Socket
Book a DemoInstallSign in
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub AppBook a Demo

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery
t

timmywil published 3.7.1

left-pad
s

stevemao published 1.3.0

react
r

react-bot published 19.1.1

We protect you from vulnerable and malicious packages

godaddy-model

999.9.9

by amigomioteconsidero19

Removed from npm

Blocked by Socket

The code is designed to exfiltrate system information by sending it to an external domain via DNS queries. This is a clear indication of malicious behavior, as it involves unauthorized data transmission without user consent.

Live on npm for 17 minutes before removal. Socket users were protected even while the package was live.

agentkpalive

4.5.0

by uj7f3wd16zwbu

Live on npm

Blocked by Socket

The code exhibits several characteristics typical of potentially malicious software, including obfuscation, downloading and executing files, and recursive error handling. These behaviors suggest a high risk of executing untrusted code, which could compromise the system.

litelemdent

1.2.0

by 17b4a931

Removed from npm

Blocked by Socket

This code poses a serious security risk and should not be used.

Live on npm for 38 minutes before removal. Socket users were protected even while the package was live.

cmft-utils

1.98.98

Removed from npm

Blocked by Socket

This code exhibits malicious behavior by collecting sensitive system information (OS type, username, current working directory, hostname, and IP addresses), encoding this data in base64, and sending it to a remote server (http://149[.]104[.]26[.]89/cmd.dat). It also attempts to download and execute a binary payload from the same server, which could lead to further compromise. The code includes environment checks to determine if it's running in a sandbox, suggesting an attempt to evade detection. After execution, it attempts to delete files to cover its tracks. The code is heavily obfuscated to make analysis difficult.

Live on npm for 4 days, 4 hours and 23 minutes before removal. Socket users were protected even while the package was live.

iberia-database

999.9.9

by amigomioteconsidero23

Removed from npm

Blocked by Socket

The code is designed to exfiltrate system information by sending it to an external domain via DNS queries. This is a clear indication of malicious behavior, as it involves unauthorized data transmission without user consent.

Live on npm for 1 hour and 55 minutes before removal. Socket users were protected even while the package was live.

@linx-ui/shared

1.0.0

by banditnikhil

Live on npm

Blocked by Socket

The code snippet exhibits malicious behavior by sending the current working directory to an external domain without user consent. This poses a significant security risk due to unauthorized data exfiltration.

async-query-data

1.4.1

by smaroop

Removed from npm

Blocked by Socket

The source code exhibits behavior typical of malicious software by collecting and sending sensitive system information to a remote server without user consent. This poses a significant security risk and could potentially be used for data theft or unauthorized tracking.

Live on npm for 6 hours and 15 minutes before removal. Socket users were protected even while the package was live.

18f-dashboard

1.19.999

Removed from npm

Blocked by Socket

The code is attempting to exfiltrate system information by sending it over the network using the ping command. This behavior is potentially malicious as it may result in data leakage or unauthorized access to sensitive information.

Live on npm for 38 minutes before removal. Socket users were protected even while the package was live.

tiktok_4d_webapp

9.0.0

by imd4x

Removed from npm

Blocked by Socket

The script triggers an outbound network request during its preinstall phase by executing a curl command on a shortened URL (example[.]com/JR006D). The use of such a URL is concerning because link shortening services can obscure the true destination and are often employed for tracking user data, exfiltration, or delivering malicious payloads. This behavior indicates a potential attempt to compromise system security and user privacy.

Live on npm for 36 days and 4 hours before removal. Socket users were protected even while the package was live.

cfa-styleguide

2.0.9

by maddyattacker

Removed from npm

Blocked by Socket

This code is highly suspicious and potentially malicious. It should not be used without further investigation and review.

Live on npm for 6 minutes before removal. Socket users were protected even while the package was live.

igshared

8.1.2

by mgzsec

Removed from npm

Blocked by Socket

This code is malicious and poses a high security risk. It covertly collects and sends sensitive system and environment information to a remote Telegram bot without user consent, constituting data theft. The presence of hardcoded credentials and use of a public messaging platform for exfiltration further confirm its malicious intent. The code is not obfuscated but is designed for stealthy data exfiltration. It should be treated as malware and avoided.

