
Product
Announcing Bun and vlt Support in Socket
Bringing supply chain security to the next generation of JavaScript package managers
Quickly evaluate the security and health of any open source package.
jestty
1.3.15
by devinlewron
Live on npm
Blocked by Socket
This module is malicious: it enumerates partitions and directories, targets many sensitive filename patterns (private keys, wallets, config, env files), reads and streams file contents in chunks, collects environment and system information, and transmits these to a remote endpoint over a socket (optionally encrypted). It is a data-exfiltration backdoor and should be treated as high-risk malware.
sethcohen/github-releases-to-discord
1b3dde6c63d699e660bf6e1b5605217b84d700fe
Live on GitHub Actions
Blocked by Socket
The worker bootstrap script itself does not contain malicious code. However, the dynamic `require(file)` mechanism, where the `file` path is supplied by the parent process, presents a critical Arbitrary Code Execution (ACE) vulnerability. If an attacker can control the messages sent to the worker, they can force it to load and execute any JavaScript file, leading to potential compromise. The provided reports were uninformative (`[object Promise]`) and did not offer specific findings to analyze.
equilibrium-xenith-zwz080
1.0.0
by afifaljafari112
Removed from npm
Blocked by Socket
The code imports multiple modules and calls a method `functame` on each. The unusual naming conventions and the number of different modules imported raise red flags. However, without further context or the actual code of the imported modules, it's challenging to ascertain the exact intent. There is a potential risk for malicious behavior, but further inspection of the imported modules would be necessary for a definitive conclusion.
Live on npm for 56 days, 22 hours and 30 minutes before removal. Socket users were protected even while the package was live.
platform-x-prelems
5.11.21
by amalasuchith.franc
Live on npm
Blocked by Socket
Overall, the code fragment demonstrates a high-risk pattern: obfuscated, eval-driven loading of covert telemetry (console-ninja), combined with client-side data harvesting from localStorage and outbound network exposure to an external endpoint. The data-to-sinks path (local identifiers to a structured event payload sent over HTTP, plus WebSocket/backdoor channels) constitutes a credible data-exfiltration risk and potential backdoor within a supply-chain context. Recommend: remove or neutralize the console-ninja integration, replace with transparent, consented analytics, audit remote endpoints and dynamic imports, and harden the bundle to prevent unauthorized runtime code execution. Enforce strict CSPs, avoid eval, and implement explicit opt-in data collection with minimal data footprint and clear user visibility.
ncsisc
0.1.5
Live on Cargo
Blocked by Socket
This module purposely implements a kleptographic backdoor: mal_sign/mal_sign_hash produce signatures that enable recovery of a user's private key via extract_users_private_key/_hash. In addition, the code writes raw private keys to predictable files and includes a function that sends private key bytes over a Unix socket, providing trivial exfiltration channels. There is no memory-unsafe code, but the algorithmic behavior is intentionally malicious or extremely dangerous for real-world use. Treat this package as compromised or research-only; do not use in production where private keys or signing integrity matter.
zip-bundle
7.3.1
by npm-test-aacd
Live on npm
Blocked by Socket
This file collects internal and external IP addresses, DNS servers, hostnames, and user information, then transmits this data via a hardcoded webhook at discord[.]com. It also fetches additional details from ipinfo[.]io to gather external IP and related location data. Conditional checks are in place to avoid exfiltration in specific environments, suggesting an attempt to evade detection. This behavior constitutes data exfiltration without user consent and is considered malicious.
github.com/RichardoC/kube-audit-rest
v0.0.0-20250904051156-b57e28005dd6
Live on Go
Blocked by Socket
The script contains multiple high-risk indicators: hardcoded credentials stored in Kubernetes Secrets, creation of an attacker-themed namespace, and a placeholder crypto-miner pod, which together suggest potential misuse, resource abuse, or covert mining activity in a supply-chain context. While some actions appear to be test scaffolding, the combination constitutes a clear security risk that warrants remediation, isolation from production, and removal of hardcoded secrets.
node-commerce-web
2.0.3
by tskwork
Removed from npm
Blocked by Socket
The code is clearly malicious as it establishes a reverse shell, allowing remote command execution. This poses a significant security risk.
Live on npm for 17 hours and 46 minutes before removal. Socket users were protected even while the package was live.
roblox-es6-migration-helper
5.926.0
by hr0blx
Removed from npm
Blocked by Socket
The source code contains suspicious behavior by sending environment variables to an external server if certain conditions are met. The domain used for the request is obfuscated, indicating potential malicious intent. The utility functions and template caching methods appear benign, but the data exfiltration in the `main` function is a significant security risk.
Live on npm for 13 minutes before removal. Socket users were protected even while the package was live.
fiinquant
0.8.12
Live on PyPI
Blocked by Socket
This code uses multiple layers of obfuscation (base64 encoding, zlib compression, and string reversal) to hide its true functionality. The use of dynamic imports and exec() to run decoded content is a strong indicator of malicious intent. Without decoding the payload, it's impossible to determine the exact functionality, but this obfuscation pattern is almost exclusively used for malicious purposes.
backdoormbti
0.1.4
Live on PyPI
Blocked by Socket
This module implements a Hidden Patch Trojan attack pipeline: it constructs and applies additive and spatial triggers to images and performs ADMM-based optimization to embed a backdoor mask into model weights, persisting a trojaned model artifact. The fragment contains incomplete/buggy references but the overall logic is clearly for backdoor insertion. It poses a significant supply-chain and model-integrity threat: do not run this code or accept artifacts produced by it. Audit related modules and remove or isolate this functionality before using the codebase.
crack-o-matic
0.0
Live on PyPI
Blocked by Socket
This module is a credential-harvesting tool that automates creating/joining a domain controller via Samba and extracting account password hashes using pdbedit. The presence of monkeypatching, a forced GUID, a custom NetBIOS name, and direct extraction of LM/NT hashes are strong indicators of malicious or offensive intent. Do not run this code in production or against targets without explicit authorization. Treat as high-risk: it can enable theft of domain credentials and serious compromise if valid privileges are provided.
sbcli-mig
1.0.282
Live on PyPI
Blocked by Socket
This module implements privileged node and device management and exposes HTTP endpoints that accept user input used directly in shell commands and Docker operations. Main risks: command injection (unsanitized string interpolation into shell commands and os.popen), destructive device operations (partitioning, bind/unbind), supplying arbitrary images to be pulled and run as privileged containers, and use of an unencrypted/unprotected Docker TCP socket (tcp://...:2375). I assess this as not manifestly malware but a high-risk administrative component that must be strictly access-controlled and hardened (validate/sanitize inputs, avoid passing raw user values into shell/Docker operations, use secure Docker API access, avoid exposing endpoints publicly).
tx-engine
0.5.8
Live on PyPI
Blocked by Socket
The code contains a critical security flaw: untrusted input can be executed via eval(op), enabling arbitrary code execution. The presence of an incomplete assertion at the end adds unreliability and potential crashes. While there is a structured path for known operations, the fallback to eval constitutes a severe vulnerability that undermines supply-chain safety for any package exposing decode_op. Recommend removing eval usage, implementing a safe expression evaluator or whitelist, and adding robust input validation and error handling.
mrg-polyfills
50.701.386
Removed from npm
Blocked by Socket
The script is trying to execute a non-existent JavaScript file. This behavior is suspicious and could indicate an attempt to execute malicious code or perform unauthorized actions.
Live on npm for 1 hour and 9 minutes before removal. Socket users were protected even while the package was live.
cavern-prairie-yfm041
1.0.0
by afifaljafari112
Removed from npm
Blocked by Socket
The provided code imports several non-standard modules with inconsistent and suspicious naming conventions and calls a method `functame` on each of them. There is no direct evidence of malicious behavior in the given code fragment, but the naming conventions and structure are highly unusual, indicating a need for further inspection of the imported modules.
Live on npm for 57 days, 7 hours and 29 minutes before removal. Socket users were protected even while the package was live.
simplecointest
5.0.0
by sven12765
Removed from npm
Blocked by Socket
The script exhibits several suspicious behaviors such as the downloading of a file from a hard-coded IP, running a potentially malicious PowerShell script, and executing a DLL method using 'rundll32'. Therefore, it's highly recommended to not use this script until it's confirmed to be safe.
Live on npm for 7 minutes before removal. Socket users were protected even while the package was live.
firesoft.web.ui
8.0.8
by FIRESOFT ITALIA SRL
Live on NuGet
Blocked by Socket
This assembly mixes normal UI functionality with a heavily obfuscated runtime loader (HVvmQKaSppcqcvbIG2g) that reads and decrypts embedded resources, allocates executable/native memory, patches runtime/module/JIT structures, creates delegates/DynamicMethods and executes code. Those are definitive behaviors for an in-process loader/backdoor (supply-chain implant). Treat this package as malicious and dangerous: remove from production, inspect build/release pipelines and upstream sources for compromise, and analyze embedded resources in a controlled environment to determine payload actions.
pino-deploy
0.0.2
by meow-test
Removed from npm
Blocked by Socket
The script is designed to send sensitive information to a remote server, which poses a significant security risk and indicates malicious behavior.
Live on npm for 7 hours and 2 minutes before removal. Socket users were protected even while the package was live.
djblue.portal
0.54.1
Live on OpenVSX
Blocked by Socket
This OpenVSX portal fragment exhibits several risk vectors: external network connectivity to a portal host, access to Chrome/browser data, and capabilities to spawn external processes. While some WebSocket/portal components may be legitimate for a remote UI, the observed data-access patterns and runtime execution potential create a plausible supply-chain/security risk and potential backdoor vector in a public extension. Recommend a rigorous, policy-guided review (permissions, restricted domains, sandboxing, explicit user consent) and restrict or remove dangerous flows (filesystem access to sensitive data, process spawning) prior to publishing.
bapy
0.2.187
Live on PyPI
Blocked by Socket
Malicious bash initialization script that performs destructive filesystem operations on macOS systems. When the external helper script 'isuserdarwin.sh' returns true, the script silently executes 'sudo rm -rf' to delete critical user directories including ~/Applications, ~/Movies, ~/Music, ~/Pictures, ~/Public, and ~/Sites without user confirmation. It also removes the macOS sleepimage file at /private/var/vm/sleepimage. The script modifies SSH directory permissions using 'sudo chmod -R go-rw' which can break SSH access or expose credentials. All destructive operations have their output suppressed with '>/dev/null 2>&1' to hide failures and make the actions stealthy. The script uses eval to execute the output of /usr/bin/dircolors, creating a command injection risk if the binary is compromised. It depends on external scripts (paper.sh, isuserdarwin.sh, debug.sh) whose contents are unknown and could execute arbitrary code. The destructive operations are embedded within what appears to be routine shell configuration code, likely to disguise the malicious intent.
triple
1.0.4
Live on PyPI
Blocked by Socket
This code is a Remote Access/Control tool with functionality to capture webcam and screen, log keystrokes, explore and exfiltrate files, remotely control mouse/keyboard, format drives, and craft malicious-looking payload files (PDFs/JPEGs with embedded payloads or JS). It includes highly dangerous constructs: untrusted pickle.loads on network data (remote code execution), embedding JavaScript into PDFs and attaching payloads, commands that delete files and format drives, and hard-coded authentication tokens. This is malicious functionality in most contexts and poses a severe supply-chain and runtime security risk. Avoid using or installing this code; treat it as a high-risk malicious component.
patientenapp
1.17.1563
Removed from npm
Blocked by Socket
The code is designed to collect sensitive system information and transmit it to an external server using obfuscated methods. This behavior is indicative of malicious activity, specifically data exfiltration.
Live on npm for 4 minutes before removal. Socket users were protected even while the package was live.
meutils
2025.7.19.10.32.43
Live on PyPI
Blocked by Socket
The source code contains suspicious and potentially malicious behavior by uploading arbitrary local files and detailed metadata to a remote server using hardcoded authentication tokens and device identifiers. This constitutes a significant security risk involving unauthorized data exfiltration and privacy violation. Although no direct malware payload like reverse shells or destructive actions are present, the code should be considered high risk and likely malicious due to its data exfiltration capabilities and lack of user transparency.
mattermost-cloudnative-bootstrapper
1.0.0
by dextester12345
Removed from npm
Blocked by Socket
This package contains a preinstall script that collects system information including hostname, current user, network configuration, present working directory, and user ID, and sends it to a remote server at hufvv38vfpqastngywc98a27cyiu6oud[.]oastify[.]com without user consent.
Live on npm for 80 days, 17 hours and 27 minutes before removal. Socket users were protected even while the package was live.
jestty
1.3.15
by devinlewron
Live on npm
Blocked by Socket
This module is malicious: it enumerates partitions and directories, targets many sensitive filename patterns (private keys, wallets, config, env files), reads and streams file contents in chunks, collects environment and system information, and transmits these to a remote endpoint over a socket (optionally encrypted). It is a data-exfiltration backdoor and should be treated as high-risk malware.
