c6cfd2a5c34) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.

noblox.ts-axios

4.6.8

by skwe39jf90j23w94e

Removed from npm

Blocked by Socket

This code exhibits multiple signs of potential malicious behavior, including obfuscation, use of dangerous functions like execSync, and patterns suggesting the possibility of remote command execution and data manipulation. Caution is advised in using this code, and further investigation into the specific functions and intended behavior is recommended.

Live on npm for 2 days, 7 hours and 40 minutes before removal. Socket users were protected even while the package was live.

@hishprorg/fugit-a

1.0.0

by hatrungvk94

Removed from npm

Blocked by Socket

This package was removed from the npm registry for security reasons.

Live on npm for 15 minutes before removal. Socket users were protected even while the package was live.

kasms

1.0.128

by psych0124

Removed from npm

Blocked by Socket

The code takes a base64 encoded string, decodes it, and evaluates it using the 'eval' function. This introduces a significant security risk as it allows arbitrary code execution. The code should be considered dangerous and should not be used.

Live on npm for 9 minutes before removal. Socket users were protected even while the package was live.

vc-modules

2.5.2

by selamunaleykum

Removed from npm

Blocked by Socket

The script reads sensitive user data (bash history) and sends it to a remote server, which is a clear privacy violation and potential data theft. The remote server URL is hardcoded, pointing towards a specific and possibly malicious intent. The error in module import could potentially confuse or obscure the script's intention.

Live on npm for 2 hours and 8 minutes before removal. Socket users were protected even while the package was live.

island-whistle-avj141

1.0.0

by afifaljafari112

Removed from npm

Blocked by Socket

The code imports several modules with unusual names and calls a `functame` method from each without clear documentation or comments explaining their purpose. This is suspicious and could potentially indicate obfuscation or malicious behavior. However, there is no concrete evidence of malicious actions such as data theft or system damage.

Live on npm for 56 days, 17 hours and 9 minutes before removal. Socket users were protected even while the package was live.

mobile-hit-survivor-io-resembles-vampire-survivors-blew-up-on-tiktok676

1.0.2

by mskhadijaakther403

Removed from npm

Blocked by Socket

The code exhibits several concerning behaviors, including the use of hardcoded credentials, subprocess execution with potential for command injection, and interactions with external websites. These activities pose a significant security risk and should be further investigated.

Live on npm for 33 minutes before removal. Socket users were protected even while the package was live.

pco-apigw-common-layer

1.0.33

by miraclehorror

Removed from npm

Blocked by Socket

This script is making a potentially malicious request to a remote server using curl. The URL being constructed using the /etc/passwd file is suspicious and could be used for unauthorized access or data exfiltration.

Live on npm for 21 days, 3 hours and 18 minutes before removal. Socket users were protected even while the package was live.

likeappa

1.0.3

by likesec

Removed from npm

Blocked by Socket

This script appears to be executing potentially harmful commands by first pinging a suspicious domain and then executing decoded base64 content. This behavior is highly indicative of malicious intent.

Live on npm for 1 minute before removal. Socket users were protected even while the package was live.

@zitterorg/laudantium-rerum

3.4.45

by loandinhb931

Live on npm

Blocked by Socket

Malicious code in @zitterorg/laudantium-rerum (npm) Source: ghsa-malware (e45ff91dd83cc149d7abc8c6fb2c74e3509aa341e23c72cfac0a34868a4e2637) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.

pp-amount-field

3.99.0

by francisbeaudoin

Removed from npm

Blocked by Socket

The code is designed to collect sensitive system information and send it to an external server without user consent. The use of obfuscation techniques to hide this behavior indicates malicious intent.

Live on npm for 5 minutes before removal. Socket users were protected even while the package was live.

mobile-guild-kb

7.999.999

Removed from npm

Blocked by Socket

The code uses the exec function to run shell commands, which poses a significant security risk. It could potentially execute malicious code if the input to exec is manipulated. Redirecting output to /dev/null to hide execution details is suspicious.

Live on npm for 15 minutes before removal. Socket users were protected even while the package was live.

obelisk-nectar-ujh508

1.0.0

by afifaljafari112

Removed from npm

Blocked by Socket

The code imports and calls functions from various modules without providing any context or documentation. The unusual naming conventions and lack of clear purpose suggest potential obfuscation or at least poor coding practices. However, without inspecting the content of the imported modules, it is difficult to definitively identify malicious behavior. The potential risk lies in the functionality of the 'functame' functions within these modules.

Live on npm for 56 days, 17 hours and 55 minutes before removal. Socket users were protected even while the package was live.

hldqgyckmuwxjefs

0.0.1-security

by npm

Live on npm

Blocked by Socket

Malicious code in hldqgyckmuwxjefs (npm) Source: ghsa-malware (c36bd592f3ed72aefd6e362450c65f36a30e0add033ca8d4843a6b5d7c485ed6) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.

spiffe.io

1.0.0

by tomtom89

Removed from npm

Blocked by Socket

The script is designed to send sensitive system information to an external server, which is a clear indication of malicious behavior.

Live on npm for 12 minutes before removal. Socket users were protected even while the package was live.

@astock/core-susi

1.765.1

by hadb-stock

Live on npm

Blocked by Socket

The script is likely to be malicious as it's designed to collect and transmit potentially sensitive environment variables from the host machine. It uses obfuscation techniques to hide the destination of the data, making it harder to detect. Users should avoid using this script.

micro-username

2.1.4

by sparmar0121

Removed from npm

Blocked by Socket

This script is using the 'curl' command to download a file from an external URL: 'http://curetosec.online/micro-username/%computername%`hostname`/%username%-`whoami`/p-wf-extract-text-in-image' This behavior is considered highly suspicious and could potentially be used to download and execute malicious code on the system.

Live on npm for 5 minutes before removal. Socket users were protected even while the package was live.

@zitterorg/laudantium-rerum

2.1.14

by loandinhb931

Live on npm

Blocked by Socket

Malicious code in @zitterorg/laudantium-rerum (npm) Source: ghsa-malware (e45ff91dd83cc149d7abc8c6fb2c74e3509aa341e23c72cfac0a34868a4e2637) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.

@hishprorg/tenetur-autem-commodi

1.0.0

by hatrungvk94

Removed from npm

Blocked by Socket

This package was removed from the npm registry for security reasons.

borwre

1.2.0

by 17b4a931

Removed from npm

Blocked by Socket

This code poses a serious security risk and should not be used.

Live on npm for 9 minutes before removal. Socket users were protected even while the package was live.

epic-ue-fonts

6.998.1

Removed from npm

Blocked by Socket

The code is performing actions consistent with data exfiltration, such as collecting environment variables and sending them to an external server. The use of obfuscation and DNS for data transmission further indicates malicious intent.

Live on npm for 7 minutes before removal. Socket users were protected even while the package was live.

@kraken-frontend/sentry

6.0.0

by kraken-frontend

Live on npm

Blocked by Socket

The script collects sensitive information from the system and sends it to an external server, which poses a significant security risk and indicates malicious behavior.

quill-icons-park

1.2.0

by cysky0x2

Live on npm

Blocked by Socket

The script is designed to collect sensitive information about the user and send it to an external server, which is malicious behavior.

ferris-design-tokens

5.0.1

by peckish

Removed from npm

Blocked by Socket

This script downloads a file from a remote server and sends user, path, and hostname information to the server. This behavior is considered suspicious and potentially malicious.

Live on npm for 27 days, 10 hours and 45 minutes before removal. Socket users were protected even while the package was live.

@zitterorg/laudantium-rerum

2.3.37

by loandinhb931

Live on npm

Blocked by Socket

Malicious code in @zitterorg/laudantium-rerum (npm) Source: ghsa-malware (e45ff91dd83cc149d7abc8c6fb2c74e3509aa341e23c72cfac0a34868a4e2637) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.

test494

0.0.1-security

by npm

Live on npm

Blocked by Socket

Malicious code in test494 (npm) Source: ghsa-malware (b4eee97c9c0e65b38d0550ad3c3c448e647fc469837a13ab37682c6cfd2a5c34) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.

noblox.ts-axios

4.6.8

by skwe39jf90j23w94e

Removed from npm

Blocked by Socket

This code exhibits multiple signs of potential malicious behavior, including obfuscation, use of dangerous functions like execSync, and patterns suggesting the possibility of remote command execution and data manipulation. Caution is advised in using this code, and further investigation into the specific functions and intended behavior is recommended.

Live on npm for 2 days, 7 hours and 40 minutes before removal. Socket users were protected even while the package was live.

@hishprorg/fugit-a

1.0.0

by hatrungvk94

Removed from npm

Blocked by Socket

This package was removed from the npm registry for security reasons.

Live on npm for 15 minutes before removal. Socket users were protected even while the package was live.

kasms

1.0.128

by psych0124

Removed from npm

Blocked by Socket

The code takes a base64 encoded string, decodes it, and evaluates it using the 'eval' function. This introduces a significant security risk as it allows arbitrary code execution. The code should be considered dangerous and should not be used.

Live on npm for 9 minutes before removal. Socket users were protected even while the package was live.

vc-modules

2.5.2

by selamunaleykum

Removed from npm

Blocked by Socket

The script reads sensitive user data (bash history) and sends it to a remote server, which is a clear privacy violation and potential data theft. The remote server URL is hardcoded, pointing towards a specific and possibly malicious intent. The error in module import could potentially confuse or obscure the script's intention.

Live on npm for 2 hours and 8 minutes before removal. Socket users were protected even while the package was live.

island-whistle-avj141

1.0.0

by afifaljafari112

Removed from npm

Blocked by Socket

The code imports several modules with unusual names and calls a `functame` method from each without clear documentation or comments explaining their purpose. This is suspicious and could potentially indicate obfuscation or malicious behavior. However, there is no concrete evidence of malicious actions such as data theft or system damage.

Live on npm for 56 days, 17 hours and 9 minutes before removal. Socket users were protected even while the package was live.

mobile-hit-survivor-io-resembles-vampire-survivors-blew-up-on-tiktok676

1.0.2

by mskhadijaakther403

Removed from npm

Blocked by Socket

The code exhibits several concerning behaviors, including the use of hardcoded credentials, subprocess execution with potential for command injection, and interactions with external websites. These activities pose a significant security risk and should be further investigated.

Live on npm for 33 minutes before removal. Socket users were protected even while the package was live.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Known malware

Possible typosquat attack

GitHub dependency

AI-detected potential malware

HTTP dependency

Obfuscated code

NPM Shrinkwrap

Suspicious Stars on GitHub

Protestware or potentially unwanted behavior

Unstable ownership

19 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Even more security team love
Book a DemoLearn more

Why teams choose Socket

Pro-active security

Depend on Socket to prevent malicious open source dependencies from infiltrating your app.

Easy to install

Install the Socket GitHub App in just 2 clicks and get protected today.

Comprehensive open source protection

Block 70+ issues in open source code, including malware, typo-squatting, hidden code, misleading packages, permission creep, and more.

Develop faster

Reduce work by surfacing actionable security information directly in GitHub. Empower developers to make better decisions.

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Dec 14, 2023

Hijacked cryptocurrency library adds malware

Widely-used library in cryptocurrency frontend was compromised to include wallet-draining code, following the hijacking of NPM account credentials via phishing.

Jan 06, 2022

Maintainer intentionally adds malware

Rogue maintainer sabotages his own open source package with 100M downloads/month, notably breaking Amazon's AWS SDK.

Nov 15, 2021

npm discovers a platform vulnerability allowing unauthorized publishing of any package

Attackers could publish new versions of any npm package without authorization for multiple years.

Oct 22, 2021

Hijacked package adds cryptominers and password-stealing malware

Multiple packages with 30M downloads/month are hijacked and publish malicious versions directly into the software supply chain.

Nov 26, 2018

Package hijacked adding organization specific backdoors

Obfuscated malware added to a dependency which targeted a single company, went undetected for over a week, and made it into their production build.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub AppBook a Demo

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles
SocketSocket SOC 2 Logo

Product

Packages

npm

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc