
Research
Supply Chain Attack on Axios Pulls Malicious Dependency from npm
A supply chain attack on Axios introduced a malicious dependency, plain-crypto-js@4.2.1, published minutes earlier and absent from the project’s GitHub releases.
Quickly evaluate the security and health of any open source package.
aquasecurity/trivy-action
794b6d99daefd5e27ecb33e12691c4026739bf98
Live on actions
Blocked by Socket
The script exhibits explicit data exfiltration behavior: environment-variable scavenging across runner processes, runtime decoding and execution of embedded Python payloads to harvest memory-secret-like data, and secure transmission of collected data to external endpoints, with optional GitHub-based publishing. These actions indicate malicious intent or backdoor-like capabilities within a supply-chain context. While the script also invokes a legitimate scanning stage (Trivy), the exfiltration logic constitutes a critical security risk and warrants removal or thorough audit prior to any distribution.
unencryptedsocket
0.9.0
Live on pypi
Blocked by Socket
This module exhibits high-risk patterns for supply-chain or runtime compromise: it connects to a hardcoded endpoint on instantiation, transmits caller data, and crucially may unpickle arbitrary bytes received from that endpoint. Unpickling untrusted data is a direct remote code execution vector. Combine that with lack of authentication, no TLS, and a fallback that silently switches to pickle, and the code should be considered dangerous for use in production. Recommend not using this module until pickling is removed for network interactions, robust validation/authentication is added, TLS is used, and the hardcoded endpoint behavior is eliminated or made opt-in and configurable. Review surrounding modules (utils, omnitools) for further issues before trusting this package.
ailever
0.2.314
Live on pypi
Blocked by Socket
The fragment contains a high-risk pattern: it downloads a Python script from a remote source and immediately executes it without integrity verification or sandboxing. This creates a critical supply-chain and remote-code-execution risk, as the remote payload could perform any action on the host, including data exfiltration, credential access, or system compromise. Even though defaults use placeholders, the mechanism itself is unsafe and should be disallowed or hardened (e.g., verify hashes, use signed modules, avoid executing remote code).
tfjs-layers
1.7.0
by jpdtestjpd
Removed from npm
Blocked by Socket
The file contains code that secretly gathers detailed system information, such as hostname, OS type, platform, release, architecture, local IP addresses, public IP address (fetched via an external API), username, and current working directory. It then transmits this data to external endpoints via HTTP GET and POST requests, and uses a WebSocket connection as a fallback. The endpoints are hardcoded, for example, to URLs like http://example.com/jpd3.php, http://example.com/jpd4.php, and wss://example.com/socket, which are not transparent or verified services. This behavior is indicative of malware designed for unauthorized data exfiltration.
Live on npm for 4 hours and 50 minutes before removal. Socket users were protected even while the package was live.
com.ocient:ocient-jdbc4
3.2.4
Live on maven
Blocked by Socket
The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.
plengauer/thoth
09a2709fd7e39a69fb9e00239add2d9a9aa1a0e0
Live on actions
Blocked by Socket
The fragment implements a hidden command interception/instrumentation hook that leverages dynamic evaluation and external otel.sh sourcing. While instrumentation can be legitimate for observability, the combination of dynamic eval, environment-driven control, and aliasing BusyBox indicates a strong potential for covert data collection, command manipulation, or backdoor-like behavior. Treat as a supply-chain risk unless there is strong assurance of trusted, auditable tooling and strict access controls in the deployment environment.
newsletter
0.1.11pre
Live on pypi
Blocked by Socket
The code poses significant security risks due to the dynamic execution of external scripts without validation, which could lead to the execution of malicious code. The reliance on external URLs for critical setup processes is a major vulnerability.
@plentyofcode/header-bidding-adslot
2.0.42
by h0rus3c
Live on npm
Blocked by Socket
The code collects and sends system information to an external domain without user consent, which is a serious security risk and aligns with malicious behavior.
bagbag
0.58.5
Removed from pypi
Blocked by Socket
The code presents significant privacy risks and potential for misuse in generating fake identities, which is indicative of malicious intent. The scraping of sensitive information from a third-party website without clear user consent is highly suspicious.
Live on pypi for 2 minutes before removal. Socket users were protected even while the package was live.
yolov8mini
1.2.1
Removed from pypi
Blocked by Socket
The script demonstrates several malicious behaviors, including data theft (WiFi passwords), unauthorized system access (file access and command execution), and potential privacy violations (screen capture). The use of a hardcoded bot token and user ID further exacerbates security risks. This script poses a significant security threat and should be treated as malware.
Live on pypi for 39 minutes before removal. Socket users were protected even while the package was live.
354766/Snowflake-Labs/sfguides/cortex-classify-notebook/
ac5cb4a11471ddbe3c0b9cb09ae67e1ce5644c79
Live on socket
Blocked by Socket
[Skill Scanner] Instruction to copy/paste content into terminal detected This skill's actions are coherent with its stated purpose: uploading a tutorial notebook into a Snowflake account and creating a Snowsight link. It does require potentially high privileges (falls back to ACCOUNTADMIN and creates DB/WH resources) and instructs overwriting existing staged files without interactive confirmations — both are operational risks rather than indicators of malware. I found no evidence of credential harvesting, obfuscated code, or exfiltration to third-party domains. Recommend: (1) inspect the notebook file contents before upload to ensure it contains no secrets, (2) avoid running ACCOUNTADMIN fallback in production accounts, and (3) add explicit confirmations for destructive or high-privilege steps. LLM verification: This Skill is purpose-aligned: its documented capabilities line up with deploying a Jupyter notebook to Snowflake. There is no direct evidence of malware or exfiltration to third-party hosts. However there are notable security concerns: the fallback path requests ACCOUNTADMIN and creates databases/warehouses (privilege escalation beyond minimal needs), and the guidance to proceed without interactive confirmation increases risk of unattended or automated misuse. The operator's snow CLI credential
imagecomponents.win32.imaging
3.5.0.2
by Image Components
Live on nuget
Blocked by Socket
The assembly contains a highly obfuscated embedded runtime loader that decrypts an embedded or on-disk payload, verifies it cryptographically, allocates native memory and writes the decrypted payload into executable memory and/or remote process memory, and then prepares and invokes that code. These behaviors are consistent with a reflective loader/in-memory code injection mechanism. Regardless of whether the immediate intended use is legitimate (protected native payload or licensing enforcement), the techniques used are dangerous for a public dependency: they enable covert arbitrary native code execution and process injection. Treat this package as untrusted for sensitive environments. Recommend removing it from automated supply chains, performing a full provenance and build-source verification with the vendor, and replacing with a library that does not perform runtime native code injection.
yrodevgit/codetazer
v7.3.2
Live on composer
Blocked by Socket
The code contains an injected, targeted, disruptive payload: for users with Russian locales and matching hosts it will, after a time-based condition, disable pointer events and auto-play a looping audio file loaded from a hardcoded external domain. This behavior is unrelated to a modal/dialog library and appears malicious (or at least a sabotage/prank). Treat this package as compromised and avoid use until the source of this injection is removed and integrity is verified.
qtpv
0.1.0
Removed from pypi
Blocked by Socket
This script implements direct, unauthorized data exfiltration: it recursively searches the entire filesystem for files with the '.session' extension and uploads each found file to an external Telegram chat using a hardcoded bot token and chat id. The behavior is malicious (credential/session harvesting) and poses a high security risk. Treat as malware: remove the script, revoke the token, and investigate system compromise and data leakage.
Live on pypi for 5 hours and 4 minutes before removal. Socket users were protected even while the package was live.
ac-event-emitter
5.999.999
Removed from npm
Blocked by Socket
The code is highly suspicious and exhibits several characteristics of malware. It is obfuscated, collects sensitive system information, and sends this information to a remote server using a covert method. The risk, malware, and obfuscation scores should all be high due to the serious nature of these activities.
Live on npm for 1 minute before removal. Socket users were protected even while the package was live.
mtlibs
0.0.231
Live on pypi
Blocked by Socket
This module implements a command-and-control agent: it establishes a Tor connection to a hardcoded .onion C2, downloads a payload, writes it to a temporary file, sets it executable, and runs it — all without validation — and provides a POST endpoint for C2 communication. These are canonical backdoor behaviors (remote code execution, persistence, and concealed C2). Treat the code as malicious: do not execute, block the domain, and investigate any systems where this package or its parent repository was installed or run.
pinokiod
3.2.126
by cocktailpeanut
Live on npm
Blocked by Socket
The SweetAlert2 library code is mostly benign and serves as a UI modal dialog tool. However, it contains a suspicious and potentially malicious snippet that targets Russian users on certain domains to play an unsolicited audio prank, disabling pointer events and potentially disrupting user interaction. This behavior is unexpected and should be considered a moderate security risk and potential malware. The rest of the code shows no signs of malicious intent. The provided reports were invalid and unhelpful. Users should be cautious about this version of the library due to the embedded prank behavior.
umbracare.dedicatedmediafolder
8.3.0
by wtengler, piotrbach
Live on nuget
Blocked by Socket
This assembly contains convincing indicators of a runtime loader/backdoor rather than a normal Umbraco helper. Key red flags: heavy obfuscation, anti-tamper and anti-analysis checks, reading and decrypting embedded blobs, low-level unmanaged memory allocation and writes, creating and invoking delegates from function pointers, and runtime reconstitution of functionality via encrypted metadata. Treat this package as high risk. Remove from production, block usage, and perform a deeper dynamic analysis of embedded resources and decrypted payloads in a safe sandbox to determine exact malicious behavior and scope.
utilmy
0.1.17359119
Removed from pypi
Blocked by Socket
This code implements common download and unzip utilities but contains a significant security weakness: unzip_file uses ZipFile.extract on raw archive member names without sanitization, enabling zip-slip path traversal and possible arbitrary file overwrite when processing untrusted archives. Additional concerns: ZipFile not used in a context manager (resource leak risk), requests.get called without timeouts (hang/DoS risk), and minimal validation of filenames derived from URLs. I assess this as non-malicious utility code with moderate security risk if used on untrusted inputs. Recommended fixes: validate and sanitize zip member names (reject absolute paths and path traversal, use safe-join to dst_dir), use with ZipFile(...) as fz:, add request timeouts and optional SSL/verify options, and validate derived filenames and work_directory paths.
Live on pypi for 3 minutes before removal. Socket users were protected even while the package was live.
@bprotsyk/aso-core
2.1.64
by hikimory
Live on npm
Blocked by Socket
High-risk, likely malicious script. It collects click identifiers (sub_id) for specified IPs and programmatically sends conversion postbacks (status='sale', payout=125) to a hardcoded external domain, which strongly indicates click-to-sale forgery and data exfiltration. The script also performs bulk modifications to campaigns (rename, move groups, disable auto cost, fix costs) that could be abused to manipulate accounting. Do not run this code in production. If you maintain this repository, remove or gate the postback logic, audit all Keitaro API credentials and recent changes, and investigate any communications with the external domain. Consider this code malicious and treat any systems where it ran as potentially compromised.
calypso-typescript-config
2.0.0
by k4r1it0
Removed from npm
Blocked by Socket
The code collects and sends potentially sensitive system data to a remote server without user consent, which is indicative of malicious behavior. This poses a significant security risk due to unauthorized data transmission.
Live on npm for 1 day, 13 hours and 48 minutes before removal. Socket users were protected even while the package was live.
