
Security News
TC39 Advances Temporal to Stage 4 Alongside Several ECMAScript Proposals
TC39’s March 2026 meeting advanced eight ECMAScript proposals, including Temporal reaching Stage 4 and securing its place in the ECMAScript 2026 specification.
Quickly evaluate the security and health of any open source package.
group-based-policy
5.9.0
Live on pypi
Blocked by Socket
The script exhibits high-risk, persistence-enabled behavior by injecting external components into Python site-packages, installing a boot-time service, and providing a world-writable executable. The lack of integrity checks, reliance on /root as a source, and permissive permissions create strong supply-chain and host-compromise risk. Treat as dangerous and require thorough validation, non-production sandbox testing, or removal from automated pipelines.
hackingtools
3.0.0.954
Live on pypi
Blocked by Socket
The code demonstrates high-risk behavior typical of dropper/packer-like workflows: encrypted payloads embedded in stubs, base64-wrapped code executed at runtime, and optional packaging into executables. While there are syntax anomalies and incomplete branches that prevent immediate execution, the overall pattern is aligned with covert payload delivery or supply-chain risk. Thorough review of the complete, verified source is required before use; treat as dangerous and isolate until confirmed safe.
yspliveplayer-new
0.3.6
Live on npm
Blocked by Socket
This module contains heavy obfuscation and dynamic decoding that reads browser state (document/window/opener) and uses CryptoJS to derive/produce a cryptographic value returned by getckey. The obfuscation, dynamic property access, and use of page/browser data are strong indicators of malicious or at least intentionally concealed behavior (likely token/key derivation or decryption for further malicious use). I recommend treating this package as suspicious and not using it until its clear, unobfuscated purpose and callers are inspected. If found in a dependency, remove or isolate it and perform a broader supply-chain investigation.
bcmd
0.0.51
Removed from pypi
Blocked by Socket
Legitimate Python development tool with critical command injection vulnerability. The os.system() usage with unescaped user input poses significant security risk, allowing potential arbitrary command execution.
Live on pypi for 21 minutes before removal. Socket users were protected even while the package was live.
cube-sign-cli
1.9.0
by jpdhackerone03
Removed from npm
Blocked by Socket
The source code exhibits behavior consistent with data exfiltration malware. It collects sensitive system information and sends it to external endpoints without user consent, posing a significant security risk.
Live on npm for 30 days, 12 hours and 58 minutes before removal. Socket users were protected even while the package was live.
elf-stats-sparkly-snowflake-139
1.0.0
by skimming1239499
Live on npm
Blocked by Socket
This module implements deliberate data exfiltration: it enumerates and reads files from a hardcoded local directory and transmits their contents and filenames to a hardcoded remote webhook by invoking curl via child_process.execSync. The exported API returns a benign-looking object, likely to mask the malicious side-effect. This is malicious behavior in a supply-chain context. Remove the package, treat any systems that ran it as compromised, and investigate what data may have been exposed. Replace with audited, safe code and rotate any secrets that could have been stored under the targeted directory.
scraper2-hj3415
0.0.3
Removed from pypi
Blocked by Socket
The module is a serializer/deserializer (AOT jelling/unjelling) with functionality that can execute arbitrary code when given crafted input. The code itself is not obviously malicious, but it provides standard deserialization features that will execute code during object reconstruction (compile/eval, reflect.namedObject, __setstate__, copyreg loaders). Treat any AOT/source input as fully untrusted; do not call unjellyFromSource or unjellyFromAOT on attacker-controlled data. Use only on trusted inputs or with additional sandboxing.
Live on pypi for 1 hour and 31 minutes before removal. Socket users were protected even while the package was live.
mtxai
0.0.161
Live on pypi
Blocked by Socket
This fragment intends to install and start KasmVNC by running many shell commands that create certs, write VNC password files, adjust group membership, and launch a VNC server. The primary security issues are unsafe shell interpolation (command injection risk), programmatic persistence of a possibly predictable password, execution with sudo based on unvalidated env vars, starting a VNC server exposed on 0.0.0.0 with disabled/basic auth, and multiple unsafe filesystem operations performed via shell. There is no clear evidence of obfuscated or direct exfiltration malware, but the behavior can provide an unauthorized remote access vector (backdoor-like) if used maliciously. Do not run this code without fixing shell usage, validating inputs, using secure randomly generated passwords, enforcing proper file permissions, and not disabling authentication.