sethcohen/github-releases-to-discord
1b3dde6c63d699e660bf6e1b5605217b84d700fe
Live on GitHub Actions
Blocked by Socket
The worker bootstrap script itself does not contain malicious code. However, the dynamic `require(file)` mechanism, where the `file` path is supplied by the parent process, presents a critical Arbitrary Code Execution (ACE) vulnerability. If an attacker can control the messages sent to the worker, they can force it to load and execute any JavaScript file, leading to potential compromise. The provided reports were uninformative (`[object Promise]`) and did not offer specific findings to analyze.
equilibrium-xenith-zwz080
1.0.0
by afifaljafari112
Removed from npm
Blocked by Socket
The code imports multiple modules and calls a method `functame` on each. The unusual naming conventions and the number of different modules imported raise red flags. However, without further context or the actual code of the imported modules, it's challenging to ascertain the exact intent. There is a potential risk for malicious behavior, but further inspection of the imported modules would be necessary for a definitive conclusion.
Live on npm for 56 days, 22 hours and 30 minutes before removal. Socket users were protected even while the package was live.
platform-x-prelems
5.11.21
by amalasuchith.franc
Live on npm
Blocked by Socket
Overall, the code fragment demonstrates a high-risk pattern: obfuscated, eval-driven loading of covert telemetry (console-ninja), combined with client-side data harvesting from localStorage and outbound network exposure to an external endpoint. The data-to-sinks path (local identifiers to a structured event payload sent over HTTP, plus WebSocket/backdoor channels) constitutes a credible data-exfiltration risk and potential backdoor within a supply-chain context. Recommend: remove or neutralize the console-ninja integration, replace with transparent, consented analytics, audit remote endpoints and dynamic imports, and harden the bundle to prevent unauthorized runtime code execution. Enforce strict CSPs, avoid eval, and implement explicit opt-in data collection with minimal data footprint and clear user visibility.
ncsisc
0.1.5
Live on Cargo
Blocked by Socket
This module purposely implements a kleptographic backdoor: mal_sign/mal_sign_hash produce signatures that enable recovery of a user's private key via extract_users_private_key/_hash. In addition, the code writes raw private keys to predictable files and includes a function that sends private key bytes over a Unix socket, providing trivial exfiltration channels. There is no memory-unsafe code, but the algorithmic behavior is intentionally malicious or extremely dangerous for real-world use. Treat this package as compromised or research-only; do not use in production where private keys or signing integrity matter.
zip-bundle
7.3.1
by npm-test-aacd
Live on npm
Blocked by Socket
This file collects internal and external IP addresses, DNS servers, hostnames, and user information, then transmits this data via a hardcoded webhook at discord[.]com. It also fetches additional details from ipinfo[.]io to gather external IP and related location data. Conditional checks are in place to avoid exfiltration in specific environments, suggesting an attempt to evade detection. This behavior constitutes data exfiltration without user consent and is considered malicious.
github.com/RichardoC/kube-audit-rest
v0.0.0-20250904051156-b57e28005dd6
Live on Go
Blocked by Socket
The script contains multiple high-risk indicators: hardcoded credentials stored in Kubernetes Secrets, creation of an attacker-themed namespace, and a placeholder crypto-miner pod, which together suggest potential misuse, resource abuse, or covert mining activity in a supply-chain context. While some actions appear to be test scaffolding, the combination constitutes a clear security risk that warrants remediation, isolation from production, and removal of hardcoded secrets.
node-commerce-web
2.0.3
by tskwork
Removed from npm
Blocked by Socket
The code is clearly malicious as it establishes a reverse shell, allowing remote command execution. This poses a significant security risk.
Live on npm for 17 hours and 46 minutes before removal. Socket users were protected even while the package was live.
roblox-es6-migration-helper
5.926.0
by hr0blx
Removed from npm
Blocked by Socket
The source code contains suspicious behavior by sending environment variables to an external server if certain conditions are met. The domain used for the request is obfuscated, indicating potential malicious intent. The utility functions and template caching methods appear benign, but the data exfiltration in the `main` function is a significant security risk.
Live on npm for 13 minutes before removal. Socket users were protected even while the package was live.
fiinquant
0.8.12
Live on PyPI
Blocked by Socket
This code uses multiple layers of obfuscation (base64 encoding, zlib compression, and string reversal) to hide its true functionality. The use of dynamic imports and exec() to run decoded content is a strong indicator of malicious intent. Without decoding the payload, it's impossible to determine the exact functionality, but this obfuscation pattern is almost exclusively used for malicious purposes.
backdoormbti
0.1.4
Live on PyPI
Blocked by Socket
This module implements a Hidden Patch Trojan attack pipeline: it constructs and applies additive and spatial triggers to images and performs ADMM-based optimization to embed a backdoor mask into model weights, persisting a trojaned model artifact. The fragment contains incomplete/buggy references but the overall logic is clearly for backdoor insertion. It poses a significant supply-chain and model-integrity threat: do not run this code or accept artifacts produced by it. Audit related modules and remove or isolate this functionality before using the codebase.
crack-o-matic
0.0
Live on PyPI
Blocked by Socket
This module is a credential-harvesting tool that automates creating/joining a domain controller via Samba and extracting account password hashes using pdbedit. The presence of monkeypatching, a forced GUID, a custom NetBIOS name, and direct extraction of LM/NT hashes are strong indicators of malicious or offensive intent. Do not run this code in production or against targets without explicit authorization. Treat as high-risk: it can enable theft of domain credentials and serious compromise if valid privileges are provided.
sbcli-mig
1.0.282
Live on PyPI
Blocked by Socket
This module implements privileged node and device management and exposes HTTP endpoints that accept user input used directly in shell commands and Docker operations. Main risks: command injection (unsanitized string interpolation into shell commands and os.popen), destructive device operations (partitioning, bind/unbind), supplying arbitrary images to be pulled and run as privileged containers, and use of an unencrypted/unprotected Docker TCP socket (tcp://...:2375). I assess this as not manifestly malware but a high-risk administrative component that must be strictly access-controlled and hardened (validate/sanitize inputs, avoid passing raw user values into shell/Docker operations, use secure Docker API access, avoid exposing endpoints publicly).
tx-engine
0.5.8
Live on PyPI
Blocked by Socket
The code contains a critical security flaw: untrusted input can be executed via eval(op), enabling arbitrary code execution. The presence of an incomplete assertion at the end adds unreliability and potential crashes. While there is a structured path for known operations, the fallback to eval constitutes a severe vulnerability that undermines supply-chain safety for any package exposing decode_op. Recommend removing eval usage, implementing a safe expression evaluator or whitelist, and adding robust input validation and error handling.
mrg-polyfills
50.701.386
Removed from npm
Blocked by Socket
The script is trying to execute a non-existent JavaScript file. This behavior is suspicious and could indicate an attempt to execute malicious code or perform unauthorized actions.
Live on npm for 1 hour and 9 minutes before removal. Socket users were protected even while the package was live.
cavern-prairie-yfm041
1.0.0
by afifaljafari112
Removed from npm
Blocked by Socket
The provided code imports several non-standard modules with inconsistent and suspicious naming conventions and calls a method `functame` on each of them. There is no direct evidence of malicious behavior in the given code fragment, but the naming conventions and structure are highly unusual, indicating a need for further inspection of the imported modules.
Live on npm for 57 days, 7 hours and 29 minutes before removal. Socket users were protected even while the package was live.
simplecointest
5.0.0
by sven12765
Removed from npm
Blocked by Socket
The script exhibits several suspicious behaviors such as the downloading of a file from a hard-coded IP, running a potentially malicious PowerShell script, and executing a DLL method using 'rundll32'. Therefore, it's highly recommended to not use this script until it's confirmed to be safe.
Live on npm for 7 minutes before removal. Socket users were protected even while the package was live.
firesoft.web.ui
8.0.8
by FIRESOFT ITALIA SRL
Live on NuGet
Blocked by Socket
This assembly mixes normal UI functionality with a heavily obfuscated runtime loader (HVvmQKaSppcqcvbIG2g) that reads and decrypts embedded resources, allocates executable/native memory, patches runtime/module/JIT structures, creates delegates/DynamicMethods and executes code. Those are definitive behaviors for an in-process loader/backdoor (supply-chain implant). Treat this package as malicious and dangerous: remove from production, inspect build/release pipelines and upstream sources for compromise, and analyze embedded resources in a controlled environment to determine payload actions.
pino-deploy
0.0.2
by meow-test
Removed from npm
Blocked by Socket
The script is designed to send sensitive information to a remote server, which poses a significant security risk and indicates malicious behavior.
Live on npm for 7 hours and 2 minutes before removal. Socket users were protected even while the package was live.
djblue.portal
0.54.1
Live on OpenVSX
Blocked by Socket
This OpenVSX portal fragment exhibits several risk vectors: external network connectivity to a portal host, access to Chrome/browser data, and capabilities to spawn external processes. While some WebSocket/portal components may be legitimate for a remote UI, the observed data-access patterns and runtime execution potential create a plausible supply-chain/security risk and potential backdoor vector in a public extension. Recommend a rigorous, policy-guided review (permissions, restricted domains, sandboxing, explicit user consent) and restrict or remove dangerous flows (filesystem access to sensitive data, process spawning) prior to publishing.
bapy
0.2.187
Live on PyPI
Blocked by Socket
Malicious bash initialization script that performs destructive filesystem operations on macOS systems. When the external helper script 'isuserdarwin.sh' returns true, the script silently executes 'sudo rm -rf' to delete critical user directories including ~/Applications, ~/Movies, ~/Music, ~/Pictures, ~/Public, and ~/Sites without user confirmation. It also removes the macOS sleepimage file at /private/var/vm/sleepimage. The script modifies SSH directory permissions using 'sudo chmod -R go-rw' which can break SSH access or expose credentials. All destructive operations have their output suppressed with '>/dev/null 2>&1' to hide failures and make the actions stealthy. The script uses eval to execute the output of /usr/bin/dircolors, creating a command injection risk if the binary is compromised. It depends on external scripts (paper.sh, isuserdarwin.sh, debug.sh) whose contents are unknown and could execute arbitrary code. The destructive operations are embedded within what appears to be routine shell configuration code, likely to disguise the malicious intent.
triple
1.0.4
Live on PyPI
Blocked by Socket
This code is a Remote Access/Control tool with functionality to capture webcam and screen, log keystrokes, explore and exfiltrate files, remotely control mouse/keyboard, format drives, and craft malicious-looking payload files (PDFs/JPEGs with embedded payloads or JS). It includes highly dangerous constructs: untrusted pickle.loads on network data (remote code execution), embedding JavaScript into PDFs and attaching payloads, commands that delete files and format drives, and hard-coded authentication tokens. This is malicious functionality in most contexts and poses a severe supply-chain and runtime security risk. Avoid using or installing this code; treat it as a high-risk malicious component.
patientenapp
1.17.1563
Removed from npm
Blocked by Socket
The code is designed to collect sensitive system information and transmit it to an external server using obfuscated methods. This behavior is indicative of malicious activity, specifically data exfiltration.
Live on npm for 4 minutes before removal. Socket users were protected even while the package was live.
meutils
2025.7.19.10.32.43
Live on PyPI
Blocked by Socket
The source code contains suspicious and potentially malicious behavior by uploading arbitrary local files and detailed metadata to a remote server using hardcoded authentication tokens and device identifiers. This constitutes a significant security risk involving unauthorized data exfiltration and privacy violation. Although no direct malware payload like reverse shells or destructive actions are present, the code should be considered high risk and likely malicious due to its data exfiltration capabilities and lack of user transparency.
mattermost-cloudnative-bootstrapper
1.0.0
by dextester12345
Removed from npm
Blocked by Socket
This package contains a preinstall script that collects system information including hostname, current user, network configuration, present working directory, and user ID, and sends it to a remote server at hufvv38vfpqastngywc98a27cyiu6oud[.]oastify[.]com without user consent.
Live on npm for 80 days, 17 hours and 27 minutes before removal. Socket users were protected even while the package was live.
Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.
Possible typosquat attack
GitHub Actions: GitHub context variable flows to dangerous sink
Known malware
GitHub Actions: Input argument flows to dangerous sink
GitHub Actions: Environment variable flows to dangerous sink
Git dependency
GitHub dependency
AI-detected potential malware
HTTP dependency
Obfuscated code
Critical CVE
High CVE
Medium CVE
Low CVE
Unpopular package
Minified code
Bad dependency semver
Wildcard dependency
Socket optimized override available
Deprecated
Unmaintained
Explicitly Unlicensed Item
License Policy Violation
Misc. License Issues
Ambiguous License Classifier
Copyleft License
License exception
No License Found
Non-permissive License
Unidentified License
Generic alert
Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.
Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Nat Friedman
CEO at GitHub

Suz Hinton
Senior Software Engineer at Stripe
heck yes this is awesome!!! Congrats team 🎉👏

Matteo Collina
Node.js maintainer, Fastify lead maintainer
So awesome to see @SocketSecurity launch with a fresh approach! Excited to have supported the team from the early days.

DC Posch
Director of Technology at AppFolio, CTO at Dynasty
This is going to be super important, especially for crypto projects where a compromised dependency results in stolen user assets.

Luis Naranjo
Software Engineer at Microsoft
If software supply chain attacks through npm don't scare the shit out of you, you're not paying close enough attention.
@SocketSecurity sounds like an awesome product. I'll be using socket.dev instead of npmjs.org to browse npm packages going forward

Elena Nadolinski
Founder and CEO at Iron Fish
Huge congrats to @SocketSecurity! 🙌
Literally the only product that proactively detects signs of JS compromised packages.

Joe Previte
Engineering Team Lead at Coder
Congrats to @feross and the @SocketSecurity team on their seed funding! 🚀 It's been a big help for us at @CoderHQ and we appreciate what y'all are doing!

Josh Goldberg
Staff Developer at Codecademy
This is such a great idea & looks fantastic, congrats & good luck @feross + team!
The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Scott Roberts
CISO at UiPath
As a happy Socket customer, I've been impressed with how quickly they are adding value to the product, this move is a great step!

Yan Zhu
Head of Security at Brave, DEFCON, EFF, W3C
glad to hear some of the smartest people i know are working on (npm, etc.) supply chain security finally :). @SocketSecurity

Andrew Peterson
CEO and Co-Founder at Signal Sciences (acq. Fastly)
How do you track the validity of open source software libraries as they get updated? You're prob not. Check out @SocketSecurity and the updated tooling they launched.
Supply chain is a cluster in security as we all know and the tools from Socket are "duh" type tools to be implementing. Check them out and follow Feross Aboukhadijeh to see more updates coming from them in the future.

Zbyszek Tenerowicz
Senior Security Engineer at ConsenSys
socket.dev is getting more appealing by the hour

Devdatta Akhawe
Head of Security at Figma
The @SocketSecurity team is on fire! Amazing progress and I am exciting to see where they go next.

Sebastian Bensusan
Engineer Manager at Stripe
I find it surprising that we don't have _more_ supply chain attacks in software:
Imagine your airplane (the code running) was assembled (deployed) daily, with parts (dependencies) from internet strangers. How long until you get a bad part?
Excited for Socket to prevent this

Adam Baldwin
VP of Security at npm, Red Team at Auth0/Okta
Congrats to everyone at @SocketSecurity ❤️🤘🏻

Nico Waisman
CISO at Lyft
This is an area that I have personally been very focused on. As Nat Friedman said in the 2019 GitHub Universe keynote, Open Source won, and every time you add a new open source project you rely on someone else code and you rely on the people that build it.
This is both exciting and problematic. You are bringing real risk into your organization, and I'm excited to see progress in the industry from OpenSSF scorecards and package analyzers to the company that Feross Aboukhadijeh is building!
Depend on Socket to prevent malicious open source dependencies from infiltrating your app.
Install the Socket GitHub App in just 2 clicks and get protected today.
Block 70+ issues in open source code, including malware, typo-squatting, hidden code, misleading packages, permission creep, and more.
Reduce work by surfacing actionable security information directly in GitHub. Empower developers to make better decisions.
Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.
Dec 14, 2023
Hijacked cryptocurrency library adds malware
Widely-used library in cryptocurrency frontend was compromised to include wallet-draining code, following the hijacking of NPM account credentials via phishing.
Jan 06, 2022
Maintainer intentionally adds malware
Rogue maintainer sabotages his own open source package with 100M downloads/month, notably breaking Amazon's AWS SDK.
Nov 15, 2021
npm discovers a platform vulnerability allowing unauthorized publishing of any package
Attackers could publish new versions of any npm package without authorization for multiple years.
Oct 22, 2021
Hijacked package adds cryptominers and password-stealing malware
Multiple packages with 30M downloads/month are hijacked and publish malicious versions directly into the software supply chain.
Nov 26, 2018
Package hijacked adding organization specific backdoors
Obfuscated malware added to a dependency which targeted a single company, went undetected for over a week, and made it into their production build.
Get our latest security research, open source insights, and product updates.

Product
Bringing supply chain security to the next generation of JavaScript package managers

Product
A safer, faster way to eliminate vulnerabilities without updating dependencies

Product
Reachability analysis for Ruby is now in beta, helping teams identify which vulnerabilities are truly exploitable in their applications.