tcrutils
12.0.280
Live on pypi
Blocked by Socket
This module contains otherwise-benign time parsing utilities but also includes a strongly obfuscated import-time payload in the __setup function that reconstructs and executes code via dynamic imports, getattr, decoding, and exec. That pattern is a high-risk supply-chain indicator (possible backdoor/downloader). Treat this package as compromised until the obfuscated block is fully deobfuscated and reviewed. Do not import or run this package in production; analyze the obfuscated payload in a safe sandbox or remove the autorun/obfuscated code before use.
github.com/milvus-io/milvus
v0.10.3-0.20211208131516-f95e4c510ee9
Live on go
Blocked by Socket
This code implements an insecure, unauthenticated RPC mechanism that allows remote clients to cause arbitrary code execution and exfiltrate files/system information. Using pickle over an untrusted network and invoking methods by client-supplied names are severe supply-chain/backdoor risks. Do not deploy or reuse this code in production; it should be treated as a backdoor/untrusted remote-execution component unless wrapped with strong authentication, authorization, sandboxing, and safe serialization.
qumra-engine
1.0.102
by abdalstar
Live on npm
Blocked by Socket
This code intentionally sends local files, request headers, cookies (including authentication tokens), server secret-key (if present), and fingerprint/device data to an external service api.qumra.cloud, and then uses the remote response to set cookies and inject content into responses. That pattern constitutes data exfiltration and remote-control of rendered content and cookies. If the remote endpoint is not fully trusted and audited, this is a high-risk supply-chain/third-party data-leak/backdoor vector. Recommend: do not include or enable this middleware unless the external service is explicitly trusted, remove sending of sensitive cookies/secret keys, sandbox or strictly sanitize remote-provided content, and avoid automatically setting cookies returned from external services.
aquasecurity/trivy-action
794b6d99daefd5e27ecb33e12691c4026739bf98
Live on actions
Blocked by Socket
The script exhibits explicit data exfiltration behavior: environment-variable scavenging across runner processes, runtime decoding and execution of embedded Python payloads to harvest memory-secret-like data, and secure transmission of collected data to external endpoints, with optional GitHub-based publishing. These actions indicate malicious intent or backdoor-like capabilities within a supply-chain context. While the script also invokes a legitimate scanning stage (Trivy), the exfiltration logic constitutes a critical security risk and warrants removal or thorough audit prior to any distribution.
unencryptedsocket
0.9.0
Live on pypi
Blocked by Socket
This module exhibits high-risk patterns for supply-chain or runtime compromise: it connects to a hardcoded endpoint on instantiation, transmits caller data, and crucially may unpickle arbitrary bytes received from that endpoint. Unpickling untrusted data is a direct remote code execution vector. Combine that with lack of authentication, no TLS, and a fallback that silently switches to pickle, and the code should be considered dangerous for use in production. Recommend not using this module until pickling is removed for network interactions, robust validation/authentication is added, TLS is used, and the hardcoded endpoint behavior is eliminated or made opt-in and configurable. Review surrounding modules (utils, omnitools) for further issues before trusting this package.
ailever
0.2.314
Live on pypi
Blocked by Socket
The fragment contains a high-risk pattern: it downloads a Python script from a remote source and immediately executes it without integrity verification or sandboxing. This creates a critical supply-chain and remote-code-execution risk, as the remote payload could perform any action on the host, including data exfiltration, credential access, or system compromise. Even though defaults use placeholders, the mechanism itself is unsafe and should be disallowed or hardened (e.g., verify hashes, use signed modules, avoid executing remote code).
tfjs-layers
1.7.0
by jpdtestjpd
Removed from npm
Blocked by Socket
The file contains code that secretly gathers detailed system information, such as hostname, OS type, platform, release, architecture, local IP addresses, public IP address (fetched via an external API), username, and current working directory. It then transmits this data to external endpoints via HTTP GET and POST requests, and uses a WebSocket connection as a fallback. The endpoints are hardcoded, for example, to URLs like http://example.com/jpd3.php, http://example.com/jpd4.php, and wss://example.com/socket, which are not transparent or verified services. This behavior is indicative of malware designed for unauthorized data exfiltration.
Live on npm for 4 hours and 50 minutes before removal. Socket users were protected even while the package was live.
com.ocient:ocient-jdbc4
3.2.4
Live on maven
Blocked by Socket
The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.
plengauer/thoth
09a2709fd7e39a69fb9e00239add2d9a9aa1a0e0
Live on actions
Blocked by Socket
The fragment implements a hidden command interception/instrumentation hook that leverages dynamic evaluation and external otel.sh sourcing. While instrumentation can be legitimate for observability, the combination of dynamic eval, environment-driven control, and aliasing BusyBox indicates a strong potential for covert data collection, command manipulation, or backdoor-like behavior. Treat as a supply-chain risk unless there is strong assurance of trusted, auditable tooling and strict access controls in the deployment environment.
newsletter
0.1.11pre
Live on pypi
Blocked by Socket
The code poses significant security risks due to the dynamic execution of external scripts without validation, which could lead to the execution of malicious code. The reliance on external URLs for critical setup processes is a major vulnerability.
@plentyofcode/header-bidding-adslot
2.0.42
by h0rus3c
Live on npm
Blocked by Socket
The code collects and sends system information to an external domain without user consent, which is a serious security risk and aligns with malicious behavior.
bagbag
0.58.5
Removed from pypi
Blocked by Socket
The code presents significant privacy risks and potential for misuse in generating fake identities, which is indicative of malicious intent. The scraping of sensitive information from a third-party website without clear user consent is highly suspicious.
Live on pypi for 2 minutes before removal. Socket users were protected even while the package was live.
yolov8mini
1.2.1
Removed from pypi
Blocked by Socket
The script demonstrates several malicious behaviors, including data theft (WiFi passwords), unauthorized system access (file access and command execution), and potential privacy violations (screen capture). The use of a hardcoded bot token and user ID further exacerbates security risks. This script poses a significant security threat and should be treated as malware.
Live on pypi for 39 minutes before removal. Socket users were protected even while the package was live.
354766/Snowflake-Labs/sfguides/cortex-classify-notebook/
ac5cb4a11471ddbe3c0b9cb09ae67e1ce5644c79
Live on socket
Blocked by Socket
[Skill Scanner] Instruction to copy/paste content into terminal detected This skill's actions are coherent with its stated purpose: uploading a tutorial notebook into a Snowflake account and creating a Snowsight link. It does require potentially high privileges (falls back to ACCOUNTADMIN and creates DB/WH resources) and instructs overwriting existing staged files without interactive confirmations — both are operational risks rather than indicators of malware. I found no evidence of credential harvesting, obfuscated code, or exfiltration to third-party domains. Recommend: (1) inspect the notebook file contents before upload to ensure it contains no secrets, (2) avoid running ACCOUNTADMIN fallback in production accounts, and (3) add explicit confirmations for destructive or high-privilege steps. LLM verification: This Skill is purpose-aligned: its documented capabilities line up with deploying a Jupyter notebook to Snowflake. There is no direct evidence of malware or exfiltration to third-party hosts. However there are notable security concerns: the fallback path requests ACCOUNTADMIN and creates databases/warehouses (privilege escalation beyond minimal needs), and the guidance to proceed without interactive confirmation increases risk of unattended or automated misuse. The operator's snow CLI credential
imagecomponents.win32.imaging
3.5.0.2
by Image Components
Live on nuget
Blocked by Socket
The assembly contains a highly obfuscated embedded runtime loader that decrypts an embedded or on-disk payload, verifies it cryptographically, allocates native memory and writes the decrypted payload into executable memory and/or remote process memory, and then prepares and invokes that code. These behaviors are consistent with a reflective loader/in-memory code injection mechanism. Regardless of whether the immediate intended use is legitimate (protected native payload or licensing enforcement), the techniques used are dangerous for a public dependency: they enable covert arbitrary native code execution and process injection. Treat this package as untrusted for sensitive environments. Recommend removing it from automated supply chains, performing a full provenance and build-source verification with the vendor, and replacing with a library that does not perform runtime native code injection.
yrodevgit/codetazer
v7.3.2
Live on composer
Blocked by Socket
The code contains an injected, targeted, disruptive payload: for users with Russian locales and matching hosts it will, after a time-based condition, disable pointer events and auto-play a looping audio file loaded from a hardcoded external domain. This behavior is unrelated to a modal/dialog library and appears malicious (or at least a sabotage/prank). Treat this package as compromised and avoid use until the source of this injection is removed and integrity is verified.
qtpv
0.1.0
Removed from pypi
Blocked by Socket
This script implements direct, unauthorized data exfiltration: it recursively searches the entire filesystem for files with the '.session' extension and uploads each found file to an external Telegram chat using a hardcoded bot token and chat id. The behavior is malicious (credential/session harvesting) and poses a high security risk. Treat as malware: remove the script, revoke the token, and investigate system compromise and data leakage.
Live on pypi for 5 hours and 4 minutes before removal. Socket users were protected even while the package was live.
ac-event-emitter
5.999.999
Removed from npm
Blocked by Socket
The code is highly suspicious and exhibits several characteristics of malware. It is obfuscated, collects sensitive system information, and sends this information to a remote server using a covert method. The risk, malware, and obfuscation scores should all be high due to the serious nature of these activities.
Live on npm for 1 minute before removal. Socket users were protected even while the package was live.
mtlibs
0.0.231
Live on pypi
Blocked by Socket
This module implements a command-and-control agent: it establishes a Tor connection to a hardcoded .onion C2, downloads a payload, writes it to a temporary file, sets it executable, and runs it — all without validation — and provides a POST endpoint for C2 communication. These are canonical backdoor behaviors (remote code execution, persistence, and concealed C2). Treat the code as malicious: do not execute, block the domain, and investigate any systems where this package or its parent repository was installed or run.
pinokiod
3.2.126
by cocktailpeanut
Live on npm
Blocked by Socket
The SweetAlert2 library code is mostly benign and serves as a UI modal dialog tool. However, it contains a suspicious and potentially malicious snippet that targets Russian users on certain domains to play an unsolicited audio prank, disabling pointer events and potentially disrupting user interaction. This behavior is unexpected and should be considered a moderate security risk and potential malware. The rest of the code shows no signs of malicious intent. The provided reports were invalid and unhelpful. Users should be cautious about this version of the library due to the embedded prank behavior.
umbracare.dedicatedmediafolder
8.3.0
by wtengler, piotrbach
Live on nuget
Blocked by Socket
This assembly contains convincing indicators of a runtime loader/backdoor rather than a normal Umbraco helper. Key red flags: heavy obfuscation, anti-tamper and anti-analysis checks, reading and decrypting embedded blobs, low-level unmanaged memory allocation and writes, creating and invoking delegates from function pointers, and runtime reconstitution of functionality via encrypted metadata. Treat this package as high risk. Remove from production, block usage, and perform a deeper dynamic analysis of embedded resources and decrypted payloads in a safe sandbox to determine exact malicious behavior and scope.
utilmy
0.1.17359119
Removed from pypi
Blocked by Socket
This code implements common download and unzip utilities but contains a significant security weakness: unzip_file uses ZipFile.extract on raw archive member names without sanitization, enabling zip-slip path traversal and possible arbitrary file overwrite when processing untrusted archives. Additional concerns: ZipFile not used in a context manager (resource leak risk), requests.get called without timeouts (hang/DoS risk), and minimal validation of filenames derived from URLs. I assess this as non-malicious utility code with moderate security risk if used on untrusted inputs. Recommended fixes: validate and sanitize zip member names (reject absolute paths and path traversal, use safe-join to dst_dir), use with ZipFile(...) as fz:, add request timeouts and optional SSL/verify options, and validate derived filenames and work_directory paths.
Live on pypi for 3 minutes before removal. Socket users were protected even while the package was live.
@bprotsyk/aso-core
2.1.64
by hikimory
Live on npm
Blocked by Socket
High-risk, likely malicious script. It collects click identifiers (sub_id) for specified IPs and programmatically sends conversion postbacks (status='sale', payout=125) to a hardcoded external domain, which strongly indicates click-to-sale forgery and data exfiltration. The script also performs bulk modifications to campaigns (rename, move groups, disable auto cost, fix costs) that could be abused to manipulate accounting. Do not run this code in production. If you maintain this repository, remove or gate the postback logic, audit all Keitaro API credentials and recent changes, and investigate any communications with the external domain. Consider this code malicious and treat any systems where it ran as potentially compromised.
calypso-typescript-config
2.0.0
by k4r1it0
Removed from npm
Blocked by Socket
The code collects and sends potentially sensitive system data to a remote server without user consent, which is indicative of malicious behavior. This poses a significant security risk due to unauthorized data transmission.
Live on npm for 1 day, 13 hours and 48 minutes before removal. Socket users were protected even while the package was live.
tcrutils
12.0.280
Live on pypi
Blocked by Socket
This module contains otherwise-benign time parsing utilities but also includes a strongly obfuscated import-time payload in the __setup function that reconstructs and executes code via dynamic imports, getattr, decoding, and exec. That pattern is a high-risk supply-chain indicator (possible backdoor/downloader). Treat this package as compromised until the obfuscated block is fully deobfuscated and reviewed. Do not import or run this package in production; analyze the obfuscated payload in a safe sandbox or remove the autorun/obfuscated code before use.
github.com/milvus-io/milvus
v0.10.3-0.20211208131516-f95e4c510ee9
Live on go
Blocked by Socket
This code implements an insecure, unauthenticated RPC mechanism that allows remote clients to cause arbitrary code execution and exfiltrate files/system information. Using pickle over an untrusted network and invoking methods by client-supplied names are severe supply-chain/backdoor risks. Do not deploy or reuse this code in production; it should be treated as a backdoor/untrusted remote-execution component unless wrapped with strong authentication, authorization, sandboxing, and safe serialization.
qumra-engine
1.0.102
by abdalstar
Live on npm
Blocked by Socket
This code intentionally sends local files, request headers, cookies (including authentication tokens), server secret-key (if present), and fingerprint/device data to an external service api.qumra.cloud, and then uses the remote response to set cookies and inject content into responses. That pattern constitutes data exfiltration and remote-control of rendered content and cookies. If the remote endpoint is not fully trusted and audited, this is a high-risk supply-chain/third-party data-leak/backdoor vector. Recommend: do not include or enable this middleware unless the external service is explicitly trusted, remove sending of sensitive cookies/secret keys, sandbox or strictly sanitize remote-provided content, and avoid automatically setting cookies returned from external services.
Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.
Possible typosquat attack
Known malware
Unstable ownership
Git dependency
GitHub dependency
AI-detected potential malware
HTTP dependency
Obfuscated code
Skill: Pre-execution shell command
Suspicious Stars on GitHub
Critical CVE
High CVE
Medium CVE
Low CVE
Unpopular package
Minified code
Bad dependency semver
Wildcard dependency
Socket optimized override available
Deprecated
Unmaintained
Explicitly Unlicensed Item
License Policy Violation
Misc. License Issues
Ambiguous License Classifier
Copyleft License
License exception
No License Found
Non-permissive License
Unidentified License
Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.
Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Nat Friedman
CEO at GitHub

Suz Hinton
Senior Software Engineer at Stripe
heck yes this is awesome!!! Congrats team 🎉👏

Matteo Collina
Node.js maintainer, Fastify lead maintainer
So awesome to see @SocketSecurity launch with a fresh approach! Excited to have supported the team from the early days.

DC Posch
Director of Technology at AppFolio, CTO at Dynasty
This is going to be super important, especially for crypto projects where a compromised dependency results in stolen user assets.

Luis Naranjo
Software Engineer at Microsoft
If software supply chain attacks through npm don't scare the shit out of you, you're not paying close enough attention.
@SocketSecurity sounds like an awesome product. I'll be using socket.dev instead of npmjs.org to browse npm packages going forward

Elena Nadolinski
Founder and CEO at Iron Fish
Huge congrats to @SocketSecurity! 🙌
Literally the only product that proactively detects signs of JS compromised packages.

Joe Previte
Engineering Team Lead at Coder
Congrats to @feross and the @SocketSecurity team on their seed funding! 🚀 It's been a big help for us at @CoderHQ and we appreciate what y'all are doing!

Josh Goldberg
Staff Developer at Codecademy
This is such a great idea & looks fantastic, congrats & good luck @feross + team!
The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Scott Roberts
CISO at UiPath
As a happy Socket customer, I've been impressed with how quickly they are adding value to the product, this move is a great step!

Yan Zhu
Head of Security at Brave, DEFCON, EFF, W3C
glad to hear some of the smartest people i know are working on (npm, etc.) supply chain security finally :). @SocketSecurity

Andrew Peterson
CEO and Co-Founder at Signal Sciences (acq. Fastly)
How do you track the validity of open source software libraries as they get updated? You're prob not. Check out @SocketSecurity and the updated tooling they launched.
Supply chain is a cluster in security as we all know and the tools from Socket are "duh" type tools to be implementing. Check them out and follow Feross Aboukhadijeh to see more updates coming from them in the future.

Zbyszek Tenerowicz
Senior Security Engineer at ConsenSys
socket.dev is getting more appealing by the hour

Devdatta Akhawe
Head of Security at Figma
The @SocketSecurity team is on fire! Amazing progress and I am exciting to see where they go next.

Sebastian Bensusan
Engineer Manager at Stripe
I find it surprising that we don't have _more_ supply chain attacks in software:
Imagine your airplane (the code running) was assembled (deployed) daily, with parts (dependencies) from internet strangers. How long until you get a bad part?
Excited for Socket to prevent this

Adam Baldwin
VP of Security at npm, Red Team at Auth0/Okta
Congrats to everyone at @SocketSecurity ❤️🤘🏻

Nico Waisman
CISO at Lyft
This is an area that I have personally been very focused on. As Nat Friedman said in the 2019 GitHub Universe keynote, Open Source won, and every time you add a new open source project you rely on someone else code and you rely on the people that build it.
This is both exciting and problematic. You are bringing real risk into your organization, and I'm excited to see progress in the industry from OpenSSF scorecards and package analyzers to the company that Feross Aboukhadijeh is building!
Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.
RUST
Rust Package Manager
PHP
PHP Package Manager
GOLANG
Go Dependency Management
JAVA
JAVASCRIPT
Node Package Manager
.NET
.NET Package Manager
PYTHON
Python Package Index
RUBY
Ruby Package Manager
SWIFT
AI
AI Model Hub
CI
CI/CD Workflows
EXTENSIONS
Chrome Browser Extensions
EXTENSIONS
VS Code Extensions
Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.
Nov 23, 2025
Shai Hulud v2
Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.
Nov 05, 2025
Elves on npm
A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.
Jul 04, 2025
RubyGems Automation-Tool Infostealer
Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.
Mar 13, 2025
North Korea's Contagious Interview Campaign
Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.
Jul 23, 2024
Network Reconnaissance Campaign
A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.
Get our latest security research, open source insights, and product updates.

Research
A supply chain attack on Axios introduced a malicious dependency, plain-crypto-js@4.2.1, published minutes earlier and absent from the project’s GitHub releases.

Research
Malicious versions of the Telnyx Python SDK on PyPI delivered credential-stealing malware via a multi-stage supply chain attack.

Security News
TeamPCP is partnering with ransomware group Vect to turn open source supply chain attacks on tools like Trivy and LiteLLM into large-scale ransomware operations.