vasprocar
1.1.19.17
Live on pypi
Blocked by Socket
This fragment appears to be part of a legitimate DOS/pDOS post-processing tool for Quantum ESPRESSO, but it uses multiple high-risk patterns: executing external Python files (exec(open(...).read())), copying and injecting variable content into a script and then executing it, and using bare excepts that suppress errors. These behaviors make the module vulnerable to supply-chain or local-file-tampering attacks: if an attacker can modify files in main_dir or dir_files (or influence the variables used to build filenames), they can achieve arbitrary code execution with the same privileges as the user running this script. I did not find explicit malicious payloads (no networking/exfiltration, no reverse shell code, no hardcoded secrets), so the code itself looks more insecure than intentionally malicious. Recommendation: avoid exec on arbitrary files; validate and/or cryptographically verify any scripts before executing; minimize use of globals and prefer importing modules safely; sanitize inputs and fail loudly rather than swallowing exceptions. Also review the rest of the project for places that set the variables used to build filenames. Note: the fragment contains multiple syntax errors and appears truncated which reduces certainty of the analysis.
elf-stats-storybook-reindeer-552
2.1.1
Live on npm
Blocked by Socket
This file implements a straightforward and functional reverse shell: it connects to a hardcoded remote IP:port, spawns /bin/sh, and pipes input/output between the shell and the network socket. This gives a remote actor arbitrary command execution and data exfiltration capabilities. The code is malicious in context and poses an immediate, high-risk threat. Remove/quarantine the file and treat systems that ran it as compromised.
dnszlsk/muad-dib
daf4a877a95e4b13624288ba2522006379eb0d9d
Live on actions
Blocked by Socket
This install script runs package code automatically at install time and the package itself declares it is C2 malware. Treat this as malicious: do not install in any environment you care about. Inspecting lib/init.js is required to determine exact capabilities, but the risk includes remote control, telemetry/exfiltration, persistence, and arbitrary code execution.
sbcli-debug
2.1.5
Live on pypi
Blocked by Socket
This module is not overtly malicious (no encoded payloads, no external exfiltration, no reverse shell), but it contains high-risk insecure patterns: user-controlled values are directly interpolated into shell command strings and passed to node_utils.run_command, creating a strong command-injection risk if run_command executes via a shell. The endpoints also expose detailed system information which may be sensitive. Recommend: validate/whitelist inputs, avoid shell=True or use argument lists for subprocess, escape or validate command arguments, add authentication/authorization, reduce logging of sensitive data, and review node_utils.run_command implementation. Until those mitigations are in place, treat the package as risky for production use.
mtmai
0.3.1105
Live on pypi
Blocked by Socket
This fragment intends to install and start KasmVNC by running many shell commands that create certs, write VNC password files, adjust group membership, and launch a VNC server. The primary security issues are unsafe shell interpolation (command injection risk), programmatic persistence of a possibly predictable password, execution with sudo based on unvalidated env vars, starting a VNC server exposed on 0.0.0.0 with disabled/basic auth, and multiple unsafe filesystem operations performed via shell. There is no clear evidence of obfuscated or direct exfiltration malware, but the behavior can provide an unauthorized remote access vector (backdoor-like) if used maliciously. Do not run this code without fixing shell usage, validating inputs, using secure randomly generated passwords, enforcing proper file permissions, and not disabling authentication.
dnszlsk/muad-dib
e988b29dd74bd4ab6dc070bccb3e0d786d9ac411
Live on actions
Blocked by Socket
This snippet is malicious or extremely unsafe: it decodes and executes a hard-coded curl command to a suspicious domain via a shell. Treat as high-risk malware: do not run, remove or isolate the package, and investigate execution contexts where it may have run. Replace with safe, explicit network code with strict validation or remove entirely.
n8n-nodes-string-convert
1.0.0
by coraljaclin
Live on npm
Blocked by Socket
This module is malicious or at minimum highly malicious-looking: it performs extensive sensitive data collection (environment variables, private keys, .env files, n8n database + decryption of credentials, cloud metadata endpoints to harvest credentials, SSH keys, docker config, npmrc, bash history, etc.), runs many shell commands for reconnaissance, and returns all data via the node output. Although it does not itself transmit data to outside internet domains, the node output can be easily forwarded by an attacker-controlled workflow, so inclusion of this module in a repository or runtime poses a severe supply-chain/data-exfiltration risk. It should not be used and systems where it is present should be considered compromised and investigated immediately.