Live on npm for 11 days, 19 hours and 44 minutes before removal. Socket users were protected even while the package was live.

replace

0.2.0

by harth

Live on npm

Blocked by Socket

This package contains a critical code injection vulnerability through the eval() function that executes arbitrary JavaScript from user-specified files. This represents an extremely high security risk that could lead to complete system compromise, data theft, or backdoor installation.

idp-shared-node-library

999.999.999

Removed from npm

Blocked by Socket

The source code is performing clear malicious activities by exfiltrating system data to a remote server. This justifies high scores in malware, obfuscation, and risk categories. The provided reports do not contain useful information, but the code itself clearly indicates a serious security incident.

Live on npm for 1 hour and 7 minutes before removal. Socket users were protected even while the package was live.

@uniqa/document-ms-api

77.77.77

by toni4242

Live on npm

Blocked by Socket

The code sends sensitive system information over the network without user consent, which poses a significant privacy risk. This behavior is indicative of potentially malicious intent.

typescript-react-redux-boilerplate

1.1.0

by nkdjcidcn

Removed from npm

Blocked by Socket

This file collects sensitive system and user information (home directory, username, hostname, DNS servers, etc.) and sends it to a remote server at hg1as3ob4o9c1ew54a142gz02r8iw8kx[.]oastify[.]com without user knowledge or consent. It also writes this data to a local file (poc.txt). Such unauthorized data collection and transmission is malicious and poses a high security risk.

Live on npm for 8 days, 9 hours and 23 minutes before removal. Socket users were protected even while the package was live.

azure-graphrbac

6.29.1000

Removed from npm

Blocked by Socket

The code appears to be malicious. It exfiltrates sensitive system information and project-specific data to external servers. The use of continuous directory traversal and sending potentially confidential data to suspicious domains indicates high probability of malicious intent.

Live on npm for 1 hour before removal. Socket users were protected even while the package was live.

thispackagedoesnotexist

0.8.6

Removed from PyPI

Blocked by Socket

The code poses a potential security risk due to the execution of system commands without clear input validation and sanitization. However, without a detailed report and more context, the actual risk and intent are difficult to assess.

Live on PyPI for 4 hours and 56 minutes before removal. Socket users were protected even while the package was live.

graphlibcore

2.2.10

by taylortech

Removed from npm

Blocked by Socket

This script embeds two Base64-encoded, AES-GCM–encrypted blobs that it decrypts at runtime to obtain a command-and-control hostname and then a payload URL. It resolves the decrypted hostname via DNS (requires exactly one A record), uses that IP as the decryption key for the second blob, and retrieves a remote JavaScript payload over HTTP(S). The payload is saved as “startup.js” inside the user’s Chrome data Scripts folder, patched to reference the correct absolute Node.js path, marked executable, and launched in a detached Node.js process without user consent. After a short delay it deletes its own source file (__filename), removes the accompanying graph-settings.min.js, and patches graph.js to strip out its initialization calls—clearly a self-deleting downloader/backdoor implant.

Live on npm for 6 days, 2 hours and 52 minutes before removal. Socket users were protected even while the package was live.

mobilecoin-wallet

99.9.9

by zvalid123

Removed from npm

Blocked by Socket

The script collects information like hostname, platform, user info, and current working directory, then sends it as base64-encoded JSON to a remote server.

Live on npm for 3 days, 6 hours and 30 minutes before removal. Socket users were protected even while the package was live.

npm-cnof

0.0.1-security.7

Removed from npm

Blocked by Socket

Possible typosquat of npm-conf

Live on npm for 1 hour and 46 minutes before removal. Socket users were protected even while the package was live.

pictogrameditor

3.3.3

Removed from npm

Blocked by Socket

This script is attempting to exfiltrate system information to a remote server. This behavior is highly suspicious and poses a significant security risk.

Live on npm for 52 minutes before removal. Socket users were protected even while the package was live.

@cvent-wdio/wdio-configs

0.1.17

by elijahsey

Live on npm

Blocked by Socket

This package's 'postinstall' script executes 'ip a' to retrieve network interface information and sends it to a remote server via an HTTP POST request to 'http://nkbri3r9b8ddoze1m3pfjzhcc3it6i[.]burp[.]gdsburp[.]com/'. If this request fails, it attempts to download data from the same server using 'wget'. This behavior exfiltrates potentially sensitive system information without user consent and is indicative of malware.

multicogs

1.1.3

by theliondoesntconcernhimselfwithusernames

Removed from npm

Blocked by Socket

The analyzed code is a malicious Discord token stealer that exfiltrates authentication tokens and sensitive user data to an attacker-controlled webhook. It poses a severe security risk by enabling unauthorized account access, privacy violations, and potential financial fraud. The code is not obfuscated but is clearly designed for malicious purposes. It should be considered highly dangerous and avoided.

Live on npm for 13 hours and 30 minutes before removal. Socket users were protected even while the package was live.

nordic-dev

6.14.3

by h001_mrcd0

Removed from npm

Blocked by Socket

The code exhibits malicious behavior by exfiltrating environment variables to an external domain. This poses a significant security risk due to the potential exposure of sensitive information.

Live on npm for 1 hour and 25 minutes before removal. Socket users were protected even while the package was live.

@xunlie/vue-clickout

1.0.0

by xunlie

Live on npm

Blocked by Socket

The script decodes a base64-encoded command and then executes it using the 'child_process.exec' function. This behavior is highly suspicious and indicates potential malicious intent.

godaddy-model

999.9.9

by amigomioteconsidero19

Removed from npm

Blocked by Socket

The code is designed to exfiltrate system information by sending it to an external domain via DNS queries. This is a clear indication of malicious behavior, as it involves unauthorized data transmission without user consent.

Live on npm for 17 minutes before removal. Socket users were protected even while the package was live.

agentkpalive

4.5.0

by uj7f3wd16zwbu

Live on npm

Blocked by Socket

The code exhibits several characteristics typical of potentially malicious software, including obfuscation, downloading and executing files, and recursive error handling. These behaviors suggest a high risk of executing untrusted code, which could compromise the system.

litelemdent

1.2.0

by 17b4a931

Removed from npm

Blocked by Socket

This code poses a serious security risk and should not be used.

Live on npm for 38 minutes before removal. Socket users were protected even while the package was live.

cmft-utils

1.98.98

Removed from npm

Blocked by Socket

This code exhibits malicious behavior by collecting sensitive system information (OS type, username, current working directory, hostname, and IP addresses), encoding this data in base64, and sending it to a remote server (http://149[.]104[.]26[.]89/cmd.dat). It also attempts to download and execute a binary payload from the same server, which could lead to further compromise. The code includes environment checks to determine if it's running in a sandbox, suggesting an attempt to evade detection. After execution, it attempts to delete files to cover its tracks. The code is heavily obfuscated to make analysis difficult.

Live on npm for 4 days, 4 hours and 23 minutes before removal. Socket users were protected even while the package was live.

iberia-database

999.9.9

by amigomioteconsidero23

Removed from npm

Blocked by Socket

The code is designed to exfiltrate system information by sending it to an external domain via DNS queries. This is a clear indication of malicious behavior, as it involves unauthorized data transmission without user consent.

Live on npm for 1 hour and 55 minutes before removal. Socket users were protected even while the package was live.

@linx-ui/shared

1.0.0

by banditnikhil

Live on npm

Blocked by Socket

The code snippet exhibits malicious behavior by sending the current working directory to an external domain without user consent. This poses a significant security risk due to unauthorized data exfiltration.

async-query-data

1.4.1

by smaroop

Removed from npm

Blocked by Socket

The source code exhibits behavior typical of malicious software by collecting and sending sensitive system information to a remote server without user consent. This poses a significant security risk and could potentially be used for data theft or unauthorized tracking.

Live on npm for 6 hours and 15 minutes before removal. Socket users were protected even while the package was live.

18f-dashboard

1.19.999

Removed from npm

Blocked by Socket

The code is attempting to exfiltrate system information by sending it over the network using the ping command. This behavior is potentially malicious as it may result in data leakage or unauthorized access to sensitive information.

Live on npm for 38 minutes before removal. Socket users were protected even while the package was live.

tiktok_4d_webapp

9.0.0

by imd4x

Removed from npm

Blocked by Socket

The script triggers an outbound network request during its preinstall phase by executing a curl command on a shortened URL (example[.]com/JR006D). The use of such a URL is concerning because link shortening services can obscure the true destination and are often employed for tracking user data, exfiltration, or delivering malicious payloads. This behavior indicates a potential attempt to compromise system security and user privacy.

Live on npm for 36 days and 4 hours before removal. Socket users were protected even while the package was live.

cfa-styleguide

2.0.9

by maddyattacker

Removed from npm

Blocked by Socket

This code is highly suspicious and potentially malicious. It should not be used without further investigation and review.

Live on npm for 6 minutes before removal. Socket users were protected even while the package was live.

igshared

8.1.2

by mgzsec

Removed from npm

Blocked by Socket

This code is malicious and poses a high security risk. It covertly collects and sends sensitive system and environment information to a remote Telegram bot without user consent, constituting data theft. The presence of hardcoded credentials and use of a public messaging platform for exfiltration further confirm its malicious intent. The code is not obfuscated but is designed for stealthy data exfiltration. It should be treated as malware and avoided.

Live on npm for 11 days, 19 hours and 44 minutes before removal. Socket users were protected even while the package was live.

replace

0.2.0

by harth

Live on npm

Blocked by Socket

This package contains a critical code injection vulnerability through the eval() function that executes arbitrary JavaScript from user-specified files. This represents an extremely high security risk that could lead to complete system compromise, data theft, or backdoor installation.

idp-shared-node-library

999.999.999

Removed from npm

Blocked by Socket

The source code is performing clear malicious activities by exfiltrating system data to a remote server. This justifies high scores in malware, obfuscation, and risk categories. The provided reports do not contain useful information, but the code itself clearly indicates a serious security incident.

Live on npm for 1 hour and 7 minutes before removal. Socket users were protected even while the package was live.

@uniqa/document-ms-api

77.77.77

by toni4242

Live on npm

Blocked by Socket

The code sends sensitive system information over the network without user consent, which poses a significant privacy risk. This behavior is indicative of potentially malicious intent.

typescript-react-redux-boilerplate

1.1.0

by nkdjcidcn

Removed from npm

Blocked by Socket

This file collects sensitive system and user information (home directory, username, hostname, DNS servers, etc.) and sends it to a remote server at hg1as3ob4o9c1ew54a142gz02r8iw8kx[.]oastify[.]com without user knowledge or consent. It also writes this data to a local file (poc.txt). Such unauthorized data collection and transmission is malicious and poses a high security risk.

Live on npm for 8 days, 9 hours and 23 minutes before removal. Socket users were protected even while the package was live.

azure-graphrbac

6.29.1000

Removed from npm

Blocked by Socket

The code appears to be malicious. It exfiltrates sensitive system information and project-specific data to external servers. The use of continuous directory traversal and sending potentially confidential data to suspicious domains indicates high probability of malicious intent.

Live on npm for 1 hour before removal. Socket users were protected even while the package was live.

thispackagedoesnotexist

0.8.6

Removed from PyPI

Blocked by Socket

The code poses a potential security risk due to the execution of system commands without clear input validation and sanitization. However, without a detailed report and more context, the actual risk and intent are difficult to assess.

Live on PyPI for 4 hours and 56 minutes before removal. Socket users were protected even while the package was live.

graphlibcore

2.2.10

by taylortech

Removed from npm

Blocked by Socket

This script embeds two Base64-encoded, AES-GCM–encrypted blobs that it decrypts at runtime to obtain a command-and-control hostname and then a payload URL. It resolves the decrypted hostname via DNS (requires exactly one A record), uses that IP as the decryption key for the second blob, and retrieves a remote JavaScript payload over HTTP(S). The payload is saved as “startup.js” inside the user’s Chrome data Scripts folder, patched to reference the correct absolute Node.js path, marked executable, and launched in a detached Node.js process without user consent. After a short delay it deletes its own source file (__filename), removes the accompanying graph-settings.min.js, and patches graph.js to strip out its initialization calls—clearly a self-deleting downloader/backdoor implant.

Live on npm for 6 days, 2 hours and 52 minutes before removal. Socket users were protected even while the package was live.

mobilecoin-wallet

99.9.9

by zvalid123

Removed from npm

Blocked by Socket

The script collects information like hostname, platform, user info, and current working directory, then sends it as base64-encoded JSON to a remote server.

Live on npm for 3 days, 6 hours and 30 minutes before removal. Socket users were protected even while the package was live.

npm-cnof

0.0.1-security.7

Removed from npm

Blocked by Socket

Possible typosquat of npm-conf

Live on npm for 1 hour and 46 minutes before removal. Socket users were protected even while the package was live.

pictogrameditor

3.3.3

Removed from npm

Blocked by Socket

This script is attempting to exfiltrate system information to a remote server. This behavior is highly suspicious and poses a significant security risk.

Live on npm for 52 minutes before removal. Socket users were protected even while the package was live.

@cvent-wdio/wdio-configs

0.1.17

by elijahsey

Live on npm

Blocked by Socket

This package's 'postinstall' script executes 'ip a' to retrieve network interface information and sends it to a remote server via an HTTP POST request to 'http://nkbri3r9b8ddoze1m3pfjzhcc3it6i[.]burp[.]gdsburp[.]com/'. If this request fails, it attempts to download data from the same server using 'wget'. This behavior exfiltrates potentially sensitive system information without user consent and is indicative of malware.

multicogs

1.1.3

by theliondoesntconcernhimselfwithusernames

Removed from npm

Blocked by Socket

The analyzed code is a malicious Discord token stealer that exfiltrates authentication tokens and sensitive user data to an attacker-controlled webhook. It poses a severe security risk by enabling unauthorized account access, privacy violations, and potential financial fraud. The code is not obfuscated but is clearly designed for malicious purposes. It should be considered highly dangerous and avoided.

Live on npm for 13 hours and 30 minutes before removal. Socket users were protected even while the package was live.

nordic-dev

6.14.3

by h001_mrcd0

Removed from npm

Blocked by Socket

The code exhibits malicious behavior by exfiltrating environment variables to an external domain. This poses a significant security risk due to the potential exposure of sensitive information.

Live on npm for 1 hour and 25 minutes before removal. Socket users were protected even while the package was live.

@xunlie/vue-clickout

1.0.0

by xunlie

Live on npm

Blocked by Socket

The script decodes a base64-encoded command and then executes it using the 'child_process.exec' function. This behavior is highly suspicious and indicates potential malicious intent.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Known malware

Possible typosquat attack

Chrome Extension Permission

Chrome Extension Wildcard Host Permission

NPM Shrinkwrap

Git dependency

HTTP dependency

Suspicious Stars on GitHub

Protestware or potentially unwanted behavior

Unstable ownership

25 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Even more security team love
Book a DemoRead the blog

Why teams choose Socket

Pro-active security

Depend on Socket to prevent malicious open source dependencies from infiltrating your app.

Easy to install

Install the Socket GitHub App in just 2 clicks and get protected today.

Comprehensive open source protection

Block 70+ issues in open source code, including malware, typo-squatting, hidden code, misleading packages, permission creep, and more.

Develop faster

Reduce work by surfacing actionable security information directly in GitHub. Empower developers to make better decisions.

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Dec 14, 2023

Hijacked cryptocurrency library adds malware

Widely-used library in cryptocurrency frontend was compromised to include wallet-draining code, following the hijacking of NPM account credentials via phishing.

Jan 06, 2022

Maintainer intentionally adds malware

Rogue maintainer sabotages his own open source package with 100M downloads/month, notably breaking Amazon's AWS SDK.

Nov 15, 2021

npm discovers a platform vulnerability allowing unauthorized publishing of any package

Attackers could publish new versions of any npm package without authorization for multiple years.

Oct 22, 2021

Hijacked package adds cryptominers and password-stealing malware

Multiple packages with 30M downloads/month are hijacked and publish malicious versions directly into the software supply chain.

Nov 26, 2018

Package hijacked adding organization specific backdoors

Obfuscated malware added to a dependency which targeted a single company, went undetected for over a week, and made it into their production build.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub AppBook a Demo

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles
SocketSocket SOC 2 Logo

Product

About

Packages

Stay in touch

Get open source security insights delivered straight into your inbox.

  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc

U.S. Patent No. 12,346,443 & 12,314,394. Other pending.