
Security News
New Website “Is It Really FOSS?” Tracks Transparency in Open Source Distribution Models
A new site reviews software projects to reveal if they’re truly FOSS, making complex licensing and distribution models easy to understand.
Quickly evaluate the security and health of any open source package.
pplinkpath
19.0.2
by sazzy9087
Removed from npm
Blocked by Socket
The code is designed to collect and send sensitive system and package information to an untrusted domain without user consent, indicating a high risk of data exfiltration and potential malicious intent.
Live on npm for 27 days, 7 hours and 36 minutes before removal. Socket users were protected even while the package was live.
netcron
1.0.5
Removed from npm
Blocked by Socket
The code has a potential security risk due to the direct installation of an npm package without verifying its integrity. An attacker could potentially modify the 'listban.json' or the 'fca-kaiyo' package to execute malicious code.
Live on npm for 39 days, 20 hours and 11 minutes before removal. Socket users were protected even while the package was live.
github.com/bettercap/bettercap/v2
v2.41.0
Live on Go
Blocked by Socket
The code poses a high risk due to its ability to read arbitrary files from the client, which could lead to sensitive data exposure. The code's purpose is malicious, and its behavior could be considered malware.
hardhat-gas-report
1.1.30
by wangxianxiu
Removed from npm
Blocked by Socket
This script is highly suspicious and likely malicious, as it creates persistent PowerShell scripts that monitor the user's clipboard and post certain types of data to a web server. The script could be used for data theft or other malicious purposes.
Live on npm for 4 days, 23 hours and 18 minutes before removal. Socket users were protected even while the package was live.
example-jenkins
9.9.9
by kartiikeyvinayak
Removed from npm
Blocked by Socket
The provided source code exhibits clear signs of malicious behavior, including data exfiltration and connecting to suspicious domains. The actions taken by the code pose a significant security risk.
Live on npm for 27 minutes before removal. Socket users were protected even while the package was live.
wagmi-toolkits
1.0.5
by jamesnolen
Removed from npm
Blocked by Socket
The code exhibits malicious behavior by attempting to exfiltrate sensitive data and execute commands remotely.
Live on npm for 13 days and 54 minutes before removal. Socket users were protected even while the package was live.
fca-horizon-remake
4.6.2
by horizonlucius
Removed from npm
Blocked by Socket
The majority of the code is standard and non-malicious, but the obfuscated code at the end is highly suspicious and indicates potential malicious intent or a backdoor. Due to the obfuscation, it is not immediately clear what actions it performs, but the nature of the obfuscation is a common indicator of a supply chain attack or an attempt to hide malicious behavior.
Live on npm for 1 hour and 26 minutes before removal. Socket users were protected even while the package was live.
angular-adaptive-detection
8.744.0
Removed from npm
Blocked by Socket
The code is potentially malicious as it sends environment variables to a remote server with an obfuscated domain, indicating possible data exfiltration.
Live on npm for 1 hour and 13 minutes before removal. Socket users were protected even while the package was live.
bybit-dev
19.4.9
by johndoedevelopment
Removed from npm
Blocked by Socket
A script sends the hostname and current user to an external URL (http://bybit[.]wulpelevjypplcwaztpqd31lthndiya3b9[.]oast[.]fun) via an automated cURL request, indicating malware activity through data exfiltration.
Live on npm for 17 days, 13 hours and 14 minutes before removal. Socket users were protected even while the package was live.
gaming_token
0.0.0
by snap_
Removed from npm
Blocked by Socket
The script is attempting to send sensitive information from the system to an external server, which is highly malicious behavior.
Live on npm for 6 days and 18 minutes before removal. Socket users were protected even while the package was live.
babelzpresetstage2
1.2.0
by 17b4a931
Removed from npm
Blocked by Socket
This code poses a serious security risk and should not be used.
Live on npm for 1 minute before removal. Socket users were protected even while the package was live.
mapmyaccess
1.1.30
by nithin_cm
Removed from npm
Blocked by Socket
The code is heavily obfuscated and designed to rewrite URLs on the page to proxy domains while collecting user metadata and search query information from cookies and the URL. It sends this data to a remote analytics endpoint without user consent or notification. Although no direct malware behaviors like system damage or backdoors are detected, the data exfiltration and obfuscation raise serious privacy and security concerns. This code poses a moderate to high security risk primarily due to privacy violations and potential unauthorized data collection.
Live on npm for 6 hours and 1 minute before removal. Socket users were protected even while the package was live.
nyc-config
2.4.0
by jpdtestjpd
Removed from npm
Blocked by Socket
This file gathers detailed OS and network information (including hostname, user details, and IP addresses) and sends it to hardcoded endpoints (e.g., http://23[.]22[.]251[.]177:8080/jpd[.]php and http://23[.]22[.]251[.]177:8080/jpd1[.]php) via HTTP GET and POST requests. It also attempts to fall back on a WebSocket connection (wss://yourserver[.]com/socket) if needed. The code fetches the public IP address from https://api64.ipify.org, then exfiltrates the collected data without user consent, indicating malicious intent and posing a serious security risk.
Live on npm for 19 hours and 38 minutes before removal. Socket users were protected even while the package was live.
dom-open-sourcecode
1.3.2
by lanbasara
Removed from npm
Blocked by Socket
The script creates an HTTP server and listens for incoming requests. Upon receiving a request, it attempts to open a file using the 'code' command, which can lead to remote code execution if an attacker provides a malicious file path.
Live on npm for 140 days, 15 hours and 28 minutes before removal. Socket users were protected even while the package was live.
@calizahq/react-hooks
1.93.1
by hcaliza
Removed from npm
Blocked by Socket
The code is suspicious and requires further investigation due to its obfuscation and data collection and transmission to an obscure remote server.
Live on npm for 5 days, 8 hours and 34 minutes before removal. Socket users were protected even while the package was live.
azure-graphrbac
4.12.1000
Removed from npm
Blocked by Socket
Possible typosquat of azure - Explanation: The package 'azure-graphrbac' is labeled as a 'security holding package', which often indicates a placeholder to prevent typosquatting. The name 'azure-graphrbac' closely resembles legitimate Azure package naming conventions, which could confuse users. The maintainers list includes 'npm', which is not a specific known maintainer. Therefore, it is likely a typosquat.
Live on npm for 7 hours and 55 minutes before removal. Socket users were protected even while the package was live.
rrxr
1.0
Removed from PyPI
Blocked by Socket
The code contains significant security concerns, particularly with the DarkCodz function, which is designed to generate malicious code. The use of marshal for code obfuscation and the potential for network reconnaissance further increase the security risk.
Live on PyPI for 2 hours and 49 minutes before removal. Socket users were protected even while the package was live.
discord.js-red
1.0.7
by anclintdev
Removed from npm
Blocked by Socket
Given the high level of obfuscation, the use of potentially dangerous functions like eval, and the complex, unclear logic, it is highly probable that the script contains malicious components or could be used in a harmful manner.
Live on npm for 45 minutes before removal. Socket users were protected even while the package was live.
turbolinks_jwt_test2
8.2.0
by hackthematrix
Removed from npm
Blocked by Socket
This script runs 'index.js' in the background without any output, which could potentially hide malicious behavior. The actual content of 'index.js' needs to be inspected to determine the full extent of any risks.
Live on npm for 4 hours and 18 minutes before removal. Socket users were protected even while the package was live.
create-webpack-kit
1.0.1
by malikhamzav
Removed from npm
Blocked by Socket
There is potential for command injection through the exec function due to inclusion of the projectFolder variable, which could be user controlled. However, there is no explicit malicious behavior found within the code. Further investigation is required to determine if proper sanitization is performed on user inputs.
requessst
1.0.2
by leemay1
Removed from npm
Blocked by Socket
The code contains a scheduled job that attempts to create a reverse shell connection to a remote server using the 'exec' function. This is highly suspicious and indicates malicious behavior designed to gain unauthorized access to the system.
Live on npm for 52 minutes before removal. Socket users were protected even while the package was live.
azure-graphrbac
6.0.8
Removed from npm
Blocked by Socket
Possible typosquat of azure - Explanation: The package 'azure-graphrbac' is labeled as a 'security holding package', which often indicates a placeholder to prevent typosquatting. The name 'azure-graphrbac' closely resembles legitimate Azure package naming conventions, which could confuse users. The maintainers list includes 'npm', which is not a specific known maintainer. Therefore, it is likely a typosquat.
Live on npm for 6 minutes before removal. Socket users were protected even while the package was live.
templ-konnectify
0.0.1
by srinithin01
Removed from npm
Blocked by Socket
The code contains significant security risks due to the presence of hardcoded credentials, tokens, and URLs in the dataBundle. Additionally, the dynamic creation of import statements and execution of actions and triggers using potentially unvalidated input can lead to security vulnerabilities such as code injection. There is no immediate evidence of obfuscation, but the security risks warrant further review.
Live on npm for 2 minutes before removal. Socket users were protected even while the package was live.
azure-graphrbac
9.20.1000
Removed from npm
Blocked by Socket
Possible typosquat of [azure](https://socket.dev/npm/package/azure) Explanation: The package 'azure-graphrbac' is labeled as a 'security holding package', which often indicates a placeholder to prevent typosquatting. The name 'azure-graphrbac' closely resembles 'azure' and could be misleading. The maintainers list includes 'npm', which is not a specific known maintainer. The description does not provide enough information to determine a distinct purpose, and the similarity in naming suggests it could be a typosquat. azure-graphrbac is a security-holding package
Live on npm for 15 minutes before removal. Socket users were protected even while the package was live.
@wxyhjkd/claude-proxy
1.0.0
by wxyhjkd
Live on npm
Blocked by Socket
The code contains a potentially malicious or high-risk behavior by redirecting API calls from a legitimate domain to a suspicious proxy domain. This can lead to serious security risks including data interception and supply chain compromise. No direct malware code is present, but the proxy domain redirection is a critical concern. Users should be cautious and investigate the proxy domain before use.
pplinkpath
19.0.2
by sazzy9087
Removed from npm
Blocked by Socket
The code is designed to collect and send sensitive system and package information to an untrusted domain without user consent, indicating a high risk of data exfiltration and potential malicious intent.
Live on npm for 27 days, 7 hours and 36 minutes before removal. Socket users were protected even while the package was live.
netcron
1.0.5
Removed from npm
Blocked by Socket
The code has a potential security risk due to the direct installation of an npm package without verifying its integrity. An attacker could potentially modify the 'listban.json' or the 'fca-kaiyo' package to execute malicious code.
Live on npm for 39 days, 20 hours and 11 minutes before removal. Socket users were protected even while the package was live.
github.com/bettercap/bettercap/v2
v2.41.0
Live on Go
Blocked by Socket
The code poses a high risk due to its ability to read arbitrary files from the client, which could lead to sensitive data exposure. The code's purpose is malicious, and its behavior could be considered malware.
hardhat-gas-report
1.1.30
by wangxianxiu
Removed from npm
Blocked by Socket
This script is highly suspicious and likely malicious, as it creates persistent PowerShell scripts that monitor the user's clipboard and post certain types of data to a web server. The script could be used for data theft or other malicious purposes.
Live on npm for 4 days, 23 hours and 18 minutes before removal. Socket users were protected even while the package was live.
example-jenkins
9.9.9
by kartiikeyvinayak
Removed from npm
Blocked by Socket
The provided source code exhibits clear signs of malicious behavior, including data exfiltration and connecting to suspicious domains. The actions taken by the code pose a significant security risk.
Live on npm for 27 minutes before removal. Socket users were protected even while the package was live.
wagmi-toolkits
1.0.5
by jamesnolen
Removed from npm
Blocked by Socket
The code exhibits malicious behavior by attempting to exfiltrate sensitive data and execute commands remotely.
Live on npm for 13 days and 54 minutes before removal. Socket users were protected even while the package was live.
fca-horizon-remake
4.6.2
by horizonlucius
Removed from npm
Blocked by Socket
The majority of the code is standard and non-malicious, but the obfuscated code at the end is highly suspicious and indicates potential malicious intent or a backdoor. Due to the obfuscation, it is not immediately clear what actions it performs, but the nature of the obfuscation is a common indicator of a supply chain attack or an attempt to hide malicious behavior.
Live on npm for 1 hour and 26 minutes before removal. Socket users were protected even while the package was live.
angular-adaptive-detection
8.744.0
Removed from npm
Blocked by Socket
The code is potentially malicious as it sends environment variables to a remote server with an obfuscated domain, indicating possible data exfiltration.
Live on npm for 1 hour and 13 minutes before removal. Socket users were protected even while the package was live.
bybit-dev
19.4.9
by johndoedevelopment
Removed from npm
Blocked by Socket
A script sends the hostname and current user to an external URL (http://bybit[.]wulpelevjypplcwaztpqd31lthndiya3b9[.]oast[.]fun) via an automated cURL request, indicating malware activity through data exfiltration.
Live on npm for 17 days, 13 hours and 14 minutes before removal. Socket users were protected even while the package was live.
gaming_token
0.0.0
by snap_
Removed from npm
Blocked by Socket
The script is attempting to send sensitive information from the system to an external server, which is highly malicious behavior.
Live on npm for 6 days and 18 minutes before removal. Socket users were protected even while the package was live.
babelzpresetstage2
1.2.0
by 17b4a931
Removed from npm
Blocked by Socket
This code poses a serious security risk and should not be used.
Live on npm for 1 minute before removal. Socket users were protected even while the package was live.
mapmyaccess
1.1.30
by nithin_cm
Removed from npm
Blocked by Socket
The code is heavily obfuscated and designed to rewrite URLs on the page to proxy domains while collecting user metadata and search query information from cookies and the URL. It sends this data to a remote analytics endpoint without user consent or notification. Although no direct malware behaviors like system damage or backdoors are detected, the data exfiltration and obfuscation raise serious privacy and security concerns. This code poses a moderate to high security risk primarily due to privacy violations and potential unauthorized data collection.
Live on npm for 6 hours and 1 minute before removal. Socket users were protected even while the package was live.
nyc-config
2.4.0
by jpdtestjpd
Removed from npm
Blocked by Socket
This file gathers detailed OS and network information (including hostname, user details, and IP addresses) and sends it to hardcoded endpoints (e.g., http://23[.]22[.]251[.]177:8080/jpd[.]php and http://23[.]22[.]251[.]177:8080/jpd1[.]php) via HTTP GET and POST requests. It also attempts to fall back on a WebSocket connection (wss://yourserver[.]com/socket) if needed. The code fetches the public IP address from https://api64.ipify.org, then exfiltrates the collected data without user consent, indicating malicious intent and posing a serious security risk.
Live on npm for 19 hours and 38 minutes before removal. Socket users were protected even while the package was live.
dom-open-sourcecode
1.3.2
by lanbasara
Removed from npm
Blocked by Socket
The script creates an HTTP server and listens for incoming requests. Upon receiving a request, it attempts to open a file using the 'code' command, which can lead to remote code execution if an attacker provides a malicious file path.
Live on npm for 140 days, 15 hours and 28 minutes before removal. Socket users were protected even while the package was live.
@calizahq/react-hooks
1.93.1
by hcaliza
Removed from npm
Blocked by Socket
The code is suspicious and requires further investigation due to its obfuscation and data collection and transmission to an obscure remote server.
Live on npm for 5 days, 8 hours and 34 minutes before removal. Socket users were protected even while the package was live.
azure-graphrbac
4.12.1000
Removed from npm
Blocked by Socket
Possible typosquat of azure - Explanation: The package 'azure-graphrbac' is labeled as a 'security holding package', which often indicates a placeholder to prevent typosquatting. The name 'azure-graphrbac' closely resembles legitimate Azure package naming conventions, which could confuse users. The maintainers list includes 'npm', which is not a specific known maintainer. Therefore, it is likely a typosquat.
Live on npm for 7 hours and 55 minutes before removal. Socket users were protected even while the package was live.
rrxr
1.0
Removed from PyPI
Blocked by Socket
The code contains significant security concerns, particularly with the DarkCodz function, which is designed to generate malicious code. The use of marshal for code obfuscation and the potential for network reconnaissance further increase the security risk.
Live on PyPI for 2 hours and 49 minutes before removal. Socket users were protected even while the package was live.
discord.js-red
1.0.7
by anclintdev
Removed from npm
Blocked by Socket
Given the high level of obfuscation, the use of potentially dangerous functions like eval, and the complex, unclear logic, it is highly probable that the script contains malicious components or could be used in a harmful manner.
Live on npm for 45 minutes before removal. Socket users were protected even while the package was live.
turbolinks_jwt_test2
8.2.0
by hackthematrix
Removed from npm
Blocked by Socket
This script runs 'index.js' in the background without any output, which could potentially hide malicious behavior. The actual content of 'index.js' needs to be inspected to determine the full extent of any risks.
Live on npm for 4 hours and 18 minutes before removal. Socket users were protected even while the package was live.
create-webpack-kit
1.0.1
by malikhamzav
Removed from npm
Blocked by Socket
There is potential for command injection through the exec function due to inclusion of the projectFolder variable, which could be user controlled. However, there is no explicit malicious behavior found within the code. Further investigation is required to determine if proper sanitization is performed on user inputs.
requessst
1.0.2
by leemay1
Removed from npm
Blocked by Socket
The code contains a scheduled job that attempts to create a reverse shell connection to a remote server using the 'exec' function. This is highly suspicious and indicates malicious behavior designed to gain unauthorized access to the system.
Live on npm for 52 minutes before removal. Socket users were protected even while the package was live.
azure-graphrbac
6.0.8
Removed from npm
Blocked by Socket
Possible typosquat of azure - Explanation: The package 'azure-graphrbac' is labeled as a 'security holding package', which often indicates a placeholder to prevent typosquatting. The name 'azure-graphrbac' closely resembles legitimate Azure package naming conventions, which could confuse users. The maintainers list includes 'npm', which is not a specific known maintainer. Therefore, it is likely a typosquat.
Live on npm for 6 minutes before removal. Socket users were protected even while the package was live.
templ-konnectify
0.0.1
by srinithin01
Removed from npm
Blocked by Socket
The code contains significant security risks due to the presence of hardcoded credentials, tokens, and URLs in the dataBundle. Additionally, the dynamic creation of import statements and execution of actions and triggers using potentially unvalidated input can lead to security vulnerabilities such as code injection. There is no immediate evidence of obfuscation, but the security risks warrant further review.
Live on npm for 2 minutes before removal. Socket users were protected even while the package was live.
azure-graphrbac
9.20.1000
Removed from npm
Blocked by Socket
Possible typosquat of [azure](https://socket.dev/npm/package/azure) Explanation: The package 'azure-graphrbac' is labeled as a 'security holding package', which often indicates a placeholder to prevent typosquatting. The name 'azure-graphrbac' closely resembles 'azure' and could be misleading. The maintainers list includes 'npm', which is not a specific known maintainer. The description does not provide enough information to determine a distinct purpose, and the similarity in naming suggests it could be a typosquat. azure-graphrbac is a security-holding package
Live on npm for 15 minutes before removal. Socket users were protected even while the package was live.
@wxyhjkd/claude-proxy
1.0.0
by wxyhjkd
Live on npm
Blocked by Socket
The code contains a potentially malicious or high-risk behavior by redirecting API calls from a legitimate domain to a suspicious proxy domain. This can lead to serious security risks including data interception and supply chain compromise. No direct malware code is present, but the proxy domain redirection is a critical concern. Users should be cautious and investigate the proxy domain before use.
Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.
Known malware
Possible typosquat attack
Chrome Extension Permission
Chrome Extension Wildcard Host Permission
NPM Shrinkwrap
Git dependency
HTTP dependency
Suspicious Stars on GitHub
Protestware or potentially unwanted behavior
Unstable ownership
Critical CVE
High CVE
Medium CVE
Low CVE
Bad dependency semver
Wildcard dependency
Unpopular package
Minified code
Socket optimized override available
Deprecated
Unmaintained
Explicitly Unlicensed Item
License Policy Violation
Misc. License Issues
Non-permissive License
Ambiguous License Classifier
Copyleft License
Unidentified License
No License Found
License exception
Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.
Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.
Nat Friedman
CEO at GitHub
Suz Hinton
Senior Software Engineer at Stripe
heck yes this is awesome!!! Congrats team 🎉👏
Matteo Collina
Node.js maintainer, Fastify lead maintainer
So awesome to see @SocketSecurity launch with a fresh approach! Excited to have supported the team from the early days.
DC Posch
Director of Technology at AppFolio, CTO at Dynasty
This is going to be super important, especially for crypto projects where a compromised dependency results in stolen user assets.
Luis Naranjo
Software Engineer at Microsoft
If software supply chain attacks through npm don't scare the shit out of you, you're not paying close enough attention.
@SocketSecurity sounds like an awesome product. I'll be using socket.dev instead of npmjs.org to browse npm packages going forward
Elena Nadolinski
Founder and CEO at Iron Fish
Huge congrats to @SocketSecurity! 🙌
Literally the only product that proactively detects signs of JS compromised packages.
Joe Previte
Engineering Team Lead at Coder
Congrats to @feross and the @SocketSecurity team on their seed funding! 🚀 It's been a big help for us at @CoderHQ and we appreciate what y'all are doing!
Josh Goldberg
Staff Developer at Codecademy
This is such a great idea & looks fantastic, congrats & good luck @feross + team!
The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.
Scott Roberts
CISO at UiPath
As a happy Socket customer, I've been impressed with how quickly they are adding value to the product, this move is a great step!
Yan Zhu
Head of Security at Brave, DEFCON, EFF, W3C
glad to hear some of the smartest people i know are working on (npm, etc.) supply chain security finally :). @SocketSecurity
Andrew Peterson
CEO and Co-Founder at Signal Sciences (acq. Fastly)
How do you track the validity of open source software libraries as they get updated? You're prob not. Check out @SocketSecurity and the updated tooling they launched.
Supply chain is a cluster in security as we all know and the tools from Socket are "duh" type tools to be implementing. Check them out and follow Feross Aboukhadijeh to see more updates coming from them in the future.
Zbyszek Tenerowicz
Senior Security Engineer at ConsenSys
socket.dev is getting more appealing by the hour
Devdatta Akhawe
Head of Security at Figma
The @SocketSecurity team is on fire! Amazing progress and I am exciting to see where they go next.
Sebastian Bensusan
Engineer Manager at Stripe
I find it surprising that we don't have _more_ supply chain attacks in software:
Imagine your airplane (the code running) was assembled (deployed) daily, with parts (dependencies) from internet strangers. How long until you get a bad part?
Excited for Socket to prevent this
Adam Baldwin
VP of Security at npm, Red Team at Auth0/Okta
Congrats to everyone at @SocketSecurity ❤️🤘🏻
Nico Waisman
CISO at Lyft
This is an area that I have personally been very focused on. As Nat Friedman said in the 2019 GitHub Universe keynote, Open Source won, and every time you add a new open source project you rely on someone else code and you rely on the people that build it.
This is both exciting and problematic. You are bringing real risk into your organization, and I'm excited to see progress in the industry from OpenSSF scorecards and package analyzers to the company that Feross Aboukhadijeh is building!
Depend on Socket to prevent malicious open source dependencies from infiltrating your app.
Install the Socket GitHub App in just 2 clicks and get protected today.
Block 70+ issues in open source code, including malware, typo-squatting, hidden code, misleading packages, permission creep, and more.
Reduce work by surfacing actionable security information directly in GitHub. Empower developers to make better decisions.
Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.
Dec 14, 2023
Hijacked cryptocurrency library adds malware
Widely-used library in cryptocurrency frontend was compromised to include wallet-draining code, following the hijacking of NPM account credentials via phishing.
Jan 06, 2022
Maintainer intentionally adds malware
Rogue maintainer sabotages his own open source package with 100M downloads/month, notably breaking Amazon's AWS SDK.
Nov 15, 2021
npm discovers a platform vulnerability allowing unauthorized publishing of any package
Attackers could publish new versions of any npm package without authorization for multiple years.
Oct 22, 2021
Hijacked package adds cryptominers and password-stealing malware
Multiple packages with 30M downloads/month are hijacked and publish malicious versions directly into the software supply chain.
Nov 26, 2018
Package hijacked adding organization specific backdoors
Obfuscated malware added to a dependency which targeted a single company, went undetected for over a week, and made it into their production build.
Get our latest security research, open source insights, and product updates.
Security News
A new site reviews software projects to reveal if they’re truly FOSS, making complex licensing and distribution models easy to understand.
Security News
Astral unveils pyx, a Python-native package registry in beta, designed to speed installs, enhance security, and integrate deeply with uv.
Security News
The Latio podcast explores how static and runtime reachability help teams prioritize exploitable vulnerabilities and streamline AppSec workflows.