You're Invited:Meet the Socket Team at RSAC and BSidesSF 2026, March 23–26.RSVP
Socket
Book a DemoSign in
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub AppBook a Demo

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery
t

timmywil published 4.0.0

left-pad
s

stevemao published 1.3.0

react
r

react-bot published 19.2.4

We protect you from vulnerable and malicious packages

richpartners-telegram-sdk

1.0.20

by vutisch

Live on npm

Blocked by Socket

This module extracts a stored TON wallet address and a caller-supplied Telegram ID and transmits them to two hardcoded remote endpoints. Although it uses AES-GCM, the encryption key is an empty hard-coded string in this code path, yielding predictable/weak key material that provides effectively no confidentiality. The behavior is stealthy (local flag to limit retransmission), lacks user consent or authentication, and contacts third-party domains—characteristics consistent with covert data exfiltration or a privacy-invasive backdoor. Treat this code as malicious or highly privacy-invasive: block the endpoints, remove or isolate the package, and investigate related modules and network activity.

tdstone

0.2.7

Live on pypi

Blocked by Socket

The code exhibits a high-risk dynamic execution sink (exec on base64-decoded sto_code from input) that enables arbitrary code execution within the process. This poses severe security and supply-chain risks, including potential backdoors, data exfiltration, and tampering of model data. While there are legitimate-looking data handling and serialization paths (pickle/ONNX), they are contingent on untrusted payloads and are not safeguarded by validation or sandboxing. Treat as dangerous and implement strict input validation, sandboxing, or removal of the exec-based payload path.

mtmai

0.4.200

Live on pypi

Blocked by Socket

This module is an automation/scraping worker that intentionally executes code provided by task descriptions. That design requires trusting the task source. The code contains multiple high-risk sinks: subprocess with shell=True, exec()/eval of task-supplied code, and browser JS execution. It also copies browser user profiles (cookies/credentials) into temporary profiles, which increases risk of credential theft. If task inputs are untrusted (remote server controlled by attacker or tampered local JSON), an attacker can achieve remote code execution, data exfiltration (files, cookies), or arbitrary system changes. Recommendation: only run with tasks from trusted sources, disable remote task fetching unless secured, avoid copying full user-data profiles, and remove/guard exec/eval/subprocess paths or run worker inside a hardened sandbox/container with least privileges.

akenoai

1.6.1

Live on pypi

Blocked by Socket

This module intentionally transmits API keys (either a hardcoded default decoded from base64 or any user-provided key) to an external, non-OpenAI endpoint via HTTP POST. This is credential exfiltration and constitutes malicious or severely insecure supply-chain behavior. Do not use this code. Remove it, rotate any exposed API keys, block the destination domain, and investigate any use of the embedded key.

zscams

2.0.35

Live on pypi

Blocked by Socket

This module programmatically installs SSH host and user public keys by appending entries to known_hosts and authorized_keys. The behavior is consistent with installing a persistent backdoor: it grants SSH access, uses a hardcoded actor identifier ('zscams@orangecyberdefense'), lacks validation/authorization, and suppresses exceptions to remain stealthy. Treat this code as high-risk; remove or isolate it, audit call sites and append_to_file implementation, and assume compromise if found in a dependency.

upwest.bundle

1.9.17

by Angelo Santos, Ângelo Santos

Live on nuget

Blocked by Socket

This assembly contains a heavily obfuscated runtime loader that reads embedded resources, performs decryption/verification, allocates/writes native memory, manipulates function pointers and executes code in-process. Those behaviors are classic indicators of a loader/backdoor or packer and present a high supply-chain and runtime compromise risk. The Razor view components are likely a cover for the embedded loader; static constructors call the obfuscated loader, meaning inclusion of the assembly will trigger this behavior. I recommend treating this package as malicious/untrusted and removing it from production and further investigating any runtime activity and artifacts. If this is claimed to be legitimate, demand a full forensic explanation and source-code provenance and remove/replace immediately until validated.

tpcti

0.0.2

Removed from pypi

Blocked by Socket

This file is an intentionally obfuscated dynamic loader/decoder. It embeds large encoded blobs and uses decoded names to call __import__, eval, and to update the module globals at runtime. It also enforces a Python-version gate. While I found no explicit network or shell calls in the visible fragment, the presence of dynamic import/eval and globals.update fed from decoded data is a strong indicator the module will reconstruct and execute hidden code at runtime. That pattern is high risk for supply-chain/malicious payload delivery. I recommend treating this package as suspicious: do not run it in production, and perform an isolated dynamic decode (in a safe instrumented sandbox) to fully reveal the payload before trusting it.

Live on pypi for 1 hour and 57 minutes before removal. Socket users were protected even while the package was live.

kohin-sdk

1.0.23

by sumiy_gorwadiya

Removed from npm

Blocked by Socket

The open-source dependency has several security risks and potential malicious activity, including reentrancy vulnerabilities and unprotected functions.

Live on npm for 1 hour and 26 minutes before removal. Socket users were protected even while the package was live.

fmt.core

2025.105.1

by Paulov / FMTDev

Live on nuget

Blocked by Socket

The codebase includes a high-risk DLL-injection capability (FrostbiteInjection) capable of injecting code into other processes using OpenProcess, VirtualAllocEx, WriteProcessMemory, GetProcAddress, and CreateRemoteThread. While asset-management utilities are legitimate for modding workflows, the injection surface constitutes a potential backdoor risk in a supply-chain context, particularly if exposed in public packages. Strong mitigations are recommended: disable or tightly gate injection features, ensure explicit user consent, apply strict access control and signing, and audit cryptographic material exposure. This warrants ongoing security oversight when distributing or integrating such code in external projects.

ironic-python-agent-builder

2.6.0

Live on pypi

Blocked by Socket

This script creates a privileged 'rescue' account with root-level access and configures passwordless sudo permissions, effectively functioning as a backdoor. It reads credentials from a configuration file and writes them into system files to grant unrestricted administrative rights. Such behavior allows full system compromise without requiring authentication. No external domains or IP addresses are referenced.

terminal-pkg-team3sp20

0.0.6

Live on pypi

Blocked by Socket

This module functions as a remote-control/backdoor-like client: it connects to a hardcoded remote IP, exfiltrates the local IP and all typed keys to that server, and accepts remote commands to control the terminal display and play audio. It also triggers reboot() on certain network errors or conditions. The lack of authentication/encryption and the hardcoded command-and-control address make this code highly suspicious and dangerous to run in production. Treat as a likely backdoor; remove or quarantine and investigate origin and intent.

alex_evil-test-package

1.0.0

by alex07pk

Removed from npm

Blocked by Socket

The code is suspicious because it collects system information and sends it to a potentially malicious remote server without explicit consent or legitimate purpose, indicating potential data theft.

Live on npm for 12 days and 5 hours before removal. Socket users were protected even while the package was live.

bigdl-orca

2.4.0b20231031

Live on pypi

Blocked by Socket

The code contains potential security risks such as hard-coded file paths, subprocess.Popen usage, and the handling of untrusted data through PyArrow Plasma. It is essential to review and address these security concerns before using this code in a production environment.

minesweepervariants

0.2.0

Live on pypi

Blocked by Socket

The code provides an exposed remote terminal-like service that executes an external batch file using arguments supplied by the connected client. This is a classic remote command execution surface with no input validation or authentication, enabling potentially dangerous commands to be run on the host. While there are safeguards for terminating processes and cleaning up, the core behavior is high-risk and could enable remote control, data exfiltration, or system compromise if misused or reachable by untrusted clients.

backdoormbti

0.1.0

Live on pypi

Blocked by Socket

This module implements a Hidden Patch Trojan attack pipeline: it constructs and applies additive and spatial triggers to images and performs ADMM-based optimization to embed a backdoor mask into model weights, persisting a trojaned model artifact. The fragment contains incomplete/buggy references but the overall logic is clearly for backdoor insertion. It poses a significant supply-chain and model-integrity threat: do not run this code or accept artifacts produced by it. Audit related modules and remove or isolate this functionality before using the codebase.

ddos

1.0.1

Live on pypi

Blocked by Socket

This setup.py prepares a Python package that explicitly declares DDoS functionality and exposes console commands that run DDos.__main__.main. While the file itself contains no attack implementation, it makes running the malicious code trivial. Treat the package as malicious/abusive; do not install or execute it and remove or block distribution in registries.

dhemrdhs92011

1.250730.10830

by ongtrieuhau861.001

Live on npm

Blocked by Socket

This file implements an unattended update mechanism that fetches and installs .tgz archives from unverified remote sources—both the npm registry (registry[.]npmjs[.]org) and a configurable Firebase-style database URL—by downloading, extracting them into the application directory and then restarting PM2-managed processes. Because there is no cryptographic signature or checksum validation beyond a simple version check, a compromised registry account or database endpoint could deliver arbitrary code to every host running this updater. Additionally, on startup the script gathers extensive system and package metadata—including public IP (via api[.]ipify[.]org), local IP addresses, hostname, OS/platform, Node.js version, CPU/memory statistics, load averages, working directory and package.json fields—and posts it to a configurable Discord webhook endpoint (discordapp[.]com). This behavior poses both a supply-chain risk and a telemetry/privacy exposure risk, as sensitive host information is sent to an external service without explicit user consent or granular control.

tx.bim

1.1.5.10

by TianTeng

Live on nuget

Blocked by Socket

This assembly contains benign-looking BIM model types at surface level but also includes a large, deliberately obfuscated runtime/unpacker component that reads encrypted embedded resources, decrypts/verifies them, allocates executable memory, writes code into process memory, swaps method pointers and invokes the payload. It performs platform-specific native memory operations (VirtualAlloc/mmap/mprotect), writes to /proc/self/mem on Linux, and calls OpenProcess/WriteProcessMemory — all strong indicators of dynamic code injection and self-modifying behavior. Even if this was produced by a legitimate protector/packer, such behavior violates typical supply-chain safety expectations for a public library because it hides runtime behavior, uses native memory patching, and can execute arbitrary embedded payloads. I recommend not using this package in production and treating it as high-risk until the authors provide verifiable source-to-binary build reproducibility and justification for the loader behavior.

examtool

2.1.9b80.dev2

Live on pypi

Blocked by Socket

This module purposefully enables command execution and remote downloads during LaTeX rendering. The transformation that replaces \includegraphics{http...} with a write18 wget call and the use of pdflatex --shell-escape are unsafe when any part of the LaTeX input (exam or subs) is or can be attacker-controlled. The code permits arbitrary command execution and network fetches with no sanitization or sandboxing — a high-risk behavior in a supply-chain context. Do not run this on untrusted input; if retained, restrict inputs strictly or remove the write18/wget mechanism and avoid --shell-escape. Use subprocess with sanitized args and sandboxing instead.

pv_ho3ein

1.0.1

by h0x3ein

Removed from npm

Blocked by Socket

The command 'calc' is not recognized as a standard command, which raises suspicion. It is recommended to investigate the purpose and source of this command before executing it.

Live on npm for 2 hours and 6 minutes before removal. Socket users were protected even while the package was live.

s3en

1.2.0

by 17b4a931

Removed from npm

Blocked by Socket

This code poses a serious security risk and should not be used.

Live on npm for 12 minutes before removal. Socket users were protected even while the package was live.

rrshare

4.2.2

Live on pypi

Blocked by Socket

The code unconditionally kills all running Streamlit processes and then attempts to start a Streamlit app from a user-specific path. This behavior can disrupt legitimate usage and execute potentially untrusted user code without validation. While it may be intended for self-restart or deployment, the lack of safety nets (validation, error handling, logging, and user prompts) represents a significant reliability and security risk that warrants safer alternatives (graceful shutdown, confirm prompts, path validation, and explicit permissions).

pinokiod

3.8.66

by cocktailpeanut

Live on npm

Blocked by Socket

The SweetAlert2 library code is mostly benign and serves as a UI modal dialog tool. However, it contains a suspicious and potentially malicious snippet that targets Russian users on certain domains to play an unsolicited audio prank, disabling pointer events and potentially disrupting user interaction. This behavior is unexpected and should be considered a moderate security risk and potential malware. The rest of the code shows no signs of malicious intent. The provided reports were invalid and unhelpful. Users should be cautious about this version of the library due to the embedded prank behavior.

mtmai

0.3.729

Live on pypi

Blocked by Socket

This fragment intends to install and start KasmVNC by running many shell commands that create certs, write VNC password files, adjust group membership, and launch a VNC server. The primary security issues are unsafe shell interpolation (command injection risk), programmatic persistence of a possibly predictable password, execution with sudo based on unvalidated env vars, starting a VNC server exposed on 0.0.0.0 with disabled/basic auth, and multiple unsafe filesystem operations performed via shell. There is no clear evidence of obfuscated or direct exfiltration malware, but the behavior can provide an unauthorized remote access vector (backdoor-like) if used maliciously. Do not run this code without fixing shell usage, validating inputs, using secure randomly generated passwords, enforcing proper file permissions, and not disabling authentication.

ailever

0.2.653

Live on pypi

Blocked by Socket

The code exhibits a dangerous remote code execution pattern: it downloads and immediately runs a remote Python payload without integrity checks, sandboxing, or input validation. This creates a severe supply-chain and runtime security risk. Recommended mitigations include removing dynamic downloads, validating payloads with cryptographic hashes or signatures, using safe subprocess invocations with argument lists, and implementing strict input sanitization. If remote functionality must remain, switch to a trusted-internal mechanism (e.g., plugin architecture with signed components, offline verification) and add robust error handling and logging.

richpartners-telegram-sdk

1.0.20

by vutisch

Live on npm

Blocked by Socket

This module extracts a stored TON wallet address and a caller-supplied Telegram ID and transmits them to two hardcoded remote endpoints. Although it uses AES-GCM, the encryption key is an empty hard-coded string in this code path, yielding predictable/weak key material that provides effectively no confidentiality. The behavior is stealthy (local flag to limit retransmission), lacks user consent or authentication, and contacts third-party domains—characteristics consistent with covert data exfiltration or a privacy-invasive backdoor. Treat this code as malicious or highly privacy-invasive: block the endpoints, remove or isolate the package, and investigate related modules and network activity.

tdstone

0.2.7

Live on pypi

Blocked by Socket

The code exhibits a high-risk dynamic execution sink (exec on base64-decoded sto_code from input) that enables arbitrary code execution within the process. This poses severe security and supply-chain risks, including potential backdoors, data exfiltration, and tampering of model data. While there are legitimate-looking data handling and serialization paths (pickle/ONNX), they are contingent on untrusted payloads and are not safeguarded by validation or sandboxing. Treat as dangerous and implement strict input validation, sandboxing, or removal of the exec-based payload path.

mtmai

0.4.200

Live on pypi

Blocked by Socket

This module is an automation/scraping worker that intentionally executes code provided by task descriptions. That design requires trusting the task source. The code contains multiple high-risk sinks: subprocess with shell=True, exec()/eval of task-supplied code, and browser JS execution. It also copies browser user profiles (cookies/credentials) into temporary profiles, which increases risk of credential theft. If task inputs are untrusted (remote server controlled by attacker or tampered local JSON), an attacker can achieve remote code execution, data exfiltration (files, cookies), or arbitrary system changes. Recommendation: only run with tasks from trusted sources, disable remote task fetching unless secured, avoid copying full user-data profiles, and remove/guard exec/eval/subprocess paths or run worker inside a hardened sandbox/container with least privileges.

akenoai

1.6.1

Live on pypi

Blocked by Socket

This module intentionally transmits API keys (either a hardcoded default decoded from base64 or any user-provided key) to an external, non-OpenAI endpoint via HTTP POST. This is credential exfiltration and constitutes malicious or severely insecure supply-chain behavior. Do not use this code. Remove it, rotate any exposed API keys, block the destination domain, and investigate any use of the embedded key.

zscams

2.0.35

Live on pypi

Blocked by Socket

This module programmatically installs SSH host and user public keys by appending entries to known_hosts and authorized_keys. The behavior is consistent with installing a persistent backdoor: it grants SSH access, uses a hardcoded actor identifier ('zscams@orangecyberdefense'), lacks validation/authorization, and suppresses exceptions to remain stealthy. Treat this code as high-risk; remove or isolate it, audit call sites and append_to_file implementation, and assume compromise if found in a dependency.

upwest.bundle

1.9.17

by Angelo Santos, Ângelo Santos

Live on nuget

Blocked by Socket

This assembly contains a heavily obfuscated runtime loader that reads embedded resources, performs decryption/verification, allocates/writes native memory, manipulates function pointers and executes code in-process. Those behaviors are classic indicators of a loader/backdoor or packer and present a high supply-chain and runtime compromise risk. The Razor view components are likely a cover for the embedded loader; static constructors call the obfuscated loader, meaning inclusion of the assembly will trigger this behavior. I recommend treating this package as malicious/untrusted and removing it from production and further investigating any runtime activity and artifacts. If this is claimed to be legitimate, demand a full forensic explanation and source-code provenance and remove/replace immediately until validated.

tpcti

0.0.2

Removed from pypi

Blocked by Socket

This file is an intentionally obfuscated dynamic loader/decoder. It embeds large encoded blobs and uses decoded names to call __import__, eval, and to update the module globals at runtime. It also enforces a Python-version gate. While I found no explicit network or shell calls in the visible fragment, the presence of dynamic import/eval and globals.update fed from decoded data is a strong indicator the module will reconstruct and execute hidden code at runtime. That pattern is high risk for supply-chain/malicious payload delivery. I recommend treating this package as suspicious: do not run it in production, and perform an isolated dynamic decode (in a safe instrumented sandbox) to fully reveal the payload before trusting it.

Live on pypi for 1 hour and 57 minutes before removal. Socket users were protected even while the package was live.

kohin-sdk

1.0.23

by sumiy_gorwadiya

Removed from npm

Blocked by Socket

The open-source dependency has several security risks and potential malicious activity, including reentrancy vulnerabilities and unprotected functions.

Live on npm for 1 hour and 26 minutes before removal. Socket users were protected even while the package was live.

fmt.core

2025.105.1

by Paulov / FMTDev

Live on nuget

Blocked by Socket

The codebase includes a high-risk DLL-injection capability (FrostbiteInjection) capable of injecting code into other processes using OpenProcess, VirtualAllocEx, WriteProcessMemory, GetProcAddress, and CreateRemoteThread. While asset-management utilities are legitimate for modding workflows, the injection surface constitutes a potential backdoor risk in a supply-chain context, particularly if exposed in public packages. Strong mitigations are recommended: disable or tightly gate injection features, ensure explicit user consent, apply strict access control and signing, and audit cryptographic material exposure. This warrants ongoing security oversight when distributing or integrating such code in external projects.

ironic-python-agent-builder

2.6.0

Live on pypi

Blocked by Socket

This script creates a privileged 'rescue' account with root-level access and configures passwordless sudo permissions, effectively functioning as a backdoor. It reads credentials from a configuration file and writes them into system files to grant unrestricted administrative rights. Such behavior allows full system compromise without requiring authentication. No external domains or IP addresses are referenced.

terminal-pkg-team3sp20

0.0.6

Live on pypi

Blocked by Socket

This module functions as a remote-control/backdoor-like client: it connects to a hardcoded remote IP, exfiltrates the local IP and all typed keys to that server, and accepts remote commands to control the terminal display and play audio. It also triggers reboot() on certain network errors or conditions. The lack of authentication/encryption and the hardcoded command-and-control address make this code highly suspicious and dangerous to run in production. Treat as a likely backdoor; remove or quarantine and investigate origin and intent.

alex_evil-test-package

1.0.0

by alex07pk

Removed from npm

Blocked by Socket

The code is suspicious because it collects system information and sends it to a potentially malicious remote server without explicit consent or legitimate purpose, indicating potential data theft.