354766/feiskyer/openclaw-kubernetes/claude-skill/
426dd532ac541acd3c3771f5da7fe9997462487a
Live on socket
Blocked by Socket
The analyzed skill is coherent with an end-to-end Claude Code automation framework, including isolation, logging, and PR lifecycle management. Security concerns center on permission-bypass capabilities, autonomous long-running execution, and access to logs/registries that may reveal prompts or intents. Governance controls, least-privilege prompts, strict access controls for logs/registries, and per-action approvals are recommended to mitigate risk. Overall, the design is powerful but requires careful sandboxing and operational governance.
@ostyado/baileys
1.1.2
by ostyado
Live on npm
Blocked by Socket
`lotusbail` is a malicious npm package that masquerades as a WhatsApp Web API library by forking legitimate Baileys-based code and preserving working messaging functionality. In addition to normal API behavior, it inserts a wrapper around the WhatsApp WebSocket client so that all traffic passing through the library is duplicated for collection. Reported data theft includes WhatsApp authentication tokens and session keys, full message content (sent/received and historical), contact lists (including phone numbers), and transferred media/files. The package also attempts to establish persistent unauthorized access by hijacking the WhatsApp device-linking (“pairing”) workflow using a hardcoded pairing code, effectively linking an attacker-controlled device to the victim’s account; removing the npm dependency does not automatically remove the linked device. To hinder detection, the exfiltration endpoint is hidden behind multiple obfuscation layers, collected data is encrypted (including a custom RSA implementation), and the code includes anti-debugging traps designed to disrupt analysis.
354766/inference-sh-0/skills/data-visualization/
a0d23e61b7818cbe1837cb38c70920eeeaf28d46
Live on socket
Blocked by Socket
[Skill Scanner] Pipe-to-shell or eval pattern detected All findings: [CRITICAL] command_injection: Pipe-to-shell or eval pattern detected (CI013) [AITech 9.1.4] [CRITICAL] command_injection: Natural language instruction to download and install from URL detected (CI009) [AITech 9.1.4] [CRITICAL] command_injection: Natural language instruction to download and install from URL detected (CI009) [AITech 9.1.4] The package/documentation is functionally benign and intended to help users create visualizations, but it contains multiple high-risk operational patterns: a pipe-to-shell installer (curl | sh), repeated examples that transmit arbitrary code/data to third-party remote executors, and broad allowed-tool permissions. These patterns create realistic opportunities for credential or data leakage and increase supply-chain risk if distribution endpoints are compromised. Recommendations: do not use curl | sh without manual verification of the installer and checksum; avoid sending secrets or production data to remote executors; prefer local execution for sensitive data; and the project should add explicit warnings and demonstrate checksum verification and least-privilege installation paths. LLM verification: The skill is functionally benign and aligns with its data-visualization purpose. No direct indicators of malware or obfuscation were found in the provided content. The primary security concern is supply-chain and operational: the pipe-to-shell install pattern, lack of explicit guidance about handling secrets and credential storage, and encouraging remote execution of arbitrary user code. Recommend removing or de-emphasizing the curl | sh quick-start, replacing it with an explicit download + chec
cornflakes
3.1.2
Live on pypi
Blocked by Socket
The code embeds a dangerous dynamic execution pattern by re-reading and executing the caller file contents in a separate Python process and then invoking the function by name. This can re-run initialization code, access sensitive data, and enable covert execution in a background context. It represents a notable supply-chain risk if the caller file is modifiable by an attacker. Recommend removing exec-based loading, using a clearly defined worker model (multiprocessing or threading with explicit callable targets), and implementing strict input validation and error handling to mitigate exposure.
github.com/bishopfox/sliver
v1.5.40-0.20231110210156-f944d24dc3f0
Live on go
Blocked by Socket
This source file is part of the Sliver post-exploitation implant agent and implements remote-controlled offensive capabilities: arbitrary command execution, code injection into other processes, dynamic/native extension loading, privilege escalation (token manipulation), registry and service manipulation, and process memory dumping. These are explicit backdoor/malware behaviors. If present in a dependency for legitimate software, it represents a critical supply-chain compromise. It should not be used in production outside of controlled red-team engagements and must be treated as malicious in a general-purpose dependency context.
strawberry-pm
1.1.6
by kepempem
Live on npm
Blocked by Socket
The code dynamically loads and executes scripts from an untrusted domain (e.g., 'distributerry[.]com') without validation, leading to potential remote code execution. It uses 'eval' to parse JSON, which can execute arbitrary code. The code also sends data to external domains, raising concerns about data exfiltration.
create-non-enumerable-property
99.10.13
by rxtop49h
Removed from npm
Blocked by Socket
The code is designed to exfiltrate sensitive system and network information to an external server. The conditions in `isValid` and use of specific encoding functions suggest a deliberate attempt to hide the true nature and selectively activate this behavior, indicative of a malware-like payload.
Live on npm for 7 hours and 4 minutes before removal. Socket users were protected even while the package was live.
carbonorm/carbonphp
14.0.6
Live on composer
Blocked by Socket
The codebase contains legitimate migration tooling but includes a high-risk backdoor-like construct (selfHidingFile) that can be invoked to disclose or serve local files under license control. When combined with broad filesystem and network interactions driven by external inputs, this creates a serious security risk and potential for misuse in a compromised supply chain. Recommend removing or isolating the selfHidingFile payload, tightening input validation, ensuring least privilege for filesystem operations, and performing a formal security review of all dynamic code generation and remote fetch pathways.
pocs
1.1
Live on pypi
Blocked by Socket
This file is a clear proof-of-concept exploit for ThinkPHP RCE. It constructs and sends HTTP requests with hardcoded payloads that attempt to execute phpinfo() on remote servers and checks for 'allow_url_fopen' to confirm success. It should not be run against systems without explicit authorization. The snippet contains a minor syntax error in the example usage and uses overly broad exception handling. While it does not include persistence or direct data exfiltration in this fragment, its network requests can trigger remote code execution, making it a high-risk offensive tool.
group-based-policy
5.9.0
Live on pypi
Blocked by Socket
The script exhibits high-risk, persistence-enabled behavior by injecting external components into Python site-packages, installing a boot-time service, and providing a world-writable executable. The lack of integrity checks, reliance on /root as a source, and permissive permissions create strong supply-chain and host-compromise risk. Treat as dangerous and require thorough validation, non-production sandbox testing, or removal from automated pipelines.
hackingtools
3.0.0.954
Live on pypi
Blocked by Socket
The code demonstrates high-risk behavior typical of dropper/packer-like workflows: encrypted payloads embedded in stubs, base64-wrapped code executed at runtime, and optional packaging into executables. While there are syntax anomalies and incomplete branches that prevent immediate execution, the overall pattern is aligned with covert payload delivery or supply-chain risk. Thorough review of the complete, verified source is required before use; treat as dangerous and isolate until confirmed safe.
yspliveplayer-new
0.3.6
Live on npm
Blocked by Socket
This module contains heavy obfuscation and dynamic decoding that reads browser state (document/window/opener) and uses CryptoJS to derive/produce a cryptographic value returned by getckey. The obfuscation, dynamic property access, and use of page/browser data are strong indicators of malicious or at least intentionally concealed behavior (likely token/key derivation or decryption for further malicious use). I recommend treating this package as suspicious and not using it until its clear, unobfuscated purpose and callers are inspected. If found in a dependency, remove or isolate it and perform a broader supply-chain investigation.
bcmd
0.0.51
Removed from pypi
Blocked by Socket
Legitimate Python development tool with critical command injection vulnerability. The os.system() usage with unescaped user input poses significant security risk, allowing potential arbitrary command execution.
Live on pypi for 21 minutes before removal. Socket users were protected even while the package was live.
cube-sign-cli
1.9.0
by jpdhackerone03
Removed from npm
Blocked by Socket
The source code exhibits behavior consistent with data exfiltration malware. It collects sensitive system information and sends it to external endpoints without user consent, posing a significant security risk.
Live on npm for 30 days, 12 hours and 58 minutes before removal. Socket users were protected even while the package was live.
elf-stats-sparkly-snowflake-139
1.0.0
by skimming1239499
Live on npm
Blocked by Socket
