New Research: Supply Chain Attack on Axios Pulls Malicious Dependency from npm.Details
Socket
Book a DemoSign in
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery
t

timmywil published 4.0.0

left-pad
s

stevemao published 1.3.0

react
r

react-bot published 19.2.5

We protect you from vulnerable and malicious packages

resul-angularsdk-rr

0.0.12

by resulticks

Removed from npm

Blocked by Socket

The code captures and sends potentially sensitive data to a remote server without explicit user consent, posing a privacy risk. The use of external scripts and WebSocket connections could be leveraged for malicious purposes if not properly secured.

Live on npm for 6 minutes before removal. Socket users were protected even while the package was live.

fca-saxal-remake

31.40.11

by mdsagormunshi

Removed from npm

Blocked by Socket

The code demonstrates risky behaviors such as executing shell commands based on environment variables and global configurations without proper validation, automatic installation, and execution of packages from external sources, and potential for command injection. These behaviors can be exploited for malicious purposes, making the code potentially unsafe.

Live on npm for 4 hours and 11 minutes before removal. Socket users were protected even while the package was live.

github.com/sourcegraph/sourcegraph

v0.0.0-20201217145758-bffd5eb2dea4

Live on go

Blocked by Socket

This module is a deliberate destructive utility that corrupts all .zip files in a specified directory by truncating each archive to half its size and appending repeated junk data. While it lacks common malware features like networking or data exfiltration, the behavior is strongly indicative of sabotage and would be unacceptable in most software supply-chain contexts due to its potential to break builds, deployments, or artifact integrity.

katalyst.portal.sharedui

1.1.0

by Katalyst PH

Live on nuget

Blocked by Socket

The analyzed source code is primarily a legitimate implementation of the SweetAlert2 modal popup library. However, it contains a malicious hidden code block that targets Russian users visiting Russian domains by disabling all pointer events on the page and forcibly playing the Ukrainian anthem audio on loop after 3 days from first visit. This behavior constitutes a serious supply chain security incident involving forced denial of user interaction and unwanted network activity without user consent. The code is not obfuscated but includes a politically motivated sabotage. Users of this library should be aware of this malicious behavior and consider it a high security risk.

patientenapp

3.4.1563

Removed from npm

Blocked by Socket

The code collects and sends potentially sensitive system information to a remote server without user consent. This behavior is indicative of malicious intent and poses a significant security risk.

Live on npm for 24 minutes before removal. Socket users were protected even while the package was live.

bluelamp-ai

1.0.1

Live on pypi

Blocked by Socket

This module intentionally conceals its real behavior by decompressing and executing an embedded payload at import-time. That pattern is highly suspicious and dangerous: it enables arbitrary actions (including data theft, networking, persistence) without any static visibility. Do not execute or import this module in any privileged or production environment until the embedded payload has been safely extracted and audited. Treat as high security risk; if unable to audit, remove or block the package from use.

animesync

0.11.5

by deathspike

Live on npm

Blocked by Socket

The code implements a module loader hijack that can redirect requires to local copies of dependencies or the package itself. While not inherently malicious, this pattern creates a significant supply chain risk: it enables shadowing or tampering with dependencies at runtime, which can be exploited to load malicious or unintended code. It should be treated as a potential backdoor mechanism and removed or strictly controlled with integrity checks and whitelisting if used. The approach resembles a stealthy dependency override and warrants careful review and removal if not explicitly required and secured.

akenoai

1.6.2

Live on pypi

Blocked by Socket

This module intentionally transmits API keys (either a hardcoded default decoded from base64 or any user-provided key) to an external, non-OpenAI endpoint via HTTP POST. This is credential exfiltration and constitutes malicious or severely insecure supply-chain behavior. Do not use this code. Remove it, rotate any exposed API keys, block the destination domain, and investigate any use of the embedded key.

deps-labsound-raub

0.2.0

by raub

Live on npm

Blocked by Socket

The code fragment demonstrates high-risk dynamic command execution and a destructive cleanup operation driven by an external module with obfuscated templating. This pattern is perilous for a public or distributed package and should be prevented or strictly validated (e.g., remove dynamic requires, replace with explicit, audited cleanup steps, lock dependencies, and implement safeguards to prevent arbitrary deletions). Treat as a high-security risk pending verification of the external module and environment safeguards.

github.com/weaveworks/weave

v1.8.1-0.20161111161452-702d12d80196

Live on go

Blocked by Socket

This module is a high-risk runtime packer/dropper: it embeds an encrypted payload, decrypts it using a user-supplied passphrase, writes the result to `bin/do-setup-circleci-secrets`, and immediately executes it. Because there is no integrity/authenticity validation of the decrypted artifact and the executed code is not shown here, the module should be treated as potentially malicious until the decrypted `bin/do-setup-circleci-secrets` content is inspected and validated in a safe environment.

pegin-address-verificator

20.9.9

by hackthematrix

Removed from npm

Blocked by Socket

The source code is a clear implementation of a reverse shell backdoor, enabling remote attackers to execute arbitrary commands on the host system. It poses a critical security risk and is highly likely to be malicious. Immediate removal and incident response are strongly recommended.

Live on npm for 1 hour and 7 minutes before removal. Socket users were protected even while the package was live.

azure-graphrbac

2.1.8

Removed from npm

Blocked by Socket

Possible typosquat of [azure](https://socket.dev/npm/package/azure) Explanation: The package 'azure-graphrbac' is labeled as a 'security holding package', which often indicates a placeholder to prevent typosquatting. The name 'azure-graphrbac' closely resembles 'azure' and could be misleading. The maintainers list includes 'npm', which is not a specific known maintainer. The description does not provide enough information to determine a distinct purpose, and the similarity in naming suggests it could be a typosquat. azure-graphrbac is a security-holding package

Live on npm for 3 hours before removal. Socket users were protected even while the package was live.

carbonorm/carbonphp

14.0.4

Live on composer

Blocked by Socket

The dominant security concern is the explicit use of eval on data-derived JSON within CarbonPHP.handlebars, which can enable arbitrary code execution if data is attacker-controlled. Additional concerns include unsanitized dynamic script/template loading and a busy-wait sleep that can degrade performance and potentially expose timing information. Overall risk is high due to the eval pattern and dynamic content loading without strong sanitization.

dtx

0.16.0

Removed from pypi

Blocked by Socket

The code provides flexible transformation mechanisms but includes high-risk constructs: exec() of inline code and dynamic importing/executing of external files, plus un-sandboxed Jinja2 rendering. These features enable arbitrary code execution if transform_request or referenced files are attacker-controlled, presenting a significant supply-chain/runtime code execution risk. The module is not itself demonstrably malicious, but its design makes it dangerous in hostile contexts and should be hardened or avoided unless inputs are fully trusted and validated.

Live on pypi for 4 hours and 31 minutes before removal. Socket users were protected even while the package was live.

exp10it

2.6.54

Live on pypi

Blocked by Socket

This file is offensive/exploit tooling: it performs automated reconnaissance, crafts and sends SQLi and PHP eval payloads against Joomla sites, extracts credentials/session data, and attempts to install a PHP webshell for persistence. Those behaviors constitute malicious activity (unauthorized access, credential theft, backdoor installation). Treat this code as malicious/exploitative; do not include it in trusted dependencies or run it on networks you do not own/authorize. The snippet contains some syntactic errors suggesting a truncated copy, but intent and many operational parts are explicit.

routerxpl

0.6.2

Live on pypi

Blocked by Socket

This module is clearly structured as part of an exploitation framework for Xiaomi router stock firmware and contains strong malicious intent indicators (explicit RCE exploit claims in metadata, conditional probe/trigger HTTP requests, and wildcard import that likely hides the true payload logic). In the shown code, only vulnerability probing and response printing are visible; the actual RCE trigger (e.g., command injection or malicious archive upload) is not present in the fragment provided. Treat as high security risk and review the full package/framework code to confirm the RCE payload implementation.

visitor-ui-component-library

1.9.0

Removed from npm

Blocked by Socket

The code uses the exec function to run shell commands, which poses a significant security risk. It could potentially execute malicious code if the input to exec is manipulated. Redirecting output to /dev/null to hide execution details is suspicious.

Live on npm for 28 minutes before removal. Socket users were protected even while the package was live.

airbnb-location-suggester

7.8.0

by jpdhackerone06

Removed from npm

Blocked by Socket

This package runs an arbitrary local JavaScript file during installation. That is a high-risk pattern because index.js can execute untrusted code with the installer's privileges (including telemetry, data exfiltration, reverse shells, filesystem modification, or other malicious actions). You must inspect the contents of index.js (and any files it loads) before installing, or avoid installing this package. If you must install, do so in an isolated, network-restricted environment or container and audit network activity.

Live on npm for 1 day, 1 hour and 49 minutes before removal. Socket users were protected even while the package was live.

cl-lite

1.0.1225

by michael_tian

Live on npm

Blocked by Socket

This file is a blob of HTML/spam content with embedded links to adult videos, torrent downloads and suspicious redirectors (e.g. https://2023[.]redircdn[.]com/?…, http://rmdown[.]com/link[.]php?hash=…, http://data[.]down2048[.]com/list[.]php?…), plus numerous third-party image URLs. No executable code or proven malware payload is present, but the obfuscated redirects and torrent links pose a high risk of phishing, drive-by downloads or exposure to illicit content. Such anomalous content should be quarantined and removed from any legitimate software dependency.

lib.harmony.net

1.3.3

by Andreas Pardeike

Live on nuget

Blocked by Socket

This assembly contains a malicious module initializer that automatically launches PowerShell to download a .bat from a remote GitHub raw URL and execute it hidden when the assembly loads. That behavior results in unauthorised remote code execution on any host that loads this assembly and is a clear supply-chain/backdoor compromise. Treat this package as malicious/compromised and do not use it. Replace with a clean, verified release from the official source and investigate any systems that used this build.

agentdojo

0.1.15

Live on pypi

Blocked by Socket

The analyzed fragment exhibits clear prompt-injection and data-exfiltration behavior aimed at extracting internal channel data (including a secret key) and posting it to an external website. This constitutes a high-risk supply-chain threat (data leakage via external exfiltration) and should be treated as malicious or dangerously insecure for inclusion in any package. Immediate remediation is required to remove exfiltration flows, hardcoded secrets, and prompt-injection payloads; audit and restrict channel access and external network calls in the package.

rootxqa

2.0.1

by excuea

Live on npm

Blocked by Socket

This module is a high-risk browser reconnaissance collector: it harvests cookies (including cookie values), localStorage/sessionStorage, IndexedDB metadata, Cache Storage URLs/entries metadata, service worker registrations, permission states, and background-sync related information, then packages everything into a single structured payload. It also performs a DOM-derived fetch and stores the response content in the same payload. While outbound network upload is not shown in this fragment, the behavior is strongly consistent with spyware/fingerprinting intended for later processing or exfiltration by surrounding code.

ailever

1.0.66

Live on pypi

Blocked by Socket

The code presents a strong supply-chain and remote-execution risk by automatically downloading and executing remote Python payloads without integrity checks or sandboxing. It also creates and runs external services (Jupyter, Visdom, RStudio) based on user inputs, which can amplify impact if the remote payload is malicious. Mitigations include removing remote code execution paths, adding cryptographic verification (signatures or hash checks), isolating execution (sandboxes or containerization), validating inputs, and avoiding untrusted downloads or executions.

hiphp

0.2.27

Live on pypi

Blocked by Socket

The module is an offensive/backdoor client: it constructs an obfuscated PHP backdoor that checks a secret User-Agent and evals POSTed commands, and it provides functions to execute arbitrary PHP remotely, upload (plant) files, and download (exfiltrate) files. Tor support and obfuscation indicate attempts at stealth/anonymity. This package should be considered dangerous and malicious in most contexts; it must not be used against systems without explicit authorization and should be treated as a high security risk.

resul-angularsdk-rr

0.0.12

by resulticks

Removed from npm

Blocked by Socket

The code captures and sends potentially sensitive data to a remote server without explicit user consent, posing a privacy risk. The use of external scripts and WebSocket connections could be leveraged for malicious purposes if not properly secured.

Live on npm for 6 minutes before removal. Socket users were protected even while the package was live.

fca-saxal-remake

31.40.11

by mdsagormunshi

Removed from npm

Blocked by Socket

The code demonstrates risky behaviors such as executing shell commands based on environment variables and global configurations without proper validation, automatic installation, and execution of packages from external sources, and potential for command injection. These behaviors can be exploited for malicious purposes, making the code potentially unsafe.

Live on npm for 4 hours and 11 minutes before removal. Socket users were protected even while the package was live.

github.com/sourcegraph/sourcegraph

v0.0.0-20201217145758-bffd5eb2dea4

Live on go

Blocked by Socket

This module is a deliberate destructive utility that corrupts all .zip files in a specified directory by truncating each archive to half its size and appending repeated junk data. While it lacks common malware features like networking or data exfiltration, the behavior is strongly indicative of sabotage and would be unacceptable in most software supply-chain contexts due to its potential to break builds, deployments, or artifact integrity.

katalyst.portal.sharedui

1.1.0

by Katalyst PH

Live on nuget

Blocked by Socket

The analyzed source code is primarily a legitimate implementation of the SweetAlert2 modal popup library. However, it contains a malicious hidden code block that targets Russian users visiting Russian domains by disabling all pointer events on the page and forcibly playing the Ukrainian anthem audio on loop after 3 days from first visit. This behavior constitutes a serious supply chain security incident involving forced denial of user interaction and unwanted network activity without user consent. The code is not obfuscated but includes a politically motivated sabotage. Users of this library should be aware of this malicious behavior and consider it a high security risk.

patientenapp

3.4.1563

Removed from npm

Blocked by Socket

The code collects and sends potentially sensitive system information to a remote server without user consent. This behavior is indicative of malicious intent and poses a significant security risk.

Live on npm for 24 minutes before removal. Socket users were protected even while the package was live.

bluelamp-ai

1.0.1

Live on pypi

Blocked by Socket

This module intentionally conceals its real behavior by decompressing and executing an embedded payload at import-time. That pattern is highly suspicious and dangerous: it enables arbitrary actions (including data theft, networking, persistence) without any static visibility. Do not execute or import this module in any privileged or production environment until the embedded payload has been safely extracted and audited. Treat as high security risk; if unable to audit, remove or block the package from use.

animesync

0.11.5

by deathspike

Live on npm

Blocked by Socket

The code implements a module loader hijack that can redirect requires to local copies of dependencies or the package itself. While not inherently malicious, this pattern creates a significant supply chain risk: it enables shadowing or tampering with dependencies at runtime, which can be exploited to load malicious or unintended code. It should be treated as a potential backdoor mechanism and removed or strictly controlled with integrity checks and whitelisting if used. The approach resembles a stealthy dependency override and warrants careful review and removal if not explicitly required and secured.

akenoai

1.6.2

Live on pypi

Blocked by Socket

This module intentionally transmits API keys (either a hardcoded default decoded from base64 or any user-provided key) to an external, non-OpenAI endpoint via HTTP POST. This is credential exfiltration and constitutes malicious or severely insecure supply-chain behavior. Do not use this code. Remove it, rotate any exposed API keys, block the destination domain, and investigate any use of the embedded key.

deps-labsound-raub

0.2.0

by raub

Live on npm

Blocked by Socket

The code fragment demonstrates high-risk dynamic command execution and a destructive cleanup operation driven by an external module with obfuscated templating. This pattern is perilous for a public or distributed package and should be prevented or strictly validated (e.g., remove dynamic requires, replace with explicit, audited cleanup steps, lock dependencies, and implement safeguards to prevent arbitrary deletions). Treat as a high-security risk pending verification of the external module and environment safeguards.

github.com/weaveworks/weave

v1.8.1-0.20161111161452-702d12d80196

Live on go

Blocked by Socket

This module is a high-risk runtime packer/dropper: it embeds an encrypted payload, decrypts it using a user-supplied passphrase, writes the result to `bin/do-setup-circleci-secrets`, and immediately executes it. Because there is no integrity/authenticity validation of the decrypted artifact and the executed code is not shown here, the module should be treated as potentially malicious until the decrypted `bin/do-setup-circleci-secrets` content is inspected and validated in a safe environment.

pegin-address-verificator

20.9.9

by hackthematrix

Removed from npm

Blocked by Socket

The source code is a clear implementation of a reverse shell backdoor, enabling remote attackers to execute arbitrary commands on the host system. It poses a critical security risk and is highly likely to be malicious. Immediate removal and incident response are strongly recommended.

Live on npm for 1 hour and 7 minutes before removal. Socket users were protected even while the package was live.

azure-graphrbac

2.1.8

Removed from npm

Blocked by Socket

Possible typosquat of [azure](https://socket.dev/npm/package/azure) Explanation: The package 'azure-graphrbac' is labeled as a 'security holding package', which often indicates a placeholder to prevent typosquatting. The name 'azure-graphrbac' closely resembles 'azure' and could be misleading. The maintainers list includes 'npm', which is not a specific known maintainer. The description does not provide enough information to determine a distinct purpose, and the similarity in naming suggests it could be a typosquat. azure-graphrbac is a security-holding package

Live on npm for 3 hours before removal. Socket users were protected even while the package was live.

carbonorm/carbonphp

14.0.4

Live on composer

Blocked by Socket

The dominant security concern is the explicit use of eval on data-derived JSON within CarbonPHP.handlebars, which can enable arbitrary code execution if data is attacker-controlled. Additional concerns include unsanitized dynamic script/template loading and a busy-wait sleep that can degrade performance and potentially expose timing information. Overall risk is high due to the eval pattern and dynamic content loading without strong sanitization.

dtx

0.16.0

Removed from pypi

Blocked by Socket

The code provides flexible transformation mechanisms but includes high-risk constructs: exec() of inline code and dynamic importing/executing of external files, plus un-sandboxed Jinja2 rendering. These features enable arbitrary code execution if transform_request or referenced files are attacker-controlled, presenting a significant supply-chain/runtime code execution risk. The module is not itself demonstrably malicious, but its design makes it dangerous in hostile contexts and should be hardened or avoided unless inputs are fully trusted and validated.

Live on pypi for 4 hours and 31 minutes before removal. Socket users were protected even while the package was live.

exp10it

2.6.54

Live on pypi

Blocked by Socket

This file is offensive/exploit tooling: it performs automated reconnaissance, crafts and sends SQLi and PHP eval payloads against Joomla sites, extracts credentials/session data, and attempts to install a PHP webshell for persistence. Those behaviors constitute malicious activity (unauthorized access, credential theft, backdoor installation). Treat this code as malicious/exploitative; do not include it in trusted dependencies or run it on networks you do not own/authorize. The snippet contains some syntactic errors suggesting a truncated copy, but intent and many operational parts are explicit.

routerxpl

0.6.2

Live on pypi

Blocked by Socket

This module is clearly structured as part of an exploitation framework for Xiaomi router stock firmware and contains strong malicious intent indicators (explicit RCE exploit claims in metadata, conditional probe/trigger HTTP requests, and wildcard import that likely hides the true payload logic). In the shown code, only vulnerability probing and response printing are visible; the actual RCE trigger (e.g., command injection or malicious archive upload) is not present in the fragment provided. Treat as high security risk and review the full package/framework code to confirm the RCE payload implementation.

visitor-ui-component-library

1.9.0

Removed from npm

Blocked by Socket

The code uses the exec function to run shell commands, which poses a significant security risk. It could potentially execute malicious code if the input to exec is manipulated. Redirecting output to /dev/null to hide execution details is suspicious.

Live on npm for 28 minutes before removal. Socket users were protected even while the package was live.

airbnb-location-suggester

7.8.0

by jpdhackerone06

Removed from npm

Blocked by Socket

This package runs an arbitrary local JavaScript file during installation. That is a high-risk pattern because index.js can execute untrusted code with the installer's privileges (including telemetry, data exfiltration, reverse shells, filesystem modification, or other malicious actions). You must inspect the contents of index.js (and any files it loads) before installing, or avoid installing this package. If you must install, do so in an isolated, network-restricted environment or container and audit network activity.

Live on npm for 1 day, 1 hour and 49 minutes before removal. Socket users were protected even while the package was live.

cl-lite

1.0.1225

by michael_tian

Live on npm

Blocked by Socket

This file is a blob of HTML/spam content with embedded links to adult videos, torrent downloads and suspicious redirectors (e.g. https://2023[.]redircdn[.]com/?…, http://rmdown[.]com/link[.]php?hash=…, http://data[.]down2048[.]com/list[.]php?…), plus numerous third-party image URLs. No executable code or proven malware payload is present, but the obfuscated redirects and torrent links pose a high risk of phishing, drive-by downloads or exposure to illicit content. Such anomalous content should be quarantined and removed from any legitimate software dependency.

lib.harmony.net

1.3.3

by Andreas Pardeike

Live on nuget

Blocked by Socket

This assembly contains a malicious module initializer that automatically launches PowerShell to download a .bat from a remote GitHub raw URL and execute it hidden when the assembly loads. That behavior results in unauthorised remote code execution on any host that loads this assembly and is a clear supply-chain/backdoor compromise. Treat this package as malicious/compromised and do not use it. Replace with a clean, verified release from the official source and investigate any systems that used this build.

agentdojo

0.1.15

Live on pypi

Blocked by Socket

The analyzed fragment exhibits clear prompt-injection and data-exfiltration behavior aimed at extracting internal channel data (including a secret key) and posting it to an external website. This constitutes a high-risk supply-chain threat (data leakage via external exfiltration) and should be treated as malicious or dangerously insecure for inclusion in any package. Immediate remediation is required to remove exfiltration flows, hardcoded secrets, and prompt-injection payloads; audit and restrict channel access and external network calls in the package.

rootxqa

2.0.1

by excuea

Live on npm

Blocked by Socket

This module is a high-risk browser reconnaissance collector: it harvests cookies (including cookie values), localStorage/sessionStorage, IndexedDB metadata, Cache Storage URLs/entries metadata, service worker registrations, permission states, and background-sync related information, then packages everything into a single structured payload. It also performs a DOM-derived fetch and stores the response content in the same payload. While outbound network upload is not shown in this fragment, the behavior is strongly consistent with spyware/fingerprinting intended for later processing or exfiltration by surrounding code.

ailever

1.0.66

Live on pypi

Blocked by Socket

The code presents a strong supply-chain and remote-execution risk by automatically downloading and executing remote Python payloads without integrity checks or sandboxing. It also creates and runs external services (Jupyter, Visdom, RStudio) based on user inputs, which can amplify impact if the remote payload is malicious. Mitigations include removing remote code execution paths, adding cryptographic verification (signatures or hash checks), isolating execution (sandboxes or containerization), validating inputs, and avoiding untrusted downloads or executions.

hiphp

0.2.27

Live on pypi

Blocked by Socket

The module is an offensive/backdoor client: it constructs an obfuscated PHP backdoor that checks a secret User-Agent and evals POSTed commands, and it provides functions to execute arbitrary PHP remotely, upload (plant) files, and download (exfiltrate) files. Tor support and obfuscation indicate attempts at stealth/anonymity. This package should be considered dangerous and malicious in most contexts; it must not be used against systems without explicit authorization and should be treated as a high security risk.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Possible typosquat attack

Known malware

Unstable ownership

Git dependency

GitHub dependency

AI-detected potential malware

HTTP dependency

Obfuscated code

Suspicious Stars on GitHub

Telemetry

55 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Book a Demo

Questions? Call us at (844) SOCKET-0

Read the blog

Protect every package in your stack

Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.

View all integrations

RUST

crates.io

Rust Package Manager

PHP

Packagist

PHP Package Manager

GOLANG

Go Modules

Go Dependency Management

JAVA

Maven Central

JAVASCRIPT

npm

Node Package Manager

.NET

NuGet

.NET Package Manager

PYTHON

PyPI

Python Package Index

RUBY

RubyGems.org

Ruby Package Manager

SWIFT

Swift

AI

Hugging Face Hub

AI Model Hub

CI

GitHub Actions

CI/CD Workflows

EXTENSIONS

Chrome Web Store

Chrome Browser Extensions

EXTENSIONS

Open VSX

VS Code Extensions

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Nov 23, 2025

Shai Hulud v2

Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.

Nov 05, 2025

Elves on npm

A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.

Jul 04, 2025

RubyGems Automation-Tool Infostealer

Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.

Mar 13, 2025

North Korea's Contagious Interview Campaign

Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.

Jul 23, 2024

Network Reconnaissance Campaign

A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles