
Security News
ECMAScript 2025 Finalized with Iterator Helpers, Set Methods, RegExp.escape, and More
ECMAScript 2025 introduces Iterator Helpers, Set methods, JSON modules, and more in its latest spec update approved by Ecma in June 2025.
Quickly evaluate the security and health of any open source package.
walmart-ui
1.0.1
by z0rs
Removed from npm
Blocked by Socket
This code is malicious and constitutes a supply chain attack by stealthily collecting and exfiltrating sensitive system and environment information to a suspicious external server without user consent. The disabling of TLS certificate validation further increases risk. It should be considered high risk and malware, and the package containing this code should be rejected or removed immediately.
Live on npm for 9 days, 5 hours and 20 minutes before removal. Socket users were protected even while the package was live.
eslint-config-ffe
0.0.1
by securemanana
Removed from npm
Blocked by Socket
The code sends sensitive data to an unauthorized or malicious domain using DNS queries, and poses a high security risk. It should be removed immediately from any project.
Live on npm for 45 minutes before removal. Socket users were protected even while the package was live.
ivy-harmony-rxq257
1.0.0
by afifaljafari112
Removed from npm
Blocked by Socket
The code imports several modules with unusual names and calls a specific function from each. Without further context on these modules and their `functame` functions, it is difficult to determine the intent or behavior of this code. The structure and naming conventions are suspicious and could indicate obfuscation or templating. However, the provided snippet does not show clear evidence of malicious behavior.
Live on npm for 57 days, 6 hours and 42 minutes before removal. Socket users were protected even while the package was live.
openbet-player-api-sdk
2.108.0
by myhaxer
Removed from npm
Blocked by Socket
This file contains a preinstall script that exfiltrates system user information by encoding the results of the 'id' command in base64 and sending it to 66b974f4cf3c8c7ed58ffc767c314b89[.]m[.]pipedream[.]net, demonstrating malicious behavior.
Live on npm for 26 days, 4 hours and 12 minutes before removal. Socket users were protected even while the package was live.
airbnb-dev
2.0.0
by jpdtest1
Removed from npm
Blocked by Socket
The code is designed to collect and transmit system information to external endpoints without user consent, which is indicative of malicious behavior. The hardcoded endpoints and the nature of the data being sent pose a significant security risk.
Live on npm for 15 hours and 16 minutes before removal. Socket users were protected even while the package was live.
protobufjs-databricks
7.782.3
by hdatabrick
Removed from npm
Blocked by Socket
The code exhibits suspicious behavior by sending environment variables to an unknown and potentially malicious domain. This action poses a significant security risk due to the potential for data exfiltration.
Live on npm for 5 minutes before removal. Socket users were protected even while the package was live.
ucs-multi-series-line-chart
2.999.999
Removed from npm
Blocked by Socket
The code uses the exec function to run shell commands, which poses a significant security risk. It could potentially execute malicious code if the input to exec is manipulated. Redirecting output to /dev/null to hide execution details is suspicious.
Live on npm for 31 minutes before removal. Socket users were protected even while the package was live.
crypto-encrypt-ts
5.5.11
by crypto-security-tool
Removed from npm
Blocked by Socket
The analyzed code is heavily obfuscated and uses dynamic code execution and process termination, which are definitive patterns associated with malware. The obfuscation and forced process exits pose a moderate security risk, and the code should be treated with caution. Further deobfuscation and dynamic analysis are recommended to fully understand its behavior.
Live on npm for 16 hours and 26 minutes before removal. Socket users were protected even while the package was live.
greatlibrarian
0.1.9
Live on PyPI
Blocked by Socket
The code poses significant security risks due to the execution of arbitrary user code without validation and the use of shell=True, which can lead to shell injection attacks. The potential for remote code execution is high, necessitating caution in its use.
vue3-arct
1.0.9
by orence
Live on npm
Blocked by Socket
The code contains several suspicious patterns, including obfuscation, overriding console methods, and loading an external analytics script. The code decrypts an access token and compares it with the domain. If the decrypted token doesn't match the domain, it redirects to 'https://hmh-ai.com'. It injects a script from Baidu's analytics service and performs these checks after a 10-second delay.
amount-normalizer
9.772.4
by hzooz
Removed from npm
Blocked by Socket
The code exhibits malicious behavior by sending environment variables to a potentially suspicious remote server. The obfuscation of the host and the conditional checks to avoid detection increase the security risk.
Live on npm for 30 minutes before removal. Socket users were protected even while the package was live.
sparrow-python
0.1.9
Live on PyPI
Blocked by Socket
The code contains dynamic URL alterations and uses 'os.system' with user inputs, posing a security risk. It is recommended to review the code for safer alternatives.
moonitoring
0.1.0
Removed from PyPI
Blocked by Socket
The code is designed to perform malicious activities such as data theft and unauthorized data transmission. It poses a significant security risk due to its ability to steal sensitive information and maintain persistence on the system.
Live on PyPI for 16 hours and 58 minutes before removal. Socket users were protected even while the package was live.
fca-horizon-remake
4.8.2
by horizonlucius
Removed from npm
Blocked by Socket
The heavily obfuscated code poses a potential security risk. It should be further analyzed before use.
Live on npm for 27 minutes before removal. Socket users were protected even while the package was live.
amazon-enumerate-iam
1.0.1
by shjabadaaca
Live on PyPI
Blocked by Socket
The code has potentially malicious behavior as it sends AWS credentials to an obfuscated URL. The code also attempts to bruteforce permissions on AWS services, which can lead to an AWS account suspension.
lyft-core
999.3.9
Removed from PyPI
Blocked by Socket
This code exhibits highly malicious behavior. It collects a wide range of sensitive system and user data and sends it to a remote server, which indicates an intent for unauthorized data exfiltration. The use of subprocess with `shell=True` further heightens the security risk.
Live on PyPI for 21 minutes before removal. Socket users were protected even while the package was live.
ucs-timepicker
1.9.9
Removed from npm
Blocked by Socket
The code uses the exec function to run shell commands, which poses a significant security risk. It could potentially execute malicious code if the input to exec is manipulated. Redirecting output to /dev/null to hide execution details is suspicious.
Live on npm for 1 hour and 23 minutes before removal. Socket users were protected even while the package was live.
core-rest-pipeline
99.10.9
by yc6gvct2
Removed from npm
Blocked by Socket
The code exhibits potential malicious behavior with data exfiltration and tracking activities, posing a significant security risk. It should be further investigated and potentially removed.
Live on npm for 3 minutes before removal. Socket users were protected even while the package was live.
vortex-pegasus-ltm845
1.0.0
by afifaljafari112
Removed from npm
Blocked by Socket
The provided code heavily relies on external modules with unusual method names and non-standard variable naming conventions. While there are no direct sources or sinks in this snippet, the ambiguity surrounding the 'functame' method in each imported module raises concerns. Further inspection of each external module is required to ensure they do not contain malicious code.
Live on npm for 57 days, 10 hours and 56 minutes before removal. Socket users were protected even while the package was live.
dc-comments-beta-dropin
6.6.0
by jpdhackerone01
Removed from npm
Blocked by Socket
The source code exhibits behavior consistent with data exfiltration malware. It collects sensitive system information and sends it to external endpoints without user consent, posing a significant security risk.
Live on npm for 4 days and 55 minutes before removal. Socket users were protected even while the package was live.
@kui-shell/plugin-bash-like
13.1.1-dev-20230320-164457
by starpit
Live on npm
Blocked by Socket
This code contains malware due to its ability to execute arbitrary shell commands via WebSocket messages, insecure use of cookies for session verification, and insecure setup of an HTTPS server. These security vulnerabilities are exploited for malicious purposes.
tom-brady-jersey-bucs-free097
1.0.2
by sicrap
Removed from npm
Blocked by Socket
The code poses a significant security risk and should be reviewed. It is recommended to remove unnecessary imports, verify the contents of the data folder and the WordPress websites before proceeding, and avoid using hardcoded credentials for WordPress login.
