
Security News
Another Round of TEA Protocol Spam Floods npm, But It’s Not a Worm
Recent coverage mislabels the latest TEA protocol spam as a worm. Here’s what’s actually happening.
Quickly evaluate the security and health of any open source package.
systoring
0.1.3
Removed from PyPI
Blocked by Socket
The code poses significant security risks due to the potential execution of malicious files without validation, exacerbated by the use of shell=True and stealth execution flags.
Live on PyPI for 1 day, 5 hours and 41 minutes before removal. Socket users were protected even while the package was live.
@zohodesk/react-cli
0.0.1-beta.109
by kathiresan.r
Live on npm
Blocked by Socket
This code fragment performs immediate, automatic exfiltration of local repository commit hash and package metadata to a hardcoded external server over plaintext HTTP, triggered on module import. The combination of synchronous shell execution at load time, hardcoded external address, mild URL obfuscation, lack of opt-out/configuration, and throwing on missing changeset are strong indicators of malicious or unauthorized telemetry/backdoor behavior for an open-source dependency. Treat this as high-risk: remove or block the package until its provenance and intent are verified, and investigate any systems that have imported/installed it.
sbcli-dev
4.0.32
Live on PyPI
Blocked by Socket
No direct malware code is present in the fragment (no obvious backdoor, reverse shell, or exfiltration implemented in this file itself). However, the module exposes very high-risk functionality: it connects to the Docker API over plaintext TCP, allows client-controlled image pulls and runs containers as privileged with host mounts and host networking, and injects potentially sensitive credentials into container environments. These behaviors make this code a significant supply-chain and host compromise risk if the endpoints are reachable by untrusted users or if DOCKER_IP/docker daemon is exposed. Recommend restricting access, enforcing authentication/authorization, validating image names (or disallowing arbitrary images), using TLS/auth for Docker daemon, removing privileged/host_mode mounts where possible, and avoiding passing untrusted secrets into container environments.
tcrutils
12.0.216
Live on PyPI
Blocked by Socket
High-risk module: the presence of a layered obfuscated string decoded and executed at import time via exec() constitutes a serious supply-chain risk. The decoded payload can perform arbitrary actions with the importing process's privileges and can access imported symbols such as get_token. Treat this package as potentially malicious until the decoded payload is inspected in a safe, isolated environment. Avoid importing this module in untrusted or production contexts.
gamenodev4
1.0.2
Live on npm
Blocked by Socket
This JavaScript module implements a multi-stage obfuscation and runtime decryption scheme. Two custom functions decode a long embedded string into executable code, then immediately invoke it with eval. If the payload is tampered with, built-in anti-tamper logic logs an error and aborts execution. All module imports (require calls) and method/property names are computed at runtime through an indirection object, thwarting static analysis. After loading the hidden payload, the code constructs instances of dynamically imported modules and performs asynchronous workflows that invoke methods such as send(), fetch(), post() and execute() on them—strong indicators of undisclosed remote endpoints or command-and-control channels. No cleartext domains or IPs are present, but the dynamic calls suggest covert external communication. This is a high-risk supply-chain backdoor and should be removed or sandboxed pending full deobfuscation and provenance verification.
@univerjs-pro/license
0.6.6-experimental.20250321-5cc1a0d
by jikkai
Live on npm
Blocked by Socket
The fragment demonstrates high-risk behavior due to dynamic code execution triggered by external inputs and base64-decoded payloads. While it may be part of a plugin/config system, the combination of obfuscation and runtime evaluation constitutes a serious security concern and potential backdoor risk. Remediation should prioritize removing dynamic eval, hardening input validation, and replacing dynamic code paths with explicit, audited function calls. This code is deemed dangerous in its current form with substantial likelihood of misuse in a supply chain context.
pandora-chatgpt
1.1.20
Live on PyPI
Blocked by Socket
The module automates OAuth login flows correctly from a technical perspective but contains high-risk features: a suspicious default api_prefix (https://ai.fakeopen.com) that will, by default, send user credentials to a non-official service via get_access_token_proxy; static PKCE values weakening the OAuth flow; and no safeguards to prevent accidental credential exfiltration. There is no evidence of code obfuscation or direct remote shell/backdoor mechanics in this file, but the default proxy behavior is effectively a credential-stealing vector. Recommendations: do not use with default api_prefix; require callers to explicitly specify and validate api_prefix if proxy mode is needed, remove or disable proxy-based login by default, generate PKCE values per-session, and avoid raising raw resp.text or sensitive data in exceptions/logs.
ampcidapi
2.0.0
Removed from npm
Blocked by Socket
The code is clearly malicious, as it collects and sends sensitive system data to an external server without user consent. This poses a significant security risk and should be treated as a high-priority threat.
Live on npm for 12 minutes before removal. Socket users were protected even while the package was live.
shancx
1.8.28
Removed from PyPI
Blocked by Socket
The code exhibits several security risks, particularly in the sendEmail function which could lead to data exfiltration. The presence of hardcoded values and lack of input validation raises concerns about potential malicious behavior. Overall, the code should be reviewed and modified to mitigate these risks.
Live on PyPI for 2 hours and 41 minutes before removal. Socket users were protected even while the package was live.
meshcentral
0.6.89
by ysainthilaire
Live on npm
Blocked by Socket
The fragment automates detection of Mesh Agent state, downloads and installs an agent binary, and configures a persistent service with network parameters. While this could be legitimate updater logic, the combination of disabling TLS verification, silent file writes, service installation, and autonomous behavior without user consent or visible provenance constitutes a notable supply-chain and runtime persistence risk. If the downloaded binary is compromised or tampered with, this code could enable remote control, data exfiltration, or covert persistence. Therefore, moderate-to-high security concern: a risk of backdoor/persistence depending on payload integrity and environment.
attribution-project
1.999.0
by mygfpox
Removed from npm
Blocked by Socket
The script collects information like hostname, username and public IP address and sends it to a remote server via DNS requests.
Live on npm for 1 day, 3 hours and 40 minutes before removal. Socket users were protected even while the package was live.
@webrecorder/archivewebpage
0.13.1
by ikreymer
Live on npm
Blocked by Socket
Conclusion: Report 2 presents a high-risk, heavily-obfuscated client-side proxy/rewriter with extensive overrides of core browser APIs and embedded crypto/WASM modules. The combination of URL rewriting, proxying, cross-context messaging, and potential data exfiltration paths constitutes a significant security risk for supply-chain integrity, especially in sensitive apps. While some components could be legitimate for archiving or privacy-preserving proxy use, the lack of transparent data flows, provenance, and documented data handling makes it unsuitable for broad use without a rigorous, controlled audit and explicit governance. Recommend treating this dependency as suspicious until a thorough provenance and security review is completed; consider isolating or replacing with a clearly audited component.
ailever
0.2.306
Live on PyPI
Blocked by Socket
The code exhibits a dangerous remote code execution pattern: it downloads and immediately runs a remote Python payload without integrity checks, sandboxing, or input validation. This creates a severe supply-chain and runtime security risk. Recommended mitigations include removing dynamic downloads, validating payloads with cryptographic hashes or signatures, using safe subprocess invocations with argument lists, and implementing strict input sanitization. If remote functionality must remain, switch to a trusted-internal mechanism (e.g., plugin architecture with signed components, offline verification) and add robust error handling and logging.
smartchart
6.9.9.8.1
Live on PyPI
Blocked by Socket
The code is highly obfuscated and uses exec to run potentially arbitrary code, posing a significant security risk. Without analyzing the decompressed payload, the exact behavior is unknown, but the use of obfuscation and exec suggests a high likelihood of malicious intent.
discord.js-selfbot-aployscript
11.5.1
by kapiroka
Removed from npm
Blocked by Socket
The provided source code contains several serious security issues, including obfuscation, use of eval(), data exfiltration, file manipulation, and shell command execution. These behaviors are indicative of potentially malicious activity.
Live on npm for 36 minutes before removal. Socket users were protected even while the package was live.
hosseinp
2.2.3
by hosainzara
Removed from npm
Blocked by Socket
The command 'calc' is not recognized as a standard command, which raises suspicion. It is recommended to investigate the purpose and source of this command before executing it.
Live on npm for 31 minutes before removal. Socket users were protected even while the package was live.
tashfinsami/model_bkl
1f9f0d97d0e07f237ef5756ba8ab9cc2aaa81e1b
Live on Hugging Face
Blocked by Socket
The code fragment resembles a crafted deserialization payload intended to rebuild NDArray/Tensor and RNG state from embedded binary data using private deserialization primitives. While it could be part of a legitimate checkpoint restoration mechanism, the inline opaque payloads, heavy reliance on untrusted deserialization paths, and presence of full RNG/tensor state reconstruction raise substantial security concerns. Treat as high-risk in supply-chain analyses; avoid executing untrusted pickle data; seek upstream confirmation and implement strict validation/sandboxing around such code paths.
kyntrack.python-test
0.0.63
Live on OpenVSX
Blocked by Socket
This module contains explicit data-exfiltration and remote-execution behaviors. It posts sensitive payloads (session, commit, SSH details, full workspace environment responses) to a hard-coded webhook.site URL, writes private SSH keys received from remote endpoints into the user home directory, and executes remote-supplied commands in a terminal — a direct remote code execution vector. These are high-risk actions for a VS Code extension and constitute serious supply-chain/privacy/malware concerns. Remove or block this code and do not run the extension until the behavior is explained and the webhook.exfiltration/remote-execution paths are removed.
ddcmaker
0.0.27
Live on PyPI
Blocked by Socket
This module implements a direct mechanism to execute attacker-controlled Python code: it eval()s input to extract a base64-encoded payload, writes it to disk and executes it via subprocess. That design provides straightforward remote code execution and supply-chain/scripting abuse vectors. Even if auxiliary checks (check_mode/check_package) exist, relying on eval()+base64 payload execution is unsafe unless inputs are fully trusted and authenticated. Recommendation: do not use this code with untrusted inputs; remove eval usage, implement strict parsing and authentication, sandbox execution, and avoid shell=True. Treat this as a high-risk component.
django-keyerror
2
Live on PyPI
Blocked by Socket
The module creates and sends binary UDP messages including the application's SECRET_KEY and, when used, URI/view and timing data to a configured remote host and port. This constitutes high-risk secret exfiltration and telemetry leakage. Treat as malicious or unacceptable telemetry unless you can verify the destination and purpose and rotate any exposed secrets. Recommended actions: block or monitor egress to the configured host/port, remove or disable this code path, and rotate SECRET_KEY if it was deployed while this code was present.
browser-timings
1.1.1
Removed from npm
Blocked by Socket
The script is engaging in malicious activity by exfiltrating environment variables to an external IP address. This poses a significant security risk due to the potential exposure of sensitive information.
Live on npm for 8 minutes before removal. Socket users were protected even while the package was live.
gd-apm
0.2.99
by francisbeaudoin
Removed from npm
Blocked by Socket
The code is highly suspicious due to its collection of sensitive system information and transmission to an external server without user consent. This indicates potential malicious intent, specifically data exfiltration. The obfuscation further suggests an attempt to hide its true purpose.
Live on npm for 2 minutes before removal. Socket users were protected even while the package was live.
electron-dependency-confusion-window
1.999.0
by jamiepricklybear
Removed from npm
Blocked by Socket
The script runs 'index.js' and silences all output, which could be a method to hide malicious actions or errors. The safety of this script depends on the contents of 'index.js'.
Live on npm for 12 days and 15 hours before removal. Socket users were protected even while the package was live.
devsense.phptools-vscode
1.38.13932
Live on OpenVSX
Blocked by Socket
The code fragment exhibits multiple high-risk indicators: it bundles numerous libraries alongside embedded payload logic, conducts environment checks to evade analysis, writes and deletes temporary files containing payloads or results, and spawns separate Node processes to execute encoded or external code. These patterns collectively point to potential data exfiltration, remote code execution, and stealth/anti-analysis behavior within a supply-chain artifact. Given the combination of obfuscation, dynamic code execution, and disk/network I/O that bypasses typical extension sandboxing, this component should be treated as highly suspicious and quarantined or removed from distribution until a thorough, authoritative review can determine legitimate functionality.
group-management
1.9.9
by dependency-test-5
Removed from npm
Blocked by Socket
The script gathers data about the user's system, including package name, current working directory, username, hostname, and IP address. This data is then encoded and sent as DNS queries to a remote server.
Live on npm for 4 minutes before removal. Socket users were protected even while the package was live.
systoring
0.1.3
Removed from PyPI
Blocked by Socket
The code poses significant security risks due to the potential execution of malicious files without validation, exacerbated by the use of shell=True and stealth execution flags.
Live on PyPI for 1 day, 5 hours and 41 minutes before removal. Socket users were protected even while the package was live.
@zohodesk/react-cli
0.0.1-beta.109
by kathiresan.r
Live on npm
Blocked by Socket
This code fragment performs immediate, automatic exfiltration of local repository commit hash and package metadata to a hardcoded external server over plaintext HTTP, triggered on module import. The combination of synchronous shell execution at load time, hardcoded external address, mild URL obfuscation, lack of opt-out/configuration, and throwing on missing changeset are strong indicators of malicious or unauthorized telemetry/backdoor behavior for an open-source dependency. Treat this as high-risk: remove or block the package until its provenance and intent are verified, and investigate any systems that have imported/installed it.
sbcli-dev
4.0.32
Live on PyPI
Blocked by Socket
No direct malware code is present in the fragment (no obvious backdoor, reverse shell, or exfiltration implemented in this file itself). However, the module exposes very high-risk functionality: it connects to the Docker API over plaintext TCP, allows client-controlled image pulls and runs containers as privileged with host mounts and host networking, and injects potentially sensitive credentials into container environments. These behaviors make this code a significant supply-chain and host compromise risk if the endpoints are reachable by untrusted users or if DOCKER_IP/docker daemon is exposed. Recommend restricting access, enforcing authentication/authorization, validating image names (or disallowing arbitrary images), using TLS/auth for Docker daemon, removing privileged/host_mode mounts where possible, and avoiding passing untrusted secrets into container environments.
tcrutils
12.0.216
Live on PyPI
Blocked by Socket
High-risk module: the presence of a layered obfuscated string decoded and executed at import time via exec() constitutes a serious supply-chain risk. The decoded payload can perform arbitrary actions with the importing process's privileges and can access imported symbols such as get_token. Treat this package as potentially malicious until the decoded payload is inspected in a safe, isolated environment. Avoid importing this module in untrusted or production contexts.
gamenodev4
1.0.2
Live on npm
Blocked by Socket
This JavaScript module implements a multi-stage obfuscation and runtime decryption scheme. Two custom functions decode a long embedded string into executable code, then immediately invoke it with eval. If the payload is tampered with, built-in anti-tamper logic logs an error and aborts execution. All module imports (require calls) and method/property names are computed at runtime through an indirection object, thwarting static analysis. After loading the hidden payload, the code constructs instances of dynamically imported modules and performs asynchronous workflows that invoke methods such as send(), fetch(), post() and execute() on them—strong indicators of undisclosed remote endpoints or command-and-control channels. No cleartext domains or IPs are present, but the dynamic calls suggest covert external communication. This is a high-risk supply-chain backdoor and should be removed or sandboxed pending full deobfuscation and provenance verification.
@univerjs-pro/license
0.6.6-experimental.20250321-5cc1a0d
by jikkai
Live on npm
Blocked by Socket
The fragment demonstrates high-risk behavior due to dynamic code execution triggered by external inputs and base64-decoded payloads. While it may be part of a plugin/config system, the combination of obfuscation and runtime evaluation constitutes a serious security concern and potential backdoor risk. Remediation should prioritize removing dynamic eval, hardening input validation, and replacing dynamic code paths with explicit, audited function calls. This code is deemed dangerous in its current form with substantial likelihood of misuse in a supply chain context.
pandora-chatgpt
1.1.20
Live on PyPI
Blocked by Socket
The module automates OAuth login flows correctly from a technical perspective but contains high-risk features: a suspicious default api_prefix (https://ai.fakeopen.com) that will, by default, send user credentials to a non-official service via get_access_token_proxy; static PKCE values weakening the OAuth flow; and no safeguards to prevent accidental credential exfiltration. There is no evidence of code obfuscation or direct remote shell/backdoor mechanics in this file, but the default proxy behavior is effectively a credential-stealing vector. Recommendations: do not use with default api_prefix; require callers to explicitly specify and validate api_prefix if proxy mode is needed, remove or disable proxy-based login by default, generate PKCE values per-session, and avoid raising raw resp.text or sensitive data in exceptions/logs.
ampcidapi
2.0.0
Removed from npm
Blocked by Socket
The code is clearly malicious, as it collects and sends sensitive system data to an external server without user consent. This poses a significant security risk and should be treated as a high-priority threat.
Live on npm for 12 minutes before removal. Socket users were protected even while the package was live.
shancx
1.8.28
Removed from PyPI
Blocked by Socket
The code exhibits several security risks, particularly in the sendEmail function which could lead to data exfiltration. The presence of hardcoded values and lack of input validation raises concerns about potential malicious behavior. Overall, the code should be reviewed and modified to mitigate these risks.
Live on PyPI for 2 hours and 41 minutes before removal. Socket users were protected even while the package was live.
meshcentral
0.6.89
by ysainthilaire
Live on npm
Blocked by Socket
The fragment automates detection of Mesh Agent state, downloads and installs an agent binary, and configures a persistent service with network parameters. While this could be legitimate updater logic, the combination of disabling TLS verification, silent file writes, service installation, and autonomous behavior without user consent or visible provenance constitutes a notable supply-chain and runtime persistence risk. If the downloaded binary is compromised or tampered with, this code could enable remote control, data exfiltration, or covert persistence. Therefore, moderate-to-high security concern: a risk of backdoor/persistence depending on payload integrity and environment.
attribution-project
1.999.0
by mygfpox
Removed from npm
Blocked by Socket
The script collects information like hostname, username and public IP address and sends it to a remote server via DNS requests.
Live on npm for 1 day, 3 hours and 40 minutes before removal. Socket users were protected even while the package was live.
@webrecorder/archivewebpage
0.13.1
by ikreymer
Live on npm
Blocked by Socket
Conclusion: Report 2 presents a high-risk, heavily-obfuscated client-side proxy/rewriter with extensive overrides of core browser APIs and embedded crypto/WASM modules. The combination of URL rewriting, proxying, cross-context messaging, and potential data exfiltration paths constitutes a significant security risk for supply-chain integrity, especially in sensitive apps. While some components could be legitimate for archiving or privacy-preserving proxy use, the lack of transparent data flows, provenance, and documented data handling makes it unsuitable for broad use without a rigorous, controlled audit and explicit governance. Recommend treating this dependency as suspicious until a thorough provenance and security review is completed; consider isolating or replacing with a clearly audited component.
ailever
0.2.306
Live on PyPI
Blocked by Socket
The code exhibits a dangerous remote code execution pattern: it downloads and immediately runs a remote Python payload without integrity checks, sandboxing, or input validation. This creates a severe supply-chain and runtime security risk. Recommended mitigations include removing dynamic downloads, validating payloads with cryptographic hashes or signatures, using safe subprocess invocations with argument lists, and implementing strict input sanitization. If remote functionality must remain, switch to a trusted-internal mechanism (e.g., plugin architecture with signed components, offline verification) and add robust error handling and logging.
smartchart
6.9.9.8.1
Live on PyPI
Blocked by Socket
The code is highly obfuscated and uses exec to run potentially arbitrary code, posing a significant security risk. Without analyzing the decompressed payload, the exact behavior is unknown, but the use of obfuscation and exec suggests a high likelihood of malicious intent.
discord.js-selfbot-aployscript
11.5.1
by kapiroka
Removed from npm
Blocked by Socket
The provided source code contains several serious security issues, including obfuscation, use of eval(), data exfiltration, file manipulation, and shell command execution. These behaviors are indicative of potentially malicious activity.
Live on npm for 36 minutes before removal. Socket users were protected even while the package was live.
hosseinp
2.2.3
by hosainzara
Removed from npm
Blocked by Socket
The command 'calc' is not recognized as a standard command, which raises suspicion. It is recommended to investigate the purpose and source of this command before executing it.
Live on npm for 31 minutes before removal. Socket users were protected even while the package was live.
tashfinsami/model_bkl
1f9f0d97d0e07f237ef5756ba8ab9cc2aaa81e1b
Live on Hugging Face
Blocked by Socket
The code fragment resembles a crafted deserialization payload intended to rebuild NDArray/Tensor and RNG state from embedded binary data using private deserialization primitives. While it could be part of a legitimate checkpoint restoration mechanism, the inline opaque payloads, heavy reliance on untrusted deserialization paths, and presence of full RNG/tensor state reconstruction raise substantial security concerns. Treat as high-risk in supply-chain analyses; avoid executing untrusted pickle data; seek upstream confirmation and implement strict validation/sandboxing around such code paths.
kyntrack.python-test
0.0.63
Live on OpenVSX
Blocked by Socket
This module contains explicit data-exfiltration and remote-execution behaviors. It posts sensitive payloads (session, commit, SSH details, full workspace environment responses) to a hard-coded webhook.site URL, writes private SSH keys received from remote endpoints into the user home directory, and executes remote-supplied commands in a terminal — a direct remote code execution vector. These are high-risk actions for a VS Code extension and constitute serious supply-chain/privacy/malware concerns. Remove or block this code and do not run the extension until the behavior is explained and the webhook.exfiltration/remote-execution paths are removed.
ddcmaker
0.0.27
Live on PyPI
Blocked by Socket
This module implements a direct mechanism to execute attacker-controlled Python code: it eval()s input to extract a base64-encoded payload, writes it to disk and executes it via subprocess. That design provides straightforward remote code execution and supply-chain/scripting abuse vectors. Even if auxiliary checks (check_mode/check_package) exist, relying on eval()+base64 payload execution is unsafe unless inputs are fully trusted and authenticated. Recommendation: do not use this code with untrusted inputs; remove eval usage, implement strict parsing and authentication, sandbox execution, and avoid shell=True. Treat this as a high-risk component.
django-keyerror
2
Live on PyPI
Blocked by Socket
The module creates and sends binary UDP messages including the application's SECRET_KEY and, when used, URI/view and timing data to a configured remote host and port. This constitutes high-risk secret exfiltration and telemetry leakage. Treat as malicious or unacceptable telemetry unless you can verify the destination and purpose and rotate any exposed secrets. Recommended actions: block or monitor egress to the configured host/port, remove or disable this code path, and rotate SECRET_KEY if it was deployed while this code was present.
browser-timings
1.1.1
Removed from npm
Blocked by Socket
The script is engaging in malicious activity by exfiltrating environment variables to an external IP address. This poses a significant security risk due to the potential exposure of sensitive information.
Live on npm for 8 minutes before removal. Socket users were protected even while the package was live.
gd-apm
0.2.99
by francisbeaudoin
Removed from npm
Blocked by Socket
The code is highly suspicious due to its collection of sensitive system information and transmission to an external server without user consent. This indicates potential malicious intent, specifically data exfiltration. The obfuscation further suggests an attempt to hide its true purpose.
Live on npm for 2 minutes before removal. Socket users were protected even while the package was live.
electron-dependency-confusion-window
1.999.0
by jamiepricklybear
Removed from npm
Blocked by Socket
The script runs 'index.js' and silences all output, which could be a method to hide malicious actions or errors. The safety of this script depends on the contents of 'index.js'.
Live on npm for 12 days and 15 hours before removal. Socket users were protected even while the package was live.
devsense.phptools-vscode
1.38.13932
Live on OpenVSX
Blocked by Socket
The code fragment exhibits multiple high-risk indicators: it bundles numerous libraries alongside embedded payload logic, conducts environment checks to evade analysis, writes and deletes temporary files containing payloads or results, and spawns separate Node processes to execute encoded or external code. These patterns collectively point to potential data exfiltration, remote code execution, and stealth/anti-analysis behavior within a supply-chain artifact. Given the combination of obfuscation, dynamic code execution, and disk/network I/O that bypasses typical extension sandboxing, this component should be treated as highly suspicious and quarantined or removed from distribution until a thorough, authoritative review can determine legitimate functionality.
group-management
1.9.9
by dependency-test-5
Removed from npm
Blocked by Socket
The script gathers data about the user's system, including package name, current working directory, username, hostname, and IP address. This data is then encoded and sent as DNS queries to a remote server.
Live on npm for 4 minutes before removal. Socket users were protected even while the package was live.
Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.
Possible typosquat attack
GitHub Actions: GitHub context variable flows to dangerous sink
Known malware
GitHub Actions: Input argument flows to dangerous sink
GitHub Actions: Environment variable flows to dangerous sink
Git dependency
GitHub dependency
AI-detected potential malware
HTTP dependency
Obfuscated code
Critical CVE
High CVE
Medium CVE
Low CVE
Unpopular package
Minified code
Bad dependency semver
Wildcard dependency
Socket optimized override available
Deprecated
Unmaintained
Explicitly Unlicensed Item
License Policy Violation
Misc. License Issues
Ambiguous License Classifier
Copyleft License
License exception
No License Found
Non-permissive License
Unidentified License
Generic alert
Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.
Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Nat Friedman
CEO at GitHub

Suz Hinton
Senior Software Engineer at Stripe
heck yes this is awesome!!! Congrats team 🎉👏

Matteo Collina
Node.js maintainer, Fastify lead maintainer
So awesome to see @SocketSecurity launch with a fresh approach! Excited to have supported the team from the early days.

DC Posch
Director of Technology at AppFolio, CTO at Dynasty
This is going to be super important, especially for crypto projects where a compromised dependency results in stolen user assets.

Luis Naranjo
Software Engineer at Microsoft
If software supply chain attacks through npm don't scare the shit out of you, you're not paying close enough attention.
@SocketSecurity sounds like an awesome product. I'll be using socket.dev instead of npmjs.org to browse npm packages going forward

Elena Nadolinski
Founder and CEO at Iron Fish
Huge congrats to @SocketSecurity! 🙌
Literally the only product that proactively detects signs of JS compromised packages.

Joe Previte
Engineering Team Lead at Coder
Congrats to @feross and the @SocketSecurity team on their seed funding! 🚀 It's been a big help for us at @CoderHQ and we appreciate what y'all are doing!

Josh Goldberg
Staff Developer at Codecademy
This is such a great idea & looks fantastic, congrats & good luck @feross + team!
The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Scott Roberts
CISO at UiPath
As a happy Socket customer, I've been impressed with how quickly they are adding value to the product, this move is a great step!

Yan Zhu
Head of Security at Brave, DEFCON, EFF, W3C
glad to hear some of the smartest people i know are working on (npm, etc.) supply chain security finally :). @SocketSecurity

Andrew Peterson
CEO and Co-Founder at Signal Sciences (acq. Fastly)
How do you track the validity of open source software libraries as they get updated? You're prob not. Check out @SocketSecurity and the updated tooling they launched.
Supply chain is a cluster in security as we all know and the tools from Socket are "duh" type tools to be implementing. Check them out and follow Feross Aboukhadijeh to see more updates coming from them in the future.

Zbyszek Tenerowicz
Senior Security Engineer at ConsenSys
socket.dev is getting more appealing by the hour

Devdatta Akhawe
Head of Security at Figma
The @SocketSecurity team is on fire! Amazing progress and I am exciting to see where they go next.

Sebastian Bensusan
Engineer Manager at Stripe
I find it surprising that we don't have _more_ supply chain attacks in software:
Imagine your airplane (the code running) was assembled (deployed) daily, with parts (dependencies) from internet strangers. How long until you get a bad part?
Excited for Socket to prevent this

Adam Baldwin
VP of Security at npm, Red Team at Auth0/Okta
Congrats to everyone at @SocketSecurity ❤️🤘🏻

Nico Waisman
CISO at Lyft
This is an area that I have personally been very focused on. As Nat Friedman said in the 2019 GitHub Universe keynote, Open Source won, and every time you add a new open source project you rely on someone else code and you rely on the people that build it.
This is both exciting and problematic. You are bringing real risk into your organization, and I'm excited to see progress in the industry from OpenSSF scorecards and package analyzers to the company that Feross Aboukhadijeh is building!
Depend on Socket to prevent malicious open source dependencies from infiltrating your app.
Install the Socket GitHub App in just 2 clicks and get protected today.
Block 70+ issues in open source code, including malware, typo-squatting, hidden code, misleading packages, permission creep, and more.
Reduce work by surfacing actionable security information directly in GitHub. Empower developers to make better decisions.
Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.
Dec 14, 2023
Hijacked cryptocurrency library adds malware
Widely-used library in cryptocurrency frontend was compromised to include wallet-draining code, following the hijacking of NPM account credentials via phishing.
Jan 06, 2022
Maintainer intentionally adds malware
Rogue maintainer sabotages his own open source package with 100M downloads/month, notably breaking Amazon's AWS SDK.
Nov 15, 2021
npm discovers a platform vulnerability allowing unauthorized publishing of any package
Attackers could publish new versions of any npm package without authorization for multiple years.
Oct 22, 2021
Hijacked package adds cryptominers and password-stealing malware
Multiple packages with 30M downloads/month are hijacked and publish malicious versions directly into the software supply chain.
Nov 26, 2018
Package hijacked adding organization specific backdoors
Obfuscated malware added to a dependency which targeted a single company, went undetected for over a week, and made it into their production build.
Get our latest security research, open source insights, and product updates.

Security News
Recent coverage mislabels the latest TEA protocol spam as a worm. Here’s what’s actually happening.

Security News
PyPI adds Trusted Publishing support for GitLab Self-Managed as adoption reaches 25% of uploads

Research
/Security News
A malicious Chrome extension posing as an Ethereum wallet steals seed phrases by encoding them into Sui transactions, enabling full wallet takeover.