This module implements deliberate data exfiltration: it enumerates and reads files from a hardcoded local directory and transmits their contents and filenames to a hardcoded remote webhook by invoking curl via child_process.execSync. The exported API returns a benign-looking object, likely to mask the malicious side-effect. This is malicious behavior in a supply-chain context. Remove the package, treat any systems that ran it as compromised, and investigate what data may have been exposed. Replace with audited, safe code and rotate any secrets that could have been stored under the targeted directory.
scraper2-hj3415
0.0.3
Removed from pypi
Blocked by Socket
The module is a serializer/deserializer (AOT jelling/unjelling) with functionality that can execute arbitrary code when given crafted input. The code itself is not obviously malicious, but it provides standard deserialization features that will execute code during object reconstruction (compile/eval, reflect.namedObject, __setstate__, copyreg loaders). Treat any AOT/source input as fully untrusted; do not call unjellyFromSource or unjellyFromAOT on attacker-controlled data. Use only on trusted inputs or with additional sandboxing.
Live on pypi for 1 hour and 31 minutes before removal. Socket users were protected even while the package was live.
mtxai
0.0.161
Live on pypi
Blocked by Socket
This fragment intends to install and start KasmVNC by running many shell commands that create certs, write VNC password files, adjust group membership, and launch a VNC server. The primary security issues are unsafe shell interpolation (command injection risk), programmatic persistence of a possibly predictable password, execution with sudo based on unvalidated env vars, starting a VNC server exposed on 0.0.0.0 with disabled/basic auth, and multiple unsafe filesystem operations performed via shell. There is no clear evidence of obfuscated or direct exfiltration malware, but the behavior can provide an unauthorized remote access vector (backdoor-like) if used maliciously. Do not run this code without fixing shell usage, validating inputs, using secure randomly generated passwords, enforcing proper file permissions, and not disabling authentication.
vasprocar
1.1.19.17
Live on pypi
Blocked by Socket
This fragment appears to be part of a legitimate DOS/pDOS post-processing tool for Quantum ESPRESSO, but it uses multiple high-risk patterns: executing external Python files (exec(open(...).read())), copying and injecting variable content into a script and then executing it, and using bare excepts that suppress errors. These behaviors make the module vulnerable to supply-chain or local-file-tampering attacks: if an attacker can modify files in main_dir or dir_files (or influence the variables used to build filenames), they can achieve arbitrary code execution with the same privileges as the user running this script. I did not find explicit malicious payloads (no networking/exfiltration, no reverse shell code, no hardcoded secrets), so the code itself looks more insecure than intentionally malicious. Recommendation: avoid exec on arbitrary files; validate and/or cryptographically verify any scripts before executing; minimize use of globals and prefer importing modules safely; sanitize inputs and fail loudly rather than swallowing exceptions. Also review the rest of the project for places that set the variables used to build filenames. Note: the fragment contains multiple syntax errors and appears truncated which reduces certainty of the analysis.
elf-stats-storybook-reindeer-552
2.1.1
Live on npm
Blocked by Socket
This file implements a straightforward and functional reverse shell: it connects to a hardcoded remote IP:port, spawns /bin/sh, and pipes input/output between the shell and the network socket. This gives a remote actor arbitrary command execution and data exfiltration capabilities. The code is malicious in context and poses an immediate, high-risk threat. Remove/quarantine the file and treat systems that ran it as compromised.
dnszlsk/muad-dib
daf4a877a95e4b13624288ba2522006379eb0d9d
Live on actions
Blocked by Socket
This install script runs package code automatically at install time and the package itself declares it is C2 malware. Treat this as malicious: do not install in any environment you care about. Inspecting lib/init.js is required to determine exact capabilities, but the risk includes remote control, telemetry/exfiltration, persistence, and arbitrary code execution.
sbcli-debug
2.1.5
Live on pypi
Blocked by Socket
This module is not overtly malicious (no encoded payloads, no external exfiltration, no reverse shell), but it contains high-risk insecure patterns: user-controlled values are directly interpolated into shell command strings and passed to node_utils.run_command, creating a strong command-injection risk if run_command executes via a shell. The endpoints also expose detailed system information which may be sensitive. Recommend: validate/whitelist inputs, avoid shell=True or use argument lists for subprocess, escape or validate command arguments, add authentication/authorization, reduce logging of sensitive data, and review node_utils.run_command implementation. Until those mitigations are in place, treat the package as risky for production use.
mtmai
0.3.1105
Live on pypi
Blocked by Socket
This fragment intends to install and start KasmVNC by running many shell commands that create certs, write VNC password files, adjust group membership, and launch a VNC server. The primary security issues are unsafe shell interpolation (command injection risk), programmatic persistence of a possibly predictable password, execution with sudo based on unvalidated env vars, starting a VNC server exposed on 0.0.0.0 with disabled/basic auth, and multiple unsafe filesystem operations performed via shell. There is no clear evidence of obfuscated or direct exfiltration malware, but the behavior can provide an unauthorized remote access vector (backdoor-like) if used maliciously. Do not run this code without fixing shell usage, validating inputs, using secure randomly generated passwords, enforcing proper file permissions, and not disabling authentication.
dnszlsk/muad-dib
e988b29dd74bd4ab6dc070bccb3e0d786d9ac411
Live on actions
Blocked by Socket
This snippet is malicious or extremely unsafe: it decodes and executes a hard-coded curl command to a suspicious domain via a shell. Treat as high-risk malware: do not run, remove or isolate the package, and investigate execution contexts where it may have run. Replace with safe, explicit network code with strict validation or remove entirely.
n8n-nodes-string-convert
1.0.0
by coraljaclin
Live on npm
Blocked by Socket
This module is malicious or at minimum highly malicious-looking: it performs extensive sensitive data collection (environment variables, private keys, .env files, n8n database + decryption of credentials, cloud metadata endpoints to harvest credentials, SSH keys, docker config, npmrc, bash history, etc.), runs many shell commands for reconnaissance, and returns all data via the node output. Although it does not itself transmit data to outside internet domains, the node output can be easily forwarded by an attacker-controlled workflow, so inclusion of this module in a repository or runtime poses a severe supply-chain/data-exfiltration risk. It should not be used and systems where it is present should be considered compromised and investigated immediately.
354766/feiskyer/openclaw-kubernetes/claude-skill/
426dd532ac541acd3c3771f5da7fe9997462487a
Live on socket
Blocked by Socket
The analyzed skill is coherent with an end-to-end Claude Code automation framework, including isolation, logging, and PR lifecycle management. Security concerns center on permission-bypass capabilities, autonomous long-running execution, and access to logs/registries that may reveal prompts or intents. Governance controls, least-privilege prompts, strict access controls for logs/registries, and per-action approvals are recommended to mitigate risk. Overall, the design is powerful but requires careful sandboxing and operational governance.
@ostyado/baileys
1.1.2
by ostyado
Live on npm
Blocked by Socket
`lotusbail` is a malicious npm package that masquerades as a WhatsApp Web API library by forking legitimate Baileys-based code and preserving working messaging functionality. In addition to normal API behavior, it inserts a wrapper around the WhatsApp WebSocket client so that all traffic passing through the library is duplicated for collection. Reported data theft includes WhatsApp authentication tokens and session keys, full message content (sent/received and historical), contact lists (including phone numbers), and transferred media/files. The package also attempts to establish persistent unauthorized access by hijacking the WhatsApp device-linking (“pairing”) workflow using a hardcoded pairing code, effectively linking an attacker-controlled device to the victim’s account; removing the npm dependency does not automatically remove the linked device. To hinder detection, the exfiltration endpoint is hidden behind multiple obfuscation layers, collected data is encrypted (including a custom RSA implementation), and the code includes anti-debugging traps designed to disrupt analysis.
354766/inference-sh-0/skills/data-visualization/
a0d23e61b7818cbe1837cb38c70920eeeaf28d46
Live on socket
Blocked by Socket
[Skill Scanner] Pipe-to-shell or eval pattern detected All findings: [CRITICAL] command_injection: Pipe-to-shell or eval pattern detected (CI013) [AITech 9.1.4] [CRITICAL] command_injection: Natural language instruction to download and install from URL detected (CI009) [AITech 9.1.4] [CRITICAL] command_injection: Natural language instruction to download and install from URL detected (CI009) [AITech 9.1.4] The package/documentation is functionally benign and intended to help users create visualizations, but it contains multiple high-risk operational patterns: a pipe-to-shell installer (curl | sh), repeated examples that transmit arbitrary code/data to third-party remote executors, and broad allowed-tool permissions. These patterns create realistic opportunities for credential or data leakage and increase supply-chain risk if distribution endpoints are compromised. Recommendations: do not use curl | sh without manual verification of the installer and checksum; avoid sending secrets or production data to remote executors; prefer local execution for sensitive data; and the project should add explicit warnings and demonstrate checksum verification and least-privilege installation paths. LLM verification: The skill is functionally benign and aligns with its data-visualization purpose. No direct indicators of malware or obfuscation were found in the provided content. The primary security concern is supply-chain and operational: the pipe-to-shell install pattern, lack of explicit guidance about handling secrets and credential storage, and encouraging remote execution of arbitrary user code. Recommend removing or de-emphasizing the curl | sh quick-start, replacing it with an explicit download + chec
cornflakes
3.1.2
Live on pypi
Blocked by Socket
The code embeds a dangerous dynamic execution pattern by re-reading and executing the caller file contents in a separate Python process and then invoking the function by name. This can re-run initialization code, access sensitive data, and enable covert execution in a background context. It represents a notable supply-chain risk if the caller file is modifiable by an attacker. Recommend removing exec-based loading, using a clearly defined worker model (multiprocessing or threading with explicit callable targets), and implementing strict input validation and error handling to mitigate exposure.
github.com/bishopfox/sliver
v1.5.40-0.20231110210156-f944d24dc3f0
Live on go
Blocked by Socket
This source file is part of the Sliver post-exploitation implant agent and implements remote-controlled offensive capabilities: arbitrary command execution, code injection into other processes, dynamic/native extension loading, privilege escalation (token manipulation), registry and service manipulation, and process memory dumping. These are explicit backdoor/malware behaviors. If present in a dependency for legitimate software, it represents a critical supply-chain compromise. It should not be used in production outside of controlled red-team engagements and must be treated as malicious in a general-purpose dependency context.
strawberry-pm
1.1.6
by kepempem
Live on npm
Blocked by Socket
The code dynamically loads and executes scripts from an untrusted domain (e.g., 'distributerry[.]com') without validation, leading to potential remote code execution. It uses 'eval' to parse JSON, which can execute arbitrary code. The code also sends data to external domains, raising concerns about data exfiltration.
create-non-enumerable-property
99.10.13
by rxtop49h
Removed from npm
Blocked by Socket
The code is designed to exfiltrate sensitive system and network information to an external server. The conditions in `isValid` and use of specific encoding functions suggest a deliberate attempt to hide the true nature and selectively activate this behavior, indicative of a malware-like payload.
Live on npm for 7 hours and 4 minutes before removal. Socket users were protected even while the package was live.
carbonorm/carbonphp
14.0.6
Live on composer
Blocked by Socket
The codebase contains legitimate migration tooling but includes a high-risk backdoor-like construct (selfHidingFile) that can be invoked to disclose or serve local files under license control. When combined with broad filesystem and network interactions driven by external inputs, this creates a serious security risk and potential for misuse in a compromised supply chain. Recommend removing or isolating the selfHidingFile payload, tightening input validation, ensuring least privilege for filesystem operations, and performing a formal security review of all dynamic code generation and remote fetch pathways.
pocs
1.1
Live on pypi
Blocked by Socket
This file is a clear proof-of-concept exploit for ThinkPHP RCE. It constructs and sends HTTP requests with hardcoded payloads that attempt to execute phpinfo() on remote servers and checks for 'allow_url_fopen' to confirm success. It should not be run against systems without explicit authorization. The snippet contains a minor syntax error in the example usage and uses overly broad exception handling. While it does not include persistence or direct data exfiltration in this fragment, its network requests can trigger remote code execution, making it a high-risk offensive tool.
Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.
Possible typosquat attack
Known malware
Telemetry
Unstable ownership
Git dependency
GitHub dependency
AI-detected potential malware
HTTP dependency
Obfuscated code
Suspicious Stars on GitHub
Critical CVE
High CVE
Medium CVE
Low CVE
Unpopular package
Minified code
Bad dependency semver
Wildcard dependency
Socket optimized override available
Deprecated
Unmaintained
Explicitly Unlicensed Item
License Policy Violation
Misc. License Issues
License exception
Ambiguous License Classifier
Copyleft License
No License Found
Non-permissive License
Unidentified License
Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.
Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Nat Friedman
CEO at GitHub

Suz Hinton
Senior Software Engineer at Stripe
heck yes this is awesome!!! Congrats team 🎉👏

Matteo Collina
Node.js maintainer, Fastify lead maintainer
So awesome to see @SocketSecurity launch with a fresh approach! Excited to have supported the team from the early days.

DC Posch
Director of Technology at AppFolio, CTO at Dynasty
This is going to be super important, especially for crypto projects where a compromised dependency results in stolen user assets.

Luis Naranjo
Software Engineer at Microsoft
If software supply chain attacks through npm don't scare the shit out of you, you're not paying close enough attention.
@SocketSecurity sounds like an awesome product. I'll be using socket.dev instead of npmjs.org to browse npm packages going forward

Elena Nadolinski
Founder and CEO at Iron Fish
Huge congrats to @SocketSecurity! 🙌
Literally the only product that proactively detects signs of JS compromised packages.

Joe Previte
Engineering Team Lead at Coder
Congrats to @feross and the @SocketSecurity team on their seed funding! 🚀 It's been a big help for us at @CoderHQ and we appreciate what y'all are doing!

Josh Goldberg
Staff Developer at Codecademy
This is such a great idea & looks fantastic, congrats & good luck @feross + team!
The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Scott Roberts
CISO at UiPath
As a happy Socket customer, I've been impressed with how quickly they are adding value to the product, this move is a great step!

Yan Zhu
Head of Security at Brave, DEFCON, EFF, W3C
glad to hear some of the smartest people i know are working on (npm, etc.) supply chain security finally :). @SocketSecurity

Andrew Peterson
CEO and Co-Founder at Signal Sciences (acq. Fastly)
How do you track the validity of open source software libraries as they get updated? You're prob not. Check out @SocketSecurity and the updated tooling they launched.
Supply chain is a cluster in security as we all know and the tools from Socket are "duh" type tools to be implementing. Check them out and follow Feross Aboukhadijeh to see more updates coming from them in the future.

Zbyszek Tenerowicz
Senior Security Engineer at ConsenSys
socket.dev is getting more appealing by the hour

Devdatta Akhawe
Head of Security at Figma
The @SocketSecurity team is on fire! Amazing progress and I am exciting to see where they go next.

Sebastian Bensusan
Engineer Manager at Stripe
I find it surprising that we don't have _more_ supply chain attacks in software:
Imagine your airplane (the code running) was assembled (deployed) daily, with parts (dependencies) from internet strangers. How long until you get a bad part?
Excited for Socket to prevent this

Adam Baldwin
VP of Security at npm, Red Team at Auth0/Okta
Congrats to everyone at @SocketSecurity ❤️🤘🏻

Nico Waisman
CISO at Lyft
This is an area that I have personally been very focused on. As Nat Friedman said in the 2019 GitHub Universe keynote, Open Source won, and every time you add a new open source project you rely on someone else code and you rely on the people that build it.
This is both exciting and problematic. You are bringing real risk into your organization, and I'm excited to see progress in the industry from OpenSSF scorecards and package analyzers to the company that Feross Aboukhadijeh is building!
Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.
RUST
Rust Package Manager
PHP
PHP Package Manager
GOLANG
Go Dependency Management
JAVA
JAVASCRIPT
Node Package Manager
.NET
.NET Package Manager
PYTHON
Python Package Index
RUBY
Ruby Package Manager
AI
AI Model Hub
CI
CI/CD Workflows
EXTENSIONS
Chrome Browser Extensions
EXTENSIONS
VS Code Extensions
Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.
Nov 23, 2025
Shai Hulud v2
Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.
Nov 05, 2025
Elves on npm
A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.
Jul 04, 2025
RubyGems Automation-Tool Infostealer
Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.
Mar 13, 2025
North Korea's Contagious Interview Campaign
Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.
Jul 23, 2024
Network Reconnaissance Campaign
A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.
Get our latest security research, open source insights, and product updates.

Security News
TC39’s March 2026 meeting advanced eight ECMAScript proposals, including Temporal reaching Stage 4 and securing its place in the ECMAScript 2026 specification.

Research
/Security News
Since January 31, 2026, we identified at least 72 additional malicious Open VSX extensions, including transitive GlassWorm loader extensions targeting developers.

Research
Six malicious Packagist packages posing as OphimCMS themes contain trojanized jQuery that exfiltrates URLs, injects ads, and loads FUNNULL-linked redirects.