Live on npm for 12 days and 5 hours before removal. Socket users were protected even while the package was live.

bigdl-orca

2.4.0b20231031

Live on pypi

Blocked by Socket

The code contains potential security risks such as hard-coded file paths, subprocess.Popen usage, and the handling of untrusted data through PyArrow Plasma. It is essential to review and address these security concerns before using this code in a production environment.

minesweepervariants

0.2.0

Live on pypi

Blocked by Socket

The code provides an exposed remote terminal-like service that executes an external batch file using arguments supplied by the connected client. This is a classic remote command execution surface with no input validation or authentication, enabling potentially dangerous commands to be run on the host. While there are safeguards for terminating processes and cleaning up, the core behavior is high-risk and could enable remote control, data exfiltration, or system compromise if misused or reachable by untrusted clients.

backdoormbti

0.1.0

Live on pypi

Blocked by Socket

This module implements a Hidden Patch Trojan attack pipeline: it constructs and applies additive and spatial triggers to images and performs ADMM-based optimization to embed a backdoor mask into model weights, persisting a trojaned model artifact. The fragment contains incomplete/buggy references but the overall logic is clearly for backdoor insertion. It poses a significant supply-chain and model-integrity threat: do not run this code or accept artifacts produced by it. Audit related modules and remove or isolate this functionality before using the codebase.

ddos

1.0.1

Live on pypi

Blocked by Socket

This setup.py prepares a Python package that explicitly declares DDoS functionality and exposes console commands that run DDos.__main__.main. While the file itself contains no attack implementation, it makes running the malicious code trivial. Treat the package as malicious/abusive; do not install or execute it and remove or block distribution in registries.

dhemrdhs92011

1.250730.10830

by ongtrieuhau861.001

Live on npm

Blocked by Socket

This file implements an unattended update mechanism that fetches and installs .tgz archives from unverified remote sources—both the npm registry (registry[.]npmjs[.]org) and a configurable Firebase-style database URL—by downloading, extracting them into the application directory and then restarting PM2-managed processes. Because there is no cryptographic signature or checksum validation beyond a simple version check, a compromised registry account or database endpoint could deliver arbitrary code to every host running this updater. Additionally, on startup the script gathers extensive system and package metadata—including public IP (via api[.]ipify[.]org), local IP addresses, hostname, OS/platform, Node.js version, CPU/memory statistics, load averages, working directory and package.json fields—and posts it to a configurable Discord webhook endpoint (discordapp[.]com). This behavior poses both a supply-chain risk and a telemetry/privacy exposure risk, as sensitive host information is sent to an external service without explicit user consent or granular control.

tx.bim

1.1.5.10

by TianTeng

Live on nuget

Blocked by Socket

This assembly contains benign-looking BIM model types at surface level but also includes a large, deliberately obfuscated runtime/unpacker component that reads encrypted embedded resources, decrypts/verifies them, allocates executable memory, writes code into process memory, swaps method pointers and invokes the payload. It performs platform-specific native memory operations (VirtualAlloc/mmap/mprotect), writes to /proc/self/mem on Linux, and calls OpenProcess/WriteProcessMemory — all strong indicators of dynamic code injection and self-modifying behavior. Even if this was produced by a legitimate protector/packer, such behavior violates typical supply-chain safety expectations for a public library because it hides runtime behavior, uses native memory patching, and can execute arbitrary embedded payloads. I recommend not using this package in production and treating it as high-risk until the authors provide verifiable source-to-binary build reproducibility and justification for the loader behavior.

examtool

2.1.9b80.dev2

Live on pypi

Blocked by Socket

This module purposefully enables command execution and remote downloads during LaTeX rendering. The transformation that replaces \includegraphics{http...} with a write18 wget call and the use of pdflatex --shell-escape are unsafe when any part of the LaTeX input (exam or subs) is or can be attacker-controlled. The code permits arbitrary command execution and network fetches with no sanitization or sandboxing — a high-risk behavior in a supply-chain context. Do not run this on untrusted input; if retained, restrict inputs strictly or remove the write18/wget mechanism and avoid --shell-escape. Use subprocess with sanitized args and sandboxing instead.

pv_ho3ein

1.0.1

by h0x3ein

Removed from npm

Blocked by Socket

The command 'calc' is not recognized as a standard command, which raises suspicion. It is recommended to investigate the purpose and source of this command before executing it.

Live on npm for 2 hours and 6 minutes before removal. Socket users were protected even while the package was live.

s3en

1.2.0

by 17b4a931

Removed from npm

Blocked by Socket

This code poses a serious security risk and should not be used.

Live on npm for 12 minutes before removal. Socket users were protected even while the package was live.

rrshare

4.2.2

Live on pypi

Blocked by Socket

The code unconditionally kills all running Streamlit processes and then attempts to start a Streamlit app from a user-specific path. This behavior can disrupt legitimate usage and execute potentially untrusted user code without validation. While it may be intended for self-restart or deployment, the lack of safety nets (validation, error handling, logging, and user prompts) represents a significant reliability and security risk that warrants safer alternatives (graceful shutdown, confirm prompts, path validation, and explicit permissions).

pinokiod

3.8.66

by cocktailpeanut

Live on npm

Blocked by Socket

The SweetAlert2 library code is mostly benign and serves as a UI modal dialog tool. However, it contains a suspicious and potentially malicious snippet that targets Russian users on certain domains to play an unsolicited audio prank, disabling pointer events and potentially disrupting user interaction. This behavior is unexpected and should be considered a moderate security risk and potential malware. The rest of the code shows no signs of malicious intent. The provided reports were invalid and unhelpful. Users should be cautious about this version of the library due to the embedded prank behavior.

mtmai

0.3.729

Live on pypi

Blocked by Socket

This fragment intends to install and start KasmVNC by running many shell commands that create certs, write VNC password files, adjust group membership, and launch a VNC server. The primary security issues are unsafe shell interpolation (command injection risk), programmatic persistence of a possibly predictable password, execution with sudo based on unvalidated env vars, starting a VNC server exposed on 0.0.0.0 with disabled/basic auth, and multiple unsafe filesystem operations performed via shell. There is no clear evidence of obfuscated or direct exfiltration malware, but the behavior can provide an unauthorized remote access vector (backdoor-like) if used maliciously. Do not run this code without fixing shell usage, validating inputs, using secure randomly generated passwords, enforcing proper file permissions, and not disabling authentication.

ailever

0.2.653

Live on pypi

Blocked by Socket

The code exhibits a dangerous remote code execution pattern: it downloads and immediately runs a remote Python payload without integrity checks, sandboxing, or input validation. This creates a severe supply-chain and runtime security risk. Recommended mitigations include removing dynamic downloads, validating payloads with cryptographic hashes or signatures, using safe subprocess invocations with argument lists, and implementing strict input sanitization. If remote functionality must remain, switch to a trusted-internal mechanism (e.g., plugin architecture with signed components, offline verification) and add robust error handling and logging.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Possible typosquat attack

Known malware

Telemetry

Unstable ownership

Git dependency

GitHub dependency

AI-detected potential malware

HTTP dependency

Obfuscated code

Suspicious Stars on GitHub

54 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Book a DemoRead the blog

Protect every package in your stack

Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.

View all integrations

RUST

crates.io

Rust Package Manager

PHP

Packagist

PHP Package Manager

GOLANG

Go Modules

Go Dependency Management

JAVA

Maven Central

JAVASCRIPT

npm

Node Package Manager

.NET

NuGet

.NET Package Manager

PYTHON

PyPI

Python Package Index

RUBY

RubyGems.org

Ruby Package Manager

SWIFT

Swift

AI

Hugging Face Hub

AI Model Hub

CI

GitHub Actions

CI/CD Workflows

EXTENSIONS

Chrome Web Store

Chrome Browser Extensions

EXTENSIONS

Open VSX

VS Code Extensions

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Nov 23, 2025

Shai Hulud v2

Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.

Nov 05, 2025

Elves on npm

A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.

Jul 04, 2025

RubyGems Automation-Tool Infostealer

Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.

Mar 13, 2025

North Korea's Contagious Interview Campaign

Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.

Jul 23, 2024

Network Reconnaissance Campaign

A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub AppBook a Demo

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles