
Security News
New Website “Is It Really FOSS?” Tracks Transparency in Open Source Distribution Models
A new site reviews software projects to reveal if they’re truly FOSS, making complex licensing and distribution models easy to understand.
Quickly evaluate the security and health of any open source package.
godaddy-model
999.9.9
by amigomioteconsidero19
Removed from npm
Blocked by Socket
The code is designed to exfiltrate system information by sending it to an external domain via DNS queries. This is a clear indication of malicious behavior, as it involves unauthorized data transmission without user consent.
Live on npm for 17 minutes before removal. Socket users were protected even while the package was live.
agentkpalive
4.5.0
by uj7f3wd16zwbu
Live on npm
Blocked by Socket
The code exhibits several characteristics typical of potentially malicious software, including obfuscation, downloading and executing files, and recursive error handling. These behaviors suggest a high risk of executing untrusted code, which could compromise the system.
litelemdent
1.2.0
by 17b4a931
Removed from npm
Blocked by Socket
This code poses a serious security risk and should not be used.
Live on npm for 38 minutes before removal. Socket users were protected even while the package was live.
cmft-utils
1.98.98
Removed from npm
Blocked by Socket
This code exhibits malicious behavior by collecting sensitive system information (OS type, username, current working directory, hostname, and IP addresses), encoding this data in base64, and sending it to a remote server (http://149[.]104[.]26[.]89/cmd.dat). It also attempts to download and execute a binary payload from the same server, which could lead to further compromise. The code includes environment checks to determine if it's running in a sandbox, suggesting an attempt to evade detection. After execution, it attempts to delete files to cover its tracks. The code is heavily obfuscated to make analysis difficult.
Live on npm for 4 days, 4 hours and 23 minutes before removal. Socket users were protected even while the package was live.
iberia-database
999.9.9
by amigomioteconsidero23
Removed from npm
Blocked by Socket
The code is designed to exfiltrate system information by sending it to an external domain via DNS queries. This is a clear indication of malicious behavior, as it involves unauthorized data transmission without user consent.
Live on npm for 1 hour and 55 minutes before removal. Socket users were protected even while the package was live.
@linx-ui/shared
1.0.0
by banditnikhil
Live on npm
Blocked by Socket
The code snippet exhibits malicious behavior by sending the current working directory to an external domain without user consent. This poses a significant security risk due to unauthorized data exfiltration.
async-query-data
1.4.1
by smaroop
Removed from npm
Blocked by Socket
The source code exhibits behavior typical of malicious software by collecting and sending sensitive system information to a remote server without user consent. This poses a significant security risk and could potentially be used for data theft or unauthorized tracking.
Live on npm for 6 hours and 15 minutes before removal. Socket users were protected even while the package was live.
18f-dashboard
1.19.999
Removed from npm
Blocked by Socket
The code is attempting to exfiltrate system information by sending it over the network using the ping command. This behavior is potentially malicious as it may result in data leakage or unauthorized access to sensitive information.
Live on npm for 38 minutes before removal. Socket users were protected even while the package was live.
tiktok_4d_webapp
9.0.0
by imd4x
Removed from npm
Blocked by Socket
The script triggers an outbound network request during its preinstall phase by executing a curl command on a shortened URL (example[.]com/JR006D). The use of such a URL is concerning because link shortening services can obscure the true destination and are often employed for tracking user data, exfiltration, or delivering malicious payloads. This behavior indicates a potential attempt to compromise system security and user privacy.
Live on npm for 36 days and 4 hours before removal. Socket users were protected even while the package was live.
cfa-styleguide
2.0.9
by maddyattacker
Removed from npm
Blocked by Socket
This code is highly suspicious and potentially malicious. It should not be used without further investigation and review.
Live on npm for 6 minutes before removal. Socket users were protected even while the package was live.
igshared
8.1.2
by mgzsec
Removed from npm
Blocked by Socket
This code is malicious and poses a high security risk. It covertly collects and sends sensitive system and environment information to a remote Telegram bot without user consent, constituting data theft. The presence of hardcoded credentials and use of a public messaging platform for exfiltration further confirm its malicious intent. The code is not obfuscated but is designed for stealthy data exfiltration. It should be treated as malware and avoided.
Live on npm for 11 days, 19 hours and 44 minutes before removal. Socket users were protected even while the package was live.
replace
0.2.0
by harth
Live on npm
Blocked by Socket
This package contains a critical code injection vulnerability through the eval() function that executes arbitrary JavaScript from user-specified files. This represents an extremely high security risk that could lead to complete system compromise, data theft, or backdoor installation.
idp-shared-node-library
999.999.999
Removed from npm
Blocked by Socket
The source code is performing clear malicious activities by exfiltrating system data to a remote server. This justifies high scores in malware, obfuscation, and risk categories. The provided reports do not contain useful information, but the code itself clearly indicates a serious security incident.
Live on npm for 1 hour and 7 minutes before removal. Socket users were protected even while the package was live.
@uniqa/document-ms-api
77.77.77
by toni4242
Live on npm
Blocked by Socket
The code sends sensitive system information over the network without user consent, which poses a significant privacy risk. This behavior is indicative of potentially malicious intent.
typescript-react-redux-boilerplate
1.1.0
by nkdjcidcn
Removed from npm
Blocked by Socket
This file collects sensitive system and user information (home directory, username, hostname, DNS servers, etc.) and sends it to a remote server at hg1as3ob4o9c1ew54a142gz02r8iw8kx[.]oastify[.]com without user knowledge or consent. It also writes this data to a local file (poc.txt). Such unauthorized data collection and transmission is malicious and poses a high security risk.
Live on npm for 8 days, 9 hours and 23 minutes before removal. Socket users were protected even while the package was live.
azure-graphrbac
6.29.1000
Removed from npm
Blocked by Socket
The code appears to be malicious. It exfiltrates sensitive system information and project-specific data to external servers. The use of continuous directory traversal and sending potentially confidential data to suspicious domains indicates high probability of malicious intent.
Live on npm for 1 hour before removal. Socket users were protected even while the package was live.
thispackagedoesnotexist
0.8.6
Removed from PyPI
Blocked by Socket
The code poses a potential security risk due to the execution of system commands without clear input validation and sanitization. However, without a detailed report and more context, the actual risk and intent are difficult to assess.
Live on PyPI for 4 hours and 56 minutes before removal. Socket users were protected even while the package was live.
graphlibcore
2.2.10
by taylortech
Removed from npm
Blocked by Socket
This script embeds two Base64-encoded, AES-GCM–encrypted blobs that it decrypts at runtime to obtain a command-and-control hostname and then a payload URL. It resolves the decrypted hostname via DNS (requires exactly one A record), uses that IP as the decryption key for the second blob, and retrieves a remote JavaScript payload over HTTP(S). The payload is saved as “startup.js” inside the user’s Chrome data Scripts folder, patched to reference the correct absolute Node.js path, marked executable, and launched in a detached Node.js process without user consent. After a short delay it deletes its own source file (__filename), removes the accompanying graph-settings.min.js, and patches graph.js to strip out its initialization calls—clearly a self-deleting downloader/backdoor implant.
Live on npm for 6 days, 2 hours and 52 minutes before removal. Socket users were protected even while the package was live.
mobilecoin-wallet
99.9.9
by zvalid123
Removed from npm
Blocked by Socket
The script collects information like hostname, platform, user info, and current working directory, then sends it as base64-encoded JSON to a remote server.
Live on npm for 3 days, 6 hours and 30 minutes before removal. Socket users were protected even while the package was live.
npm-cnof
0.0.1-security.7
Removed from npm
Blocked by Socket
Possible typosquat of npm-conf
Live on npm for 1 hour and 46 minutes before removal. Socket users were protected even while the package was live.
pictogrameditor
3.3.3
Removed from npm
Blocked by Socket
This script is attempting to exfiltrate system information to a remote server. This behavior is highly suspicious and poses a significant security risk.
Live on npm for 52 minutes before removal. Socket users were protected even while the package was live.
@cvent-wdio/wdio-configs
0.1.17
by elijahsey
Live on npm
Blocked by Socket
This package's 'postinstall' script executes 'ip a' to retrieve network interface information and sends it to a remote server via an HTTP POST request to 'http://nkbri3r9b8ddoze1m3pfjzhcc3it6i[.]burp[.]gdsburp[.]com/'. If this request fails, it attempts to download data from the same server using 'wget'. This behavior exfiltrates potentially sensitive system information without user consent and is indicative of malware.
multicogs
1.1.3
by theliondoesntconcernhimselfwithusernames
Removed from npm
Blocked by Socket
The analyzed code is a malicious Discord token stealer that exfiltrates authentication tokens and sensitive user data to an attacker-controlled webhook. It poses a severe security risk by enabling unauthorized account access, privacy violations, and potential financial fraud. The code is not obfuscated but is clearly designed for malicious purposes. It should be considered highly dangerous and avoided.
Live on npm for 13 hours and 30 minutes before removal. Socket users were protected even while the package was live.
nordic-dev
6.14.3
by h001_mrcd0
Removed from npm
Blocked by Socket
The code exhibits malicious behavior by exfiltrating environment variables to an external domain. This poses a significant security risk due to the potential exposure of sensitive information.
Live on npm for 1 hour and 25 minutes before removal. Socket users were protected even while the package was live.
@xunlie/vue-clickout
1.0.0
by xunlie
Live on npm
Blocked by Socket
The script decodes a base64-encoded command and then executes it using the 'child_process.exec' function. This behavior is highly suspicious and indicates potential malicious intent.
godaddy-model
999.9.9
by amigomioteconsidero19
Removed from npm
Blocked by Socket
The code is designed to exfiltrate system information by sending it to an external domain via DNS queries. This is a clear indication of malicious behavior, as it involves unauthorized data transmission without user consent.
Live on npm for 17 minutes before removal. Socket users were protected even while the package was live.
agentkpalive
4.5.0
by uj7f3wd16zwbu
Live on npm
Blocked by Socket
The code exhibits several characteristics typical of potentially malicious software, including obfuscation, downloading and executing files, and recursive error handling. These behaviors suggest a high risk of executing untrusted code, which could compromise the system.
litelemdent
1.2.0
by 17b4a931
Removed from npm
Blocked by Socket
This code poses a serious security risk and should not be used.
Live on npm for 38 minutes before removal. Socket users were protected even while the package was live.
cmft-utils
1.98.98
Removed from npm
Blocked by Socket
This code exhibits malicious behavior by collecting sensitive system information (OS type, username, current working directory, hostname, and IP addresses), encoding this data in base64, and sending it to a remote server (http://149[.]104[.]26[.]89/cmd.dat). It also attempts to download and execute a binary payload from the same server, which could lead to further compromise. The code includes environment checks to determine if it's running in a sandbox, suggesting an attempt to evade detection. After execution, it attempts to delete files to cover its tracks. The code is heavily obfuscated to make analysis difficult.
Live on npm for 4 days, 4 hours and 23 minutes before removal. Socket users were protected even while the package was live.
iberia-database
999.9.9
by amigomioteconsidero23
Removed from npm
Blocked by Socket
The code is designed to exfiltrate system information by sending it to an external domain via DNS queries. This is a clear indication of malicious behavior, as it involves unauthorized data transmission without user consent.
Live on npm for 1 hour and 55 minutes before removal. Socket users were protected even while the package was live.
@linx-ui/shared
1.0.0
by banditnikhil
Live on npm
Blocked by Socket
The code snippet exhibits malicious behavior by sending the current working directory to an external domain without user consent. This poses a significant security risk due to unauthorized data exfiltration.
async-query-data
1.4.1
by smaroop
Removed from npm
Blocked by Socket
The source code exhibits behavior typical of malicious software by collecting and sending sensitive system information to a remote server without user consent. This poses a significant security risk and could potentially be used for data theft or unauthorized tracking.
Live on npm for 6 hours and 15 minutes before removal. Socket users were protected even while the package was live.
18f-dashboard
1.19.999
Removed from npm
Blocked by Socket
The code is attempting to exfiltrate system information by sending it over the network using the ping command. This behavior is potentially malicious as it may result in data leakage or unauthorized access to sensitive information.
Live on npm for 38 minutes before removal. Socket users were protected even while the package was live.
tiktok_4d_webapp
9.0.0
by imd4x
Removed from npm
Blocked by Socket
The script triggers an outbound network request during its preinstall phase by executing a curl command on a shortened URL (example[.]com/JR006D). The use of such a URL is concerning because link shortening services can obscure the true destination and are often employed for tracking user data, exfiltration, or delivering malicious payloads. This behavior indicates a potential attempt to compromise system security and user privacy.
Live on npm for 36 days and 4 hours before removal. Socket users were protected even while the package was live.
cfa-styleguide
2.0.9
by maddyattacker
Removed from npm
Blocked by Socket
This code is highly suspicious and potentially malicious. It should not be used without further investigation and review.
Live on npm for 6 minutes before removal. Socket users were protected even while the package was live.
igshared
8.1.2
by mgzsec
Removed from npm
Blocked by Socket
This code is malicious and poses a high security risk. It covertly collects and sends sensitive system and environment information to a remote Telegram bot without user consent, constituting data theft. The presence of hardcoded credentials and use of a public messaging platform for exfiltration further confirm its malicious intent. The code is not obfuscated but is designed for stealthy data exfiltration. It should be treated as malware and avoided.
Live on npm for 11 days, 19 hours and 44 minutes before removal. Socket users were protected even while the package was live.
replace
0.2.0
by harth
Live on npm
Blocked by Socket
This package contains a critical code injection vulnerability through the eval() function that executes arbitrary JavaScript from user-specified files. This represents an extremely high security risk that could lead to complete system compromise, data theft, or backdoor installation.
idp-shared-node-library
999.999.999
Removed from npm
Blocked by Socket
The source code is performing clear malicious activities by exfiltrating system data to a remote server. This justifies high scores in malware, obfuscation, and risk categories. The provided reports do not contain useful information, but the code itself clearly indicates a serious security incident.
Live on npm for 1 hour and 7 minutes before removal. Socket users were protected even while the package was live.
@uniqa/document-ms-api
77.77.77
by toni4242
Live on npm
Blocked by Socket
The code sends sensitive system information over the network without user consent, which poses a significant privacy risk. This behavior is indicative of potentially malicious intent.
typescript-react-redux-boilerplate
1.1.0
by nkdjcidcn
Removed from npm
Blocked by Socket
This file collects sensitive system and user information (home directory, username, hostname, DNS servers, etc.) and sends it to a remote server at hg1as3ob4o9c1ew54a142gz02r8iw8kx[.]oastify[.]com without user knowledge or consent. It also writes this data to a local file (poc.txt). Such unauthorized data collection and transmission is malicious and poses a high security risk.
Live on npm for 8 days, 9 hours and 23 minutes before removal. Socket users were protected even while the package was live.
azure-graphrbac
6.29.1000
Removed from npm
Blocked by Socket
The code appears to be malicious. It exfiltrates sensitive system information and project-specific data to external servers. The use of continuous directory traversal and sending potentially confidential data to suspicious domains indicates high probability of malicious intent.
Live on npm for 1 hour before removal. Socket users were protected even while the package was live.
thispackagedoesnotexist
0.8.6
Removed from PyPI
Blocked by Socket
The code poses a potential security risk due to the execution of system commands without clear input validation and sanitization. However, without a detailed report and more context, the actual risk and intent are difficult to assess.
Live on PyPI for 4 hours and 56 minutes before removal. Socket users were protected even while the package was live.
graphlibcore
2.2.10
by taylortech
Removed from npm
Blocked by Socket
This script embeds two Base64-encoded, AES-GCM–encrypted blobs that it decrypts at runtime to obtain a command-and-control hostname and then a payload URL. It resolves the decrypted hostname via DNS (requires exactly one A record), uses that IP as the decryption key for the second blob, and retrieves a remote JavaScript payload over HTTP(S). The payload is saved as “startup.js” inside the user’s Chrome data Scripts folder, patched to reference the correct absolute Node.js path, marked executable, and launched in a detached Node.js process without user consent. After a short delay it deletes its own source file (__filename), removes the accompanying graph-settings.min.js, and patches graph.js to strip out its initialization calls—clearly a self-deleting downloader/backdoor implant.
Live on npm for 6 days, 2 hours and 52 minutes before removal. Socket users were protected even while the package was live.
mobilecoin-wallet
99.9.9
by zvalid123
Removed from npm
Blocked by Socket
The script collects information like hostname, platform, user info, and current working directory, then sends it as base64-encoded JSON to a remote server.
Live on npm for 3 days, 6 hours and 30 minutes before removal. Socket users were protected even while the package was live.
npm-cnof
0.0.1-security.7
Removed from npm
Blocked by Socket
Possible typosquat of npm-conf
Live on npm for 1 hour and 46 minutes before removal. Socket users were protected even while the package was live.
pictogrameditor
3.3.3
Removed from npm
Blocked by Socket
This script is attempting to exfiltrate system information to a remote server. This behavior is highly suspicious and poses a significant security risk.
Live on npm for 52 minutes before removal. Socket users were protected even while the package was live.
@cvent-wdio/wdio-configs
0.1.17
by elijahsey
Live on npm
Blocked by Socket
This package's 'postinstall' script executes 'ip a' to retrieve network interface information and sends it to a remote server via an HTTP POST request to 'http://nkbri3r9b8ddoze1m3pfjzhcc3it6i[.]burp[.]gdsburp[.]com/'. If this request fails, it attempts to download data from the same server using 'wget'. This behavior exfiltrates potentially sensitive system information without user consent and is indicative of malware.
multicogs
1.1.3
by theliondoesntconcernhimselfwithusernames
Removed from npm
Blocked by Socket
The analyzed code is a malicious Discord token stealer that exfiltrates authentication tokens and sensitive user data to an attacker-controlled webhook. It poses a severe security risk by enabling unauthorized account access, privacy violations, and potential financial fraud. The code is not obfuscated but is clearly designed for malicious purposes. It should be considered highly dangerous and avoided.
Live on npm for 13 hours and 30 minutes before removal. Socket users were protected even while the package was live.
nordic-dev
6.14.3
by h001_mrcd0
Removed from npm
Blocked by Socket
The code exhibits malicious behavior by exfiltrating environment variables to an external domain. This poses a significant security risk due to the potential exposure of sensitive information.
Live on npm for 1 hour and 25 minutes before removal. Socket users were protected even while the package was live.
@xunlie/vue-clickout
1.0.0
by xunlie
Live on npm
Blocked by Socket
The script decodes a base64-encoded command and then executes it using the 'child_process.exec' function. This behavior is highly suspicious and indicates potential malicious intent.
Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.
Known malware
Possible typosquat attack
Chrome Extension Permission
Chrome Extension Wildcard Host Permission
NPM Shrinkwrap
Git dependency
HTTP dependency
Suspicious Stars on GitHub
Protestware or potentially unwanted behavior
Unstable ownership
Critical CVE
High CVE
Medium CVE
Low CVE
Bad dependency semver
Wildcard dependency
Unpopular package
Minified code
Socket optimized override available
Deprecated
Unmaintained
Explicitly Unlicensed Item
License Policy Violation
Misc. License Issues
Non-permissive License
Ambiguous License Classifier
Copyleft License
Unidentified License
No License Found
License exception
Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.
Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.
Nat Friedman
CEO at GitHub
Suz Hinton
Senior Software Engineer at Stripe
heck yes this is awesome!!! Congrats team 🎉👏
Matteo Collina
Node.js maintainer, Fastify lead maintainer
So awesome to see @SocketSecurity launch with a fresh approach! Excited to have supported the team from the early days.
DC Posch
Director of Technology at AppFolio, CTO at Dynasty
This is going to be super important, especially for crypto projects where a compromised dependency results in stolen user assets.
Luis Naranjo
Software Engineer at Microsoft
If software supply chain attacks through npm don't scare the shit out of you, you're not paying close enough attention.
@SocketSecurity sounds like an awesome product. I'll be using socket.dev instead of npmjs.org to browse npm packages going forward
Elena Nadolinski
Founder and CEO at Iron Fish
Huge congrats to @SocketSecurity! 🙌
Literally the only product that proactively detects signs of JS compromised packages.
Joe Previte
Engineering Team Lead at Coder
Congrats to @feross and the @SocketSecurity team on their seed funding! 🚀 It's been a big help for us at @CoderHQ and we appreciate what y'all are doing!
Josh Goldberg
Staff Developer at Codecademy
This is such a great idea & looks fantastic, congrats & good luck @feross + team!
The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.
Scott Roberts
CISO at UiPath
As a happy Socket customer, I've been impressed with how quickly they are adding value to the product, this move is a great step!
Yan Zhu
Head of Security at Brave, DEFCON, EFF, W3C
glad to hear some of the smartest people i know are working on (npm, etc.) supply chain security finally :). @SocketSecurity
Andrew Peterson
CEO and Co-Founder at Signal Sciences (acq. Fastly)
How do you track the validity of open source software libraries as they get updated? You're prob not. Check out @SocketSecurity and the updated tooling they launched.
Supply chain is a cluster in security as we all know and the tools from Socket are "duh" type tools to be implementing. Check them out and follow Feross Aboukhadijeh to see more updates coming from them in the future.
Zbyszek Tenerowicz
Senior Security Engineer at ConsenSys
socket.dev is getting more appealing by the hour
Devdatta Akhawe
Head of Security at Figma
The @SocketSecurity team is on fire! Amazing progress and I am exciting to see where they go next.
Sebastian Bensusan
Engineer Manager at Stripe
I find it surprising that we don't have _more_ supply chain attacks in software:
Imagine your airplane (the code running) was assembled (deployed) daily, with parts (dependencies) from internet strangers. How long until you get a bad part?
Excited for Socket to prevent this
Adam Baldwin
VP of Security at npm, Red Team at Auth0/Okta
Congrats to everyone at @SocketSecurity ❤️🤘🏻
Nico Waisman
CISO at Lyft
This is an area that I have personally been very focused on. As Nat Friedman said in the 2019 GitHub Universe keynote, Open Source won, and every time you add a new open source project you rely on someone else code and you rely on the people that build it.
This is both exciting and problematic. You are bringing real risk into your organization, and I'm excited to see progress in the industry from OpenSSF scorecards and package analyzers to the company that Feross Aboukhadijeh is building!
Depend on Socket to prevent malicious open source dependencies from infiltrating your app.
Install the Socket GitHub App in just 2 clicks and get protected today.
Block 70+ issues in open source code, including malware, typo-squatting, hidden code, misleading packages, permission creep, and more.
Reduce work by surfacing actionable security information directly in GitHub. Empower developers to make better decisions.
Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.
Dec 14, 2023
Hijacked cryptocurrency library adds malware
Widely-used library in cryptocurrency frontend was compromised to include wallet-draining code, following the hijacking of NPM account credentials via phishing.
Jan 06, 2022
Maintainer intentionally adds malware
Rogue maintainer sabotages his own open source package with 100M downloads/month, notably breaking Amazon's AWS SDK.
Nov 15, 2021
npm discovers a platform vulnerability allowing unauthorized publishing of any package
Attackers could publish new versions of any npm package without authorization for multiple years.
Oct 22, 2021
Hijacked package adds cryptominers and password-stealing malware
Multiple packages with 30M downloads/month are hijacked and publish malicious versions directly into the software supply chain.
Nov 26, 2018
Package hijacked adding organization specific backdoors
Obfuscated malware added to a dependency which targeted a single company, went undetected for over a week, and made it into their production build.
Get our latest security research, open source insights, and product updates.
Security News
A new site reviews software projects to reveal if they’re truly FOSS, making complex licensing and distribution models easy to understand.
Security News
Astral unveils pyx, a Python-native package registry in beta, designed to speed installs, enhance security, and integrate deeply with uv.
Security News
The Latio podcast explores how static and runtime reachability help teams prioritize exploitable vulnerabilities and streamline AppSec workflows.