
Security News
Follow-up and Clarification on Recent Malicious Ruby Gems Campaign
A clarification on our recent research investigating 60 malicious Ruby gems.
Quickly evaluate the security and health of any open source package.
imad213
1.4
Removed from PyPI
Blocked by Socket
This is a tool designed for Instagram engagement manipulation that collects and transmits Instagram credentials to multiple third-party services. While not traditional malware, it poses significant security risks to users by sending their credentials to untrusted services and could lead to account compromise or suspension for violating Instagram's terms of service.
Live on PyPI for 3 hours and 49 minutes before removal. Socket users were protected even while the package was live.
lito-core-lib
0.13.22
by uded3o2j6skwt
Removed from npm
Blocked by Socket
The package contains heavily obfuscated code that interacts with an Ethereum smart contract to retrieve data used in constructing a download URL specific to the user's operating system. Without user consent or validation, the code downloads an executable file from this URL and executes it in the background. This behavior allows for the execution of malicious code on the user's system.
Live on npm for 24 days, 15 hours and 34 minutes before removal. Socket users were protected even while the package was live.
req-management-ui
1.0.0
by efinace
Removed from npm
Blocked by Socket
The code appears to be malicious as it exfiltrates sensitive environment variables to an external server without any legitimate reason. This can lead to credential theft and is a significant security risk.
Live on npm for 2 hours and 36 minutes before removal. Socket users were protected even while the package was live.
@wellsfargo/sdk-ui
529.4.2
by neversummer.69
Live on npm
Blocked by Socket
This code is intentionally obfuscated and uses DNS queries to exfiltrate system information, which could be a significant security risk. The hardcoded domain and the potential data exfiltration raise concerns about privacy violations. This package should be reviewed carefully before being used.
llm-test
3.68.4
by salesforce2
Removed from npm
Blocked by Socket
The script is designed to capture the current user's identity and send it to a remote server, which is a clear indication of malicious behavior.
Live on npm for 9 days, 21 hours and 52 minutes before removal. Socket users were protected even while the package was live.
richness-client-side-validator
1.1.2
by richnessinc
Live on npm
Blocked by Socket
The package contains a hidden payload that targets Russian language users visiting Russian and Belarusian sites. For those users, it will disable user interaction and play a looping audio of the Ukrainian anthem after 3 days. This behavior is not disclosed in any documentation of the package and seriously disrupts user experience.
github.com/bishopfox/sliver
v1.4.7
Live on Go
Blocked by Socket
The code provides functionality for executing arbitrary shellcode and injecting libraries into processes, which are high-risk operations that can be exploited for malicious purposes. The use of unsafe memory operations and dynamic library injection are particularly concerning.
github.com/bishopfox/sliver
v1.5.13
Live on Go
Blocked by Socket
The code exhibits several features typical of malicious behavior, including the ability to execute arbitrary commands, manipulate the filesystem, and handle sensitive environment variables. The framework's name and functionality suggest potential use in unauthorized access. Caution is advised, and the code should not be used in a production environment.
calypso-eslint-overrides
1002.0.0
by k4r1it0
Removed from npm
Blocked by Socket
The code collects and sends potentially sensitive system data to a remote server without user consent, which is indicative of malicious behavior. This poses a significant security risk due to unauthorized data transmission.
Live on npm for 3 hours and 29 minutes before removal. Socket users were protected even while the package was live.
shein-icon
1.999.999
Removed from npm
Blocked by Socket
The code uses the exec function to run shell commands, which poses a significant security risk. It could potentially execute malicious code if the input to exec is manipulated. Redirecting output to /dev/null to hide execution details is suspicious.
Live on npm for 27 minutes before removal. Socket users were protected even while the package was live.
@swapkit/sdk
1.0.0-rc.50
by chillios
Live on npm
Blocked by Socket
The code contains cryptographic functions for AES encryption and authentication using GCM. However, it uses low-level buffer manipulation and bitwise operations that could introduce vulnerabilities. A thorough review and testing are necessary to ensure security.
@epic-social/store
0.0.999
by svennergr2
Live on npm
Blocked by Socket
While the execution of 'build.js' may be standard, the subsequent curl command raises concerns about potential data exfiltration or telemetry to an external server.
waffles-icons
1.344.7
by hdtacmp
Removed from npm
Blocked by Socket
The script exhibits malicious behavior by sending potentially sensitive environment variables to an external server without user consent. The use of obfuscation techniques and the suspicious domain further indicate malicious intent.
Live on npm for 11 minutes before removal. Socket users were protected even while the package was live.
solana-web3.js
1.98.0
by cryptoshiny.com
Removed from npm
Blocked by Socket
The code contains potentially malicious behavior by modifying system files to allow unauthorized access and sending sensitive information to an external server. This poses a significant security risk.
Live on npm for 25 days, 4 hours and 45 minutes before removal. Socket users were protected even while the package was live.
virtual-npm-lyft
99.9.9
by trickywhat
Removed from npm
Blocked by Socket
The code shows clear signs of data collection and exfiltration using DNS queries, which is a well-known method for bypassing firewall rules and exfiltrating data surreptitiously. This is likely malicious behavior designed to collect and transmit sensitive data from user environments without their knowledge.
Live on npm for 4 minutes before removal. Socket users were protected even while the package was live.
cli-command-with-alias
0.0.3
by dirto
Removed from npm
Blocked by Socket
The code is malicious as it collects and sends sensitive system information to an external server without user consent. The use of obfuscation further suggests an attempt to hide its true purpose.
Live on npm for 1 hour before removal. Socket users were protected even while the package was live.
dpd-cnf
9.1.4
Removed from npm
Blocked by Socket
The provided source code is performing malicious activities by exfiltrating sensitive system information to a remote server. This behavior is indicative of data theft and poses a significant security risk.
Live on npm for 1 hour and 31 minutes before removal. Socket users were protected even while the package was live.
mmp-client
0.0.3
by the_pikachu
Live on npm
Blocked by Socket
The script attempts to load a local module and ignores any errors that arise. This behavior is suspicious and could indicate an attempt to execute untrusted code without alerting the user.
router-parse
1.0.1
by oleksandrrozgon
Removed from npm
Blocked by Socket
The code exhibits behavior typical of malware, including data exfiltration and potential execution of arbitrary code. The use of obfuscation and eval() increases the security risk significantly.
Live on npm for 26 days, 23 hours and 6 minutes before removal. Socket users were protected even while the package was live.
isite
2022.2.3
by absunstar
Live on npm
Blocked by Socket
This file defines a sendEmail function that, instead of sending mail through a legitimate SMTP or trusted API, exfiltrates all provided email fields (from, to, subject, message) along with added metadata (source, from_email, to_email) via an unencrypted HTTP POST to the hardcoded endpoint http://emails[.]egytag[.]com/api/emails/add. The behavior occurs without user consent or configuration, leaks potentially sensitive message contents to an untrusted third party, and constitutes a deliberate data-theft backdoor.
koorie
2.4.58
by simonedelpopolo_
Removed from npm
Blocked by Socket
The code contains multiple security risks including potential command injection, improper handling of user input, and usage of external libraries with unknown behavior. Proper input validation and sanitization should be implemented to mitigate these risks. The dynamic execution of system commands and dynamic file path construction without proper validation pose significant security threats. Further review and hardening of the code are highly recommended.
Live on npm for 26 minutes before removal. Socket users were protected even while the package was live.
com.meta.xr.sdk.avatars
12.0.0
by jpdhackerone03
Removed from npm
Blocked by Socket
The source code exhibits behavior consistent with data exfiltration malware. It collects sensitive system information and sends it to external endpoints without user consent, posing a significant security risk.
Live on npm for 36 days, 9 hours and 44 minutes before removal. Socket users were protected even while the package was live.
iberia-analytics
999.9.9
by amigomioteconsidero22
Removed from npm
Blocked by Socket
The code is designed to exfiltrate system information by sending it to an external domain via DNS queries. This is a clear indication of malicious behavior, as it involves unauthorized data transmission without user consent.
Live on npm for 2 hours and 12 minutes before removal. Socket users were protected even while the package was live.
@meneprojects/body-parsers
1.0.3
by meneprojects
Live on npm
Blocked by Socket
The code is highly malicious and represents a severe supply chain security risk. It downloads and executes remote code dynamically using obfuscated techniques to evade detection. This behavior is characteristic of malware and backdoors, posing a critical threat to any system using this package. Immediate removal and investigation are strongly recommended.
azure-graphrbac
6.6.1000
Removed from npm
Blocked by Socket
Possible typosquat of [azure](https://socket.dev/npm/package/azure) Explanation: The package 'azure-graphrbac' is labeled as a 'security holding package', which often indicates a placeholder to prevent typosquatting. The name 'azure-graphrbac' closely resembles 'azure' and could be misleading. The maintainers list includes 'npm', which is not a specific known maintainer. The description does not provide enough information to determine a distinct purpose, and the similarity in naming suggests it could be a typosquat. azure-graphrbac is a security-holding package
Live on npm for 1 hour and 53 minutes before removal. Socket users were protected even while the package was live.
imad213
1.4
Removed from PyPI
Blocked by Socket
This is a tool designed for Instagram engagement manipulation that collects and transmits Instagram credentials to multiple third-party services. While not traditional malware, it poses significant security risks to users by sending their credentials to untrusted services and could lead to account compromise or suspension for violating Instagram's terms of service.
Live on PyPI for 3 hours and 49 minutes before removal. Socket users were protected even while the package was live.
lito-core-lib
0.13.22
by uded3o2j6skwt
Removed from npm
Blocked by Socket
The package contains heavily obfuscated code that interacts with an Ethereum smart contract to retrieve data used in constructing a download URL specific to the user's operating system. Without user consent or validation, the code downloads an executable file from this URL and executes it in the background. This behavior allows for the execution of malicious code on the user's system.
Live on npm for 24 days, 15 hours and 34 minutes before removal. Socket users were protected even while the package was live.
req-management-ui
1.0.0
by efinace
Removed from npm
Blocked by Socket
The code appears to be malicious as it exfiltrates sensitive environment variables to an external server without any legitimate reason. This can lead to credential theft and is a significant security risk.
Live on npm for 2 hours and 36 minutes before removal. Socket users were protected even while the package was live.
@wellsfargo/sdk-ui
529.4.2
by neversummer.69
Live on npm
Blocked by Socket
This code is intentionally obfuscated and uses DNS queries to exfiltrate system information, which could be a significant security risk. The hardcoded domain and the potential data exfiltration raise concerns about privacy violations. This package should be reviewed carefully before being used.
llm-test
3.68.4
by salesforce2
Removed from npm
Blocked by Socket
The script is designed to capture the current user's identity and send it to a remote server, which is a clear indication of malicious behavior.
Live on npm for 9 days, 21 hours and 52 minutes before removal. Socket users were protected even while the package was live.
richness-client-side-validator
1.1.2
by richnessinc
Live on npm
Blocked by Socket
The package contains a hidden payload that targets Russian language users visiting Russian and Belarusian sites. For those users, it will disable user interaction and play a looping audio of the Ukrainian anthem after 3 days. This behavior is not disclosed in any documentation of the package and seriously disrupts user experience.
github.com/bishopfox/sliver
v1.4.7
Live on Go
Blocked by Socket
The code provides functionality for executing arbitrary shellcode and injecting libraries into processes, which are high-risk operations that can be exploited for malicious purposes. The use of unsafe memory operations and dynamic library injection are particularly concerning.
github.com/bishopfox/sliver
v1.5.13
Live on Go
Blocked by Socket
The code exhibits several features typical of malicious behavior, including the ability to execute arbitrary commands, manipulate the filesystem, and handle sensitive environment variables. The framework's name and functionality suggest potential use in unauthorized access. Caution is advised, and the code should not be used in a production environment.
calypso-eslint-overrides
1002.0.0
by k4r1it0
Removed from npm
Blocked by Socket
The code collects and sends potentially sensitive system data to a remote server without user consent, which is indicative of malicious behavior. This poses a significant security risk due to unauthorized data transmission.
Live on npm for 3 hours and 29 minutes before removal. Socket users were protected even while the package was live.
shein-icon
1.999.999
Removed from npm
Blocked by Socket
The code uses the exec function to run shell commands, which poses a significant security risk. It could potentially execute malicious code if the input to exec is manipulated. Redirecting output to /dev/null to hide execution details is suspicious.
Live on npm for 27 minutes before removal. Socket users were protected even while the package was live.
@swapkit/sdk
1.0.0-rc.50
by chillios
Live on npm
Blocked by Socket
The code contains cryptographic functions for AES encryption and authentication using GCM. However, it uses low-level buffer manipulation and bitwise operations that could introduce vulnerabilities. A thorough review and testing are necessary to ensure security.
@epic-social/store
0.0.999
by svennergr2
Live on npm
Blocked by Socket
While the execution of 'build.js' may be standard, the subsequent curl command raises concerns about potential data exfiltration or telemetry to an external server.
waffles-icons
1.344.7
by hdtacmp
Removed from npm
Blocked by Socket
The script exhibits malicious behavior by sending potentially sensitive environment variables to an external server without user consent. The use of obfuscation techniques and the suspicious domain further indicate malicious intent.
Live on npm for 11 minutes before removal. Socket users were protected even while the package was live.
solana-web3.js
1.98.0
by cryptoshiny.com
Removed from npm
Blocked by Socket
The code contains potentially malicious behavior by modifying system files to allow unauthorized access and sending sensitive information to an external server. This poses a significant security risk.
Live on npm for 25 days, 4 hours and 45 minutes before removal. Socket users were protected even while the package was live.
virtual-npm-lyft
99.9.9
by trickywhat
Removed from npm
Blocked by Socket
The code shows clear signs of data collection and exfiltration using DNS queries, which is a well-known method for bypassing firewall rules and exfiltrating data surreptitiously. This is likely malicious behavior designed to collect and transmit sensitive data from user environments without their knowledge.
Live on npm for 4 minutes before removal. Socket users were protected even while the package was live.
cli-command-with-alias
0.0.3
by dirto
Removed from npm
Blocked by Socket
The code is malicious as it collects and sends sensitive system information to an external server without user consent. The use of obfuscation further suggests an attempt to hide its true purpose.
Live on npm for 1 hour before removal. Socket users were protected even while the package was live.
dpd-cnf
9.1.4
Removed from npm
Blocked by Socket
The provided source code is performing malicious activities by exfiltrating sensitive system information to a remote server. This behavior is indicative of data theft and poses a significant security risk.
Live on npm for 1 hour and 31 minutes before removal. Socket users were protected even while the package was live.
mmp-client
0.0.3
by the_pikachu
Live on npm
Blocked by Socket
The script attempts to load a local module and ignores any errors that arise. This behavior is suspicious and could indicate an attempt to execute untrusted code without alerting the user.
router-parse
1.0.1
by oleksandrrozgon
Removed from npm
Blocked by Socket
The code exhibits behavior typical of malware, including data exfiltration and potential execution of arbitrary code. The use of obfuscation and eval() increases the security risk significantly.
Live on npm for 26 days, 23 hours and 6 minutes before removal. Socket users were protected even while the package was live.
isite
2022.2.3
by absunstar
Live on npm
Blocked by Socket
This file defines a sendEmail function that, instead of sending mail through a legitimate SMTP or trusted API, exfiltrates all provided email fields (from, to, subject, message) along with added metadata (source, from_email, to_email) via an unencrypted HTTP POST to the hardcoded endpoint http://emails[.]egytag[.]com/api/emails/add. The behavior occurs without user consent or configuration, leaks potentially sensitive message contents to an untrusted third party, and constitutes a deliberate data-theft backdoor.
koorie
2.4.58
by simonedelpopolo_
Removed from npm
Blocked by Socket
The code contains multiple security risks including potential command injection, improper handling of user input, and usage of external libraries with unknown behavior. Proper input validation and sanitization should be implemented to mitigate these risks. The dynamic execution of system commands and dynamic file path construction without proper validation pose significant security threats. Further review and hardening of the code are highly recommended.
Live on npm for 26 minutes before removal. Socket users were protected even while the package was live.
com.meta.xr.sdk.avatars
12.0.0
by jpdhackerone03
Removed from npm
Blocked by Socket
The source code exhibits behavior consistent with data exfiltration malware. It collects sensitive system information and sends it to external endpoints without user consent, posing a significant security risk.
Live on npm for 36 days, 9 hours and 44 minutes before removal. Socket users were protected even while the package was live.
iberia-analytics
999.9.9
by amigomioteconsidero22
Removed from npm
Blocked by Socket
The code is designed to exfiltrate system information by sending it to an external domain via DNS queries. This is a clear indication of malicious behavior, as it involves unauthorized data transmission without user consent.
Live on npm for 2 hours and 12 minutes before removal. Socket users were protected even while the package was live.
@meneprojects/body-parsers
1.0.3
by meneprojects
Live on npm
Blocked by Socket
The code is highly malicious and represents a severe supply chain security risk. It downloads and executes remote code dynamically using obfuscated techniques to evade detection. This behavior is characteristic of malware and backdoors, posing a critical threat to any system using this package. Immediate removal and investigation are strongly recommended.
azure-graphrbac
6.6.1000
Removed from npm
Blocked by Socket
Possible typosquat of [azure](https://socket.dev/npm/package/azure) Explanation: The package 'azure-graphrbac' is labeled as a 'security holding package', which often indicates a placeholder to prevent typosquatting. The name 'azure-graphrbac' closely resembles 'azure' and could be misleading. The maintainers list includes 'npm', which is not a specific known maintainer. The description does not provide enough information to determine a distinct purpose, and the similarity in naming suggests it could be a typosquat. azure-graphrbac is a security-holding package
Live on npm for 1 hour and 53 minutes before removal. Socket users were protected even while the package was live.
Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.
Known malware
Possible typosquat attack
Chrome Extension Permission
Chrome Extension Wildcard Host Permission
NPM Shrinkwrap
Git dependency
HTTP dependency
Suspicious Stars on GitHub
Protestware or potentially unwanted behavior
Unstable ownership
Critical CVE
High CVE
Medium CVE
Low CVE
Bad dependency semver
Wildcard dependency
Unpopular package
Minified code
Socket optimized override available
Deprecated
Unmaintained
Explicitly Unlicensed Item
License Policy Violation
Misc. License Issues
Non-permissive License
Ambiguous License Classifier
Copyleft License
Unidentified License
No License Found
License exception
Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.
Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.
Nat Friedman
CEO at GitHub
Suz Hinton
Senior Software Engineer at Stripe
heck yes this is awesome!!! Congrats team 🎉👏
Matteo Collina
Node.js maintainer, Fastify lead maintainer
So awesome to see @SocketSecurity launch with a fresh approach! Excited to have supported the team from the early days.
DC Posch
Director of Technology at AppFolio, CTO at Dynasty
This is going to be super important, especially for crypto projects where a compromised dependency results in stolen user assets.
Luis Naranjo
Software Engineer at Microsoft
If software supply chain attacks through npm don't scare the shit out of you, you're not paying close enough attention.
@SocketSecurity sounds like an awesome product. I'll be using socket.dev instead of npmjs.org to browse npm packages going forward
Elena Nadolinski
Founder and CEO at Iron Fish
Huge congrats to @SocketSecurity! 🙌
Literally the only product that proactively detects signs of JS compromised packages.
Joe Previte
Engineering Team Lead at Coder
Congrats to @feross and the @SocketSecurity team on their seed funding! 🚀 It's been a big help for us at @CoderHQ and we appreciate what y'all are doing!
Josh Goldberg
Staff Developer at Codecademy
This is such a great idea & looks fantastic, congrats & good luck @feross + team!
The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.
Scott Roberts
CISO at UiPath
As a happy Socket customer, I've been impressed with how quickly they are adding value to the product, this move is a great step!
Yan Zhu
Head of Security at Brave, DEFCON, EFF, W3C
glad to hear some of the smartest people i know are working on (npm, etc.) supply chain security finally :). @SocketSecurity
Andrew Peterson
CEO and Co-Founder at Signal Sciences (acq. Fastly)
How do you track the validity of open source software libraries as they get updated? You're prob not. Check out @SocketSecurity and the updated tooling they launched.
Supply chain is a cluster in security as we all know and the tools from Socket are "duh" type tools to be implementing. Check them out and follow Feross Aboukhadijeh to see more updates coming from them in the future.
Zbyszek Tenerowicz
Senior Security Engineer at ConsenSys
socket.dev is getting more appealing by the hour
Devdatta Akhawe
Head of Security at Figma
The @SocketSecurity team is on fire! Amazing progress and I am exciting to see where they go next.
Sebastian Bensusan
Engineer Manager at Stripe
I find it surprising that we don't have _more_ supply chain attacks in software:
Imagine your airplane (the code running) was assembled (deployed) daily, with parts (dependencies) from internet strangers. How long until you get a bad part?
Excited for Socket to prevent this
Adam Baldwin
VP of Security at npm, Red Team at Auth0/Okta
Congrats to everyone at @SocketSecurity ❤️🤘🏻
Nico Waisman
CISO at Lyft
This is an area that I have personally been very focused on. As Nat Friedman said in the 2019 GitHub Universe keynote, Open Source won, and every time you add a new open source project you rely on someone else code and you rely on the people that build it.
This is both exciting and problematic. You are bringing real risk into your organization, and I'm excited to see progress in the industry from OpenSSF scorecards and package analyzers to the company that Feross Aboukhadijeh is building!
Depend on Socket to prevent malicious open source dependencies from infiltrating your app.
Install the Socket GitHub App in just 2 clicks and get protected today.
Block 70+ issues in open source code, including malware, typo-squatting, hidden code, misleading packages, permission creep, and more.
Reduce work by surfacing actionable security information directly in GitHub. Empower developers to make better decisions.
Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.
Dec 14, 2023
Hijacked cryptocurrency library adds malware
Widely-used library in cryptocurrency frontend was compromised to include wallet-draining code, following the hijacking of NPM account credentials via phishing.
Jan 06, 2022
Maintainer intentionally adds malware
Rogue maintainer sabotages his own open source package with 100M downloads/month, notably breaking Amazon's AWS SDK.
Nov 15, 2021
npm discovers a platform vulnerability allowing unauthorized publishing of any package
Attackers could publish new versions of any npm package without authorization for multiple years.
Oct 22, 2021
Hijacked package adds cryptominers and password-stealing malware
Multiple packages with 30M downloads/month are hijacked and publish malicious versions directly into the software supply chain.
Nov 26, 2018
Package hijacked adding organization specific backdoors
Obfuscated malware added to a dependency which targeted a single company, went undetected for over a week, and made it into their production build.
Get our latest security research, open source insights, and product updates.
Security News
A clarification on our recent research investigating 60 malicious Ruby gems.
Security News
ESLint now supports parallel linting with a new --concurrency flag, delivering major speed gains and closing a 10-year-old feature request.
Research
/Security News
A malicious Go module posing as an SSH brute forcer exfiltrates stolen credentials to a Telegram bot controlled by a Russian-speaking threat actor.