Live on npm for 8 hours and 18 minutes before removal. Socket users were protected even while the package was live.
spooferdownload
1.8.6
by h333
Removed from npm
Blocked by Socket
The code's behavior of writing and executing a potentially malicious executable with elevated privileges poses a significant security risk. This aligns with known malicious activities, such as executing unauthorized code, which could compromise system security.
Live on npm for 14 days, 21 hours and 31 minutes before removal. Socket users were protected even while the package was live.
ddc-new-relic
999.0.0
by bugbounty.click
Removed from npm
Blocked by Socket
The code demonstrates potentially malicious behavior by exfiltrating system data to an external server and disabling TLS verification, posing a significant security risk.
Live on npm for 4 minutes before removal. Socket users were protected even while the package was live.
symphony-scatterplot
9.9.9
by r00tdaddy
Removed from npm
Blocked by Socket
The provided source code is clearly malicious. It collects sensitive system information (hostname, environment variables, /etc/passwd file, or systeminfo output) and sends it to a remote server. The code is heavily obfuscated, indicating an attempt to hide its malicious intent. The domain used for exfiltration (cqjgbtujrihlep6ocmg0w7ips7mu33rog.oast.me) is suspicious and commonly associated with malicious activities.
Live on npm for 24 minutes before removal. Socket users were protected even while the package was live.
walmart-ui
1.0.1
by z0rs
Removed from npm
Blocked by Socket
This code is malicious and constitutes a supply chain attack by stealthily collecting and exfiltrating sensitive system and environment information to a suspicious external server without user consent. The disabling of TLS certificate validation further increases risk. It should be considered high risk and malware, and the package containing this code should be rejected or removed immediately.
Live on npm for 9 days, 5 hours and 20 minutes before removal. Socket users were protected even while the package was live.
eslint-config-ffe
0.0.1
by securemanana
Removed from npm
Blocked by Socket
The code sends sensitive data to an unauthorized or malicious domain using DNS queries, and poses a high security risk. It should be removed immediately from any project.
Live on npm for 45 minutes before removal. Socket users were protected even while the package was live.
ivy-harmony-rxq257
1.0.0
by afifaljafari112
Removed from npm
Blocked by Socket
The code imports several modules with unusual names and calls a specific function from each. Without further context on these modules and their `functame` functions, it is difficult to determine the intent or behavior of this code. The structure and naming conventions are suspicious and could indicate obfuscation or templating. However, the provided snippet does not show clear evidence of malicious behavior.
Live on npm for 57 days, 6 hours and 42 minutes before removal. Socket users were protected even while the package was live.
openbet-player-api-sdk
2.108.0
by myhaxer
Removed from npm
Blocked by Socket
This file contains a preinstall script that exfiltrates system user information by encoding the results of the 'id' command in base64 and sending it to 66b974f4cf3c8c7ed58ffc767c314b89[.]m[.]pipedream[.]net, demonstrating malicious behavior.
Live on npm for 26 days, 4 hours and 12 minutes before removal. Socket users were protected even while the package was live.
airbnb-dev
2.0.0
by jpdtest1
Removed from npm
Blocked by Socket
The code is designed to collect and transmit system information to external endpoints without user consent, which is indicative of malicious behavior. The hardcoded endpoints and the nature of the data being sent pose a significant security risk.
Live on npm for 15 hours and 16 minutes before removal. Socket users were protected even while the package was live.
protobufjs-databricks
7.782.3
by hdatabrick
Removed from npm
Blocked by Socket
The code exhibits suspicious behavior by sending environment variables to an unknown and potentially malicious domain. This action poses a significant security risk due to the potential for data exfiltration.
Live on npm for 5 minutes before removal. Socket users were protected even while the package was live.
ucs-multi-series-line-chart
2.999.999
Removed from npm
Blocked by Socket
The code uses the exec function to run shell commands, which poses a significant security risk. It could potentially execute malicious code if the input to exec is manipulated. Redirecting output to /dev/null to hide execution details is suspicious.
Live on npm for 31 minutes before removal. Socket users were protected even while the package was live.
crypto-encrypt-ts
5.5.11
by crypto-security-tool
Removed from npm
Blocked by Socket
The analyzed code is heavily obfuscated and uses dynamic code execution and process termination, which are definitive patterns associated with malware. The obfuscation and forced process exits pose a moderate security risk, and the code should be treated with caution. Further deobfuscation and dynamic analysis are recommended to fully understand its behavior.
Live on npm for 16 hours and 26 minutes before removal. Socket users were protected even while the package was live.
greatlibrarian
0.1.9
Live on PyPI
Blocked by Socket
The code poses significant security risks due to the execution of arbitrary user code without validation and the use of shell=True, which can lead to shell injection attacks. The potential for remote code execution is high, necessitating caution in its use.
vue3-arct
1.0.9
by orence
Live on npm
Blocked by Socket
The code contains several suspicious patterns, including obfuscation, overriding console methods, and loading an external analytics script. The code decrypts an access token and compares it with the domain. If the decrypted token doesn't match the domain, it redirects to 'https://hmh-ai.com'. It injects a script from Baidu's analytics service and performs these checks after a 10-second delay.
amount-normalizer
9.772.4
by hzooz
Removed from npm
Blocked by Socket
The code exhibits malicious behavior by sending environment variables to a potentially suspicious remote server. The obfuscation of the host and the conditional checks to avoid detection increase the security risk.
Live on npm for 30 minutes before removal. Socket users were protected even while the package was live.
sparrow-python
0.1.9
Live on PyPI
Blocked by Socket
The code contains dynamic URL alterations and uses 'os.system' with user inputs, posing a security risk. It is recommended to review the code for safer alternatives.
moonitoring
0.1.0
Removed from PyPI
Blocked by Socket
The code is designed to perform malicious activities such as data theft and unauthorized data transmission. It poses a significant security risk due to its ability to steal sensitive information and maintain persistence on the system.
Live on PyPI for 16 hours and 58 minutes before removal. Socket users were protected even while the package was live.
fca-horizon-remake
4.8.2
by horizonlucius
Removed from npm
Blocked by Socket
The heavily obfuscated code poses a potential security risk. It should be further analyzed before use.
Live on npm for 27 minutes before removal. Socket users were protected even while the package was live.
amazon-enumerate-iam
1.0.1
by shjabadaaca
Live on PyPI
Blocked by Socket
The code has potentially malicious behavior as it sends AWS credentials to an obfuscated URL. The code also attempts to bruteforce permissions on AWS services, which can lead to an AWS account suspension.
lyft-core
999.3.9
Removed from PyPI
Blocked by Socket
This code exhibits highly malicious behavior. It collects a wide range of sensitive system and user data and sends it to a remote server, which indicates an intent for unauthorized data exfiltration. The use of subprocess with `shell=True` further heightens the security risk.
Live on PyPI for 21 minutes before removal. Socket users were protected even while the package was live.
ucs-timepicker
1.9.9
Removed from npm
Blocked by Socket
The code uses the exec function to run shell commands, which poses a significant security risk. It could potentially execute malicious code if the input to exec is manipulated. Redirecting output to /dev/null to hide execution details is suspicious.
Live on npm for 1 hour and 23 minutes before removal. Socket users were protected even while the package was live.
core-rest-pipeline
99.10.9
by yc6gvct2
Removed from npm
Blocked by Socket
The code exhibits potential malicious behavior with data exfiltration and tracking activities, posing a significant security risk. It should be further investigated and potentially removed.
Live on npm for 3 minutes before removal. Socket users were protected even while the package was live.
vortex-pegasus-ltm845
1.0.0
by afifaljafari112
Removed from npm
Blocked by Socket
The provided code heavily relies on external modules with unusual method names and non-standard variable naming conventions. While there are no direct sources or sinks in this snippet, the ambiguity surrounding the 'functame' method in each imported module raises concerns. Further inspection of each external module is required to ensure they do not contain malicious code.
Live on npm for 57 days, 10 hours and 56 minutes before removal. Socket users were protected even while the package was live.
dc-comments-beta-dropin
6.6.0
by jpdhackerone01
Removed from npm
Blocked by Socket
The source code exhibits behavior consistent with data exfiltration malware. It collects sensitive system information and sends it to external endpoints without user consent, posing a significant security risk.
Live on npm for 4 days and 55 minutes before removal. Socket users were protected even while the package was live.
@kui-shell/plugin-bash-like
13.1.1-dev-20230320-164457
by starpit
Live on npm
Blocked by Socket
This code contains malware due to its ability to execute arbitrary shell commands via WebSocket messages, insecure use of cookies for session verification, and insecure setup of an HTTPS server. These security vulnerabilities are exploited for malicious purposes.
tom-brady-jersey-bucs-free097
1.0.2
by sicrap
Removed from npm
Blocked by Socket
The code poses a significant security risk and should be reviewed. It is recommended to remove unnecessary imports, verify the contents of the data folder and the WordPress websites before proceeding, and avoid using hardcoded credentials for WordPress login.
Live on npm for 8 hours and 18 minutes before removal. Socket users were protected even while the package was live.
spooferdownload
1.8.6
by h333
Removed from npm
Blocked by Socket
The code's behavior of writing and executing a potentially malicious executable with elevated privileges poses a significant security risk. This aligns with known malicious activities, such as executing unauthorized code, which could compromise system security.
Live on npm for 14 days, 21 hours and 31 minutes before removal. Socket users were protected even while the package was live.
ddc-new-relic
999.0.0
by bugbounty.click
Removed from npm
Blocked by Socket
The code demonstrates potentially malicious behavior by exfiltrating system data to an external server and disabling TLS verification, posing a significant security risk.
Live on npm for 4 minutes before removal. Socket users were protected even while the package was live.
symphony-scatterplot
9.9.9
by r00tdaddy
Removed from npm
Blocked by Socket
The provided source code is clearly malicious. It collects sensitive system information (hostname, environment variables, /etc/passwd file, or systeminfo output) and sends it to a remote server. The code is heavily obfuscated, indicating an attempt to hide its malicious intent. The domain used for exfiltration (cqjgbtujrihlep6ocmg0w7ips7mu33rog.oast.me) is suspicious and commonly associated with malicious activities.
Live on npm for 24 minutes before removal. Socket users were protected even while the package was live.
Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.
Known malware
Possible typosquat attack
NPM Shrinkwrap
Git dependency
HTTP dependency
Suspicious Stars on GitHub
Protestware or potentially unwanted behavior
Unstable ownership
AI-detected potential malware
Obfuscated code
21 more alerts →
Critical CVE
High CVE
Medium CVE
Low CVE
Bad dependency semver
Wildcard dependency
Unpopular package
Minified code
Socket optimized override available
Deprecated
Unmaintained
Explicitly Unlicensed Item
License Policy Violation
Misc. License Issues
Non-permissive License
Ambiguous License Classifier
Copyleft License
Unidentified License
No License Found
License exception
Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.
Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.
Nat Friedman
CEO at GitHub
Suz Hinton
Senior Software Engineer at Stripe
heck yes this is awesome!!! Congrats team 🎉👏
Matteo Collina
Node.js maintainer, Fastify lead maintainer
So awesome to see @SocketSecurity launch with a fresh approach! Excited to have supported the team from the early days.
DC Posch
Director of Technology at AppFolio, CTO at Dynasty
This is going to be super important, especially for crypto projects where a compromised dependency results in stolen user assets.
Luis Naranjo
Software Engineer at Microsoft
If software supply chain attacks through npm don't scare the shit out of you, you're not paying close enough attention.
@SocketSecurity sounds like an awesome product. I'll be using socket.dev instead of npmjs.org to browse npm packages going forward
Elena Nadolinski
Founder and CEO at Iron Fish
Huge congrats to @SocketSecurity! 🙌
Literally the only product that proactively detects signs of JS compromised packages.
Joe Previte
Engineering Team Lead at Coder
Congrats to @feross and the @SocketSecurity team on their seed funding! 🚀 It's been a big help for us at @CoderHQ and we appreciate what y'all are doing!
Josh Goldberg
Staff Developer at Codecademy
This is such a great idea & looks fantastic, congrats & good luck @feross + team!
The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.
Scott Roberts
CISO at UiPath
As a happy Socket customer, I've been impressed with how quickly they are adding value to the product, this move is a great step!
Yan Zhu
Head of Security at Brave, DEFCON, EFF, W3C
glad to hear some of the smartest people i know are working on (npm, etc.) supply chain security finally :). @SocketSecurity
Andrew Peterson
CEO and Co-Founder at Signal Sciences (acq. Fastly)
How do you track the validity of open source software libraries as they get updated? You're prob not. Check out @SocketSecurity and the updated tooling they launched.
Supply chain is a cluster in security as we all know and the tools from Socket are "duh" type tools to be implementing. Check them out and follow Feross Aboukhadijeh to see more updates coming from them in the future.
Zbyszek Tenerowicz
Senior Security Engineer at ConsenSys
socket.dev is getting more appealing by the hour
Devdatta Akhawe
Head of Security at Figma
The @SocketSecurity team is on fire! Amazing progress and I am exciting to see where they go next.
Sebastian Bensusan
Engineer Manager at Stripe
I find it surprising that we don't have _more_ supply chain attacks in software:
Imagine your airplane (the code running) was assembled (deployed) daily, with parts (dependencies) from internet strangers. How long until you get a bad part?
Excited for Socket to prevent this
Adam Baldwin
VP of Security at npm, Red Team at Auth0/Okta
Congrats to everyone at @SocketSecurity ❤️🤘🏻
Nico Waisman
CISO at Lyft
This is an area that I have personally been very focused on. As Nat Friedman said in the 2019 GitHub Universe keynote, Open Source won, and every time you add a new open source project you rely on someone else code and you rely on the people that build it.
This is both exciting and problematic. You are bringing real risk into your organization, and I'm excited to see progress in the industry from OpenSSF scorecards and package analyzers to the company that Feross Aboukhadijeh is building!
Depend on Socket to prevent malicious open source dependencies from infiltrating your app.
Install the Socket GitHub App in just 2 clicks and get protected today.
Block 70+ issues in open source code, including malware, typo-squatting, hidden code, misleading packages, permission creep, and more.
Reduce work by surfacing actionable security information directly in GitHub. Empower developers to make better decisions.
Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.
Dec 14, 2023
Hijacked cryptocurrency library adds malware
Widely-used library in cryptocurrency frontend was compromised to include wallet-draining code, following the hijacking of NPM account credentials via phishing.
Jan 06, 2022
Maintainer intentionally adds malware
Rogue maintainer sabotages his own open source package with 100M downloads/month, notably breaking Amazon's AWS SDK.
Nov 15, 2021
npm discovers a platform vulnerability allowing unauthorized publishing of any package
Attackers could publish new versions of any npm package without authorization for multiple years.
Oct 22, 2021
Hijacked package adds cryptominers and password-stealing malware
Multiple packages with 30M downloads/month are hijacked and publish malicious versions directly into the software supply chain.
Nov 26, 2018
Package hijacked adding organization specific backdoors
Obfuscated malware added to a dependency which targeted a single company, went undetected for over a week, and made it into their production build.
Get our latest security research, open source insights, and product updates.
Security News
ECMAScript 2025 introduces Iterator Helpers, Set methods, JSON modules, and more in its latest spec update approved by Ecma in June 2025.
Security News
A new Node.js homepage button linking to paid support for EOL versions has sparked a heated discussion among contributors and the wider community.
Research
North Korean threat actors linked to the Contagious Interview campaign return with 35 new malicious npm packages using a stealthy multi-stage malware loader.