Big News: Socket Selected for OpenAI's Cybersecurity Grant Program.Details
Socket
Book a DemoSign in
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery
t

timmywil published 4.0.0

left-pad
s

stevemao published 1.3.0

react
r

react-bot published 19.2.5

We protect you from vulnerable and malicious packages

netkiller-devops

0.7.11

Live on pypi

Blocked by Socket

This script is a legitimate-looking MySQL backup utility that dumps database schemas to files and pushes them to a git repository. It contains high-risk practices: plaintext hardcoded DB credentials and automated pushes of backups to a remote (git@192.168.30.5:...) which can lead to data exfiltration if the remote is not fully trusted. I find no clear signs of active malware (no reverse shell, no obfuscation, no code injection), but the script poses a moderate-to-high security risk due to credential exposure and potential unauthorized data disclosure.

stuphos

2.0.5

Live on pypi

Blocked by Socket

This module constructs configurable tracking endpoints and transmits local information (boot time, system name, secret key) to them. The most serious issue is that the remote response is forwarded unchanged into a privileged internal command-execution API (ExecuteTrustedCommandMessage) via callObjectMethod. That creates a clear remote-to-trusted-execution path — effectively a backdoor if the tracking endpoint or configuration is attacker-controlled. The presence of a hard-coded default secret key and lack of any response validation amplify the risk. Combined, these behaviors constitute a high security risk for supply-chain/backdoor exploitation. Additionally, the code as provided contains a syntax error in GetBootStartTime that would prevent execution; if corrected, the runtime risks described apply. Recommend removing or hardening the remote-response -> trusted-execution flow (e.g., signing, strict schema validation, authorization checks), removing hard-coded secrets, and avoiding automatic execution of remote-sourced messages.

@okx_ai/okx-trade-mcp

1.2.8-beta.1

by oker_steve

Live on npm

Blocked by Socket

This package will attempt to run scripts/postinstall.js during install. The build step copies that file from a parent directory (../../scripts/postinstall-notice.js) into the package scripts/ folder, and the package relies on a file: devDependency. Both facts increase supply-chain risk: the postinstall code executed during npm install may originate from outside the package registry and can run arbitrary Node code (data exfiltration, telemetry, shell command execution, etc.). You should inspect the exact contents of the referenced postinstall-notice.js and the file:../core package before trusting this package. Treat this as a high security risk until verified.

@vendasta/sales-orders

4.3.0

by vendasta

Live on npm

Blocked by Socket

The code largely represents a standard generated API client for document-related endpoints. The critical concern is the embedded obfuscated payload at the end of the file, which could enable remote code execution or data exfiltration if executed under certain conditions. This constitutes a significant supply-chain risk. Immediate actions: audit the build process, verify no post-build transformations reintroduce such payloads, scan for dynamic evaluation paths, and consider replacing or isolating the package until the payload can be reconciled or removed.

plotxy

1.0.7

Removed from pypi

Blocked by Socket

The code is a transformation tool that injects monkey patches into an ESLint Linter implementation. The main security concern is the dynamic require of a module path taken from an environment variable and the resulting embedding of that module's APIs into a patched linter file. That pattern allows arbitrary code (if the env var or module is untrusted) to run during both patch generation and later when the patched linter executes, to suppress lint findings, and to alter module resolution. The snippet itself is not obfuscated or directly malicious, but it creates a high-impact capability that must be tightly controlled: ensure the environment-variable path is only set to vetted code, audit the external module, or avoid in-place vendor modifications in favor of safer extension mechanisms.

Live on pypi for 20 hours and 45 minutes before removal. Socket users were protected even while the package was live.

xync-client

0.0.99

Live on pypi

Blocked by Socket

This code is malicious in intent: it automates fraudulent interaction with a banking website, contains hardcoded sensitive credentials, evades automation detection, prompts an operator to supply OTPs (social-engineering), performs money transfers, and persists session state to disk for reuse. It should be treated as a tool for account takeover and financial theft. Do not run it; remove any storage_state files and investigate systems where it executed. The snippet also contains syntax errors and is incomplete, but those do not mitigate the clearly malicious purpose.

bapy

0.2.238

Live on pypi

Blocked by Socket

Malicious bash initialization script that performs destructive filesystem operations on macOS systems. When the external helper script 'isuserdarwin.sh' returns true, the script silently executes 'sudo rm -rf' to delete critical user directories including ~/Applications, ~/Movies, ~/Music, ~/Pictures, ~/Public, and ~/Sites without user confirmation. It also removes the macOS sleepimage file at /private/var/vm/sleepimage. The script modifies SSH directory permissions using 'sudo chmod -R go-rw' which can break SSH access or expose credentials. All destructive operations have their output suppressed with '>/dev/null 2>&1' to hide failures and make the actions stealthy. The script uses eval to execute the output of /usr/bin/dircolors, creating a command injection risk if the binary is compromised. It depends on external scripts (paper.sh, isuserdarwin.sh, debug.sh) whose contents are unknown and could execute arbitrary code. The destructive operations are embedded within what appears to be routine shell configuration code, likely to disguise the malicious intent.

bapy

0.2.258

Live on pypi

Blocked by Socket

The script covertly ensures a background SSH local port-forward to a hard-coded external host as root, clearing any existing ssh on the same local port first. This pattern is consistent with establishing a covert access or exfiltration channel (notably to a MongoDB-like service on port 27017). It is high-risk: investigate origins of the script, the remote IP, root SSH keys and authorized_keys, and any processes or tools that use local:9999. If unexpected, remove and rotate credentials/keys and perform host compromise analysis.

hackingtools

3.0.0.46

Live on pypi

Blocked by Socket

The code demonstrates high-risk behavior typical of dropper/packer-like workflows: encrypted payloads embedded in stubs, base64-wrapped code executed at runtime, and optional packaging into executables. While there are syntax anomalies and incomplete branches that prevent immediate execution, the overall pattern is aligned with covert payload delivery or supply-chain risk. Thorough review of the complete, verified source is required before use; treat as dangerous and isolate until confirmed safe.

eslint-plugin-security-rules

0.6.5

by lasselupe33

Live on npm

Blocked by Socket

This file contains explicit, high-risk malicious behavior: it fetches data from a hard-coded external domain and injects that data into numerous execution and DOM sinks (script insertion, event handlers, innerHTML/document.write, eval/new Function, and navigation APIs). The combination of an external hard-coded domain and direct use in dynamic-execution and navigation APIs is consistent with code intended to execute attacker-supplied code and perform redirects/exfiltration. Do not include or run this code in production; treat as malicious.

lidapy

0.0.3

Removed from pypi

Blocked by Socket

This module contains a dangerous dynamic module-loading pattern: it searches broad filesystem locations for <module>.py and executes the first match without validation. While the code shown does not itself perform network exfiltration or contain obvious malicious payloads, the load_from_module design creates a substantial arbitrary code execution / supply-chain risk. Treat this as a high-security-risk pattern: lock down module search paths, validate or sign loaded modules, or avoid searching user/root-wide paths. The likelihood that this fragment is intentionally malicious is low (no obfuscation or payloads), but the vulnerability it introduces is severe and exploitable if an attacker can place or control files on disk.

Live on pypi for 2 hours and 8 minutes before removal. Socket users were protected even while the package was live.

int_pinterest_sfra

99.99.10

by ahmedlsaber42

Removed from npm

Blocked by Socket

This script uses 'wget' to collect and transmit environment variables and system details (e.g., username, user ID, group ID, hostname, shell, home directory, operating system, kernel version, architecture) to a remote host at 3imiu703wzi9xjg7v85om4b23t9kxalz[.]oastify[.]com without user consent, demonstrating malicious intent and posing a significant security risk.

Live on npm for 10 days and 14 hours before removal. Socket users were protected even while the package was live.

bbin

1.0.43

by j5pu

Live on npm

Blocked by Socket

This package intentionally executes global installs/removals and repository-changing commands during lifecycle hooks. That behavior is high risk: it can execute arbitrary code from third-party packages, alter the repository, and potentially run unknown commands like "npm-auth" which could capture credentials or exfiltrate data. Unless you fully trust the publisher and the packages listed, do not install this package. Review the content of the globally installed packages and the implementation of any referenced scripts before allowing installation.

bagbag

0.58.14

Removed from pypi

Blocked by Socket

The code presents significant privacy risks and potential for misuse in generating fake identities, which is indicative of malicious intent. The scraping of sensitive information from a third-party website without clear user consent is highly suspicious.

Live on pypi for 6 minutes before removal. Socket users were protected even while the package was live.

tensorflow-tensorboard

0.1.1

Live on pypi

Blocked by Socket

This code fragment is mostly benign utility code but contains a suspicious hidden 'easter egg' WSGI wrapper that decodes an embedded base64+zlib payload and serves it when a magic QUERY_STRING is present, and it adds an X-Powered-By header. That behavior constitutes a covert response path/backdoor-like functionality and is a supply-chain risk. The fragment as provided is syntactically/semantically broken in multiple places, suggesting it is incomplete or tampered with; however the presence of obfuscated embedded payload and a magic trigger is concerning. Recommend removing or auditing the easteregg functionality and verifying the package contents and provenance before use.

upstartportal

99.99.1

by realvivek07

Removed from npm

Blocked by Socket

This module exhibits strong indicators of malicious supply-chain activity: it harvests sensitive local secrets and configuration files, performs extensive host/network/process and environment discovery, attempts to collect cloud and Kubernetes credentials (AWS/GCP metadata and the Kubernetes service account token), and exfiltrates the gathered data to an external callback server. Exfiltration uses disabled TLS verification (rejectUnauthorized:false) and includes a plaintext HTTP fallback, further increasing the likelihood of successful data theft.

Live on npm for 1 day, 19 hours and 7 minutes before removal. Socket users were protected even while the package was live.

bluelamp-ai

1.0.1

Live on pypi

Blocked by Socket

High-risk loader: the module hides and executes an embedded payload via base64+zlib and exec(), preventing static review and granting the payload full interpreter privileges. Treat as potentially malicious — do not import in production or CI. Decode and audit the decompressed payload in an isolated, offline environment before permitting use. Implement containment (sandbox, offline VM) to inspect behavior and network I/O before trusting.

tastyigniter/ti-theme-orange

4.0.7

Live on composer

Blocked by Socket

This bundle contains genuine open-source UI libraries but has an unmistakable malicious/intrusive insertion inside the SweetAlert2 module: locale+host detection combined with a timed, persistent trigger that disables pointer events and injects & autoplays an audio file hosted on a third-party domain. This behavior is unrelated to the libraries' purpose and constitutes a backdoor/tainted-supply-chain compromise. Treat the package as compromised: do not deploy; obtain official, verified copies; inspect package provenance and lockfiles; and rotate/inspect any client state where this bundle ran.

claudetalk-bridge

2.1.0

by lambdasw

Live on npm

Blocked by Socket

Best-matching report: Report 3. This module is highly suspicious as a remote-controlled bridge: it connects to a hardcoded non-TLS WebSocket relay, accepts remote prompt text without authentication/authorization controls, spawns a local `claude` CLI using that untrusted text, and streams the model’s output back to the relay. The primary risks are privacy/data exfiltration and abuse of local model execution rather than classic malware primitives. Network egress should be restricted/monitored and the relay endpoint treated as a high-sensitivity indicator.

deskpro-notifications-service

69.2.22

by adityan_captain_rip

Removed from npm

Blocked by Socket

The script collects the user's current working directory and sends it to a remote server via DNS lookup, potentially leaking sensitive information.

Live on npm for 11 minutes before removal. Socket users were protected even while the package was live.

@sesamy/sesamy-js

1.117.0

by markusahlstrand

Live on npm

Blocked by Socket

Most of the module aligns with typical SPA OAuth/OIDC and DPoP-auth flows, including JWT validation, token exchange, and caching. The primary high-risk anomaly is the runtime decoding and execution of an embedded base64 JavaScript blob as a Web Worker. Because that worker can coordinate refresh/token retrieval while the module persists access/refresh tokens in browser storage and cookies, any malicious or tampered worker logic could plausibly steal or manipulate tokens. The fragment does not conclusively prove malware, but the worker injection/execution design is a significant supply-chain security red flag that should be independently verified (decode the embedded worker payload and audit its network/storage behavior).

354766/boshu2/agentops/crank/

0999705787a325638808a138a04840edf1c0c42d

Live on socket

Blocked by Socket

[Skill Scanner] Installation of third-party script detected The Crank orchestration blueprint represents a coherent, purpose-built solution for autonomous epic execution using swarm-based parallelism with dual tracking modes and governance hooks. It does not reveal malicious intent or backdoors; however, its power to autonomously modify state across multiple systems warrants strict access control, comprehensive logging, and fail-safes. Treat as BENIGN with SUSPICIOUS potential in untrusted environments until proper safeguards are verified. LLM verification: This skill matches its stated purpose but contains multiple high-risk operational behaviors: mandatory autonomous execution, ability to mutate issue trackers, and spawning of unspecified external worker backends that can run arbitrary code and perform network I/O. No obfuscated or explicitly malicious code was found in the fragment, but the design permits data leakage and unilateral destructive actions. Do not run this skill in production or on sensitive repositories without adding explicit safe

github.com/milvus-io/milvus

v0.10.3-0.20211013132033-59daccf67c95

Live on go

Blocked by Socket

This code implements an insecure, unauthenticated RPC mechanism that allows remote clients to cause arbitrary code execution and exfiltrate files/system information. Using pickle over an untrusted network and invoking methods by client-supplied names are severe supply-chain/backdoor risks. Do not deploy or reuse this code in production; it should be treated as a backdoor/untrusted remote-execution component unless wrapped with strong authentication, authorization, sandboxing, and safe serialization.

netkiller-devops

0.7.11

Live on pypi

Blocked by Socket

This script is a legitimate-looking MySQL backup utility that dumps database schemas to files and pushes them to a git repository. It contains high-risk practices: plaintext hardcoded DB credentials and automated pushes of backups to a remote (git@192.168.30.5:...) which can lead to data exfiltration if the remote is not fully trusted. I find no clear signs of active malware (no reverse shell, no obfuscation, no code injection), but the script poses a moderate-to-high security risk due to credential exposure and potential unauthorized data disclosure.

stuphos

2.0.5

Live on pypi

Blocked by Socket

This module constructs configurable tracking endpoints and transmits local information (boot time, system name, secret key) to them. The most serious issue is that the remote response is forwarded unchanged into a privileged internal command-execution API (ExecuteTrustedCommandMessage) via callObjectMethod. That creates a clear remote-to-trusted-execution path — effectively a backdoor if the tracking endpoint or configuration is attacker-controlled. The presence of a hard-coded default secret key and lack of any response validation amplify the risk. Combined, these behaviors constitute a high security risk for supply-chain/backdoor exploitation. Additionally, the code as provided contains a syntax error in GetBootStartTime that would prevent execution; if corrected, the runtime risks described apply. Recommend removing or hardening the remote-response -> trusted-execution flow (e.g., signing, strict schema validation, authorization checks), removing hard-coded secrets, and avoiding automatic execution of remote-sourced messages.

@okx_ai/okx-trade-mcp

1.2.8-beta.1

by oker_steve

Live on npm

Blocked by Socket

This package will attempt to run scripts/postinstall.js during install. The build step copies that file from a parent directory (../../scripts/postinstall-notice.js) into the package scripts/ folder, and the package relies on a file: devDependency. Both facts increase supply-chain risk: the postinstall code executed during npm install may originate from outside the package registry and can run arbitrary Node code (data exfiltration, telemetry, shell command execution, etc.). You should inspect the exact contents of the referenced postinstall-notice.js and the file:../core package before trusting this package. Treat this as a high security risk until verified.

@vendasta/sales-orders

4.3.0

by vendasta

Live on npm

Blocked by Socket

The code largely represents a standard generated API client for document-related endpoints. The critical concern is the embedded obfuscated payload at the end of the file, which could enable remote code execution or data exfiltration if executed under certain conditions. This constitutes a significant supply-chain risk. Immediate actions: audit the build process, verify no post-build transformations reintroduce such payloads, scan for dynamic evaluation paths, and consider replacing or isolating the package until the payload can be reconciled or removed.

plotxy

1.0.7

Removed from pypi

Blocked by Socket

The code is a transformation tool that injects monkey patches into an ESLint Linter implementation. The main security concern is the dynamic require of a module path taken from an environment variable and the resulting embedding of that module's APIs into a patched linter file. That pattern allows arbitrary code (if the env var or module is untrusted) to run during both patch generation and later when the patched linter executes, to suppress lint findings, and to alter module resolution. The snippet itself is not obfuscated or directly malicious, but it creates a high-impact capability that must be tightly controlled: ensure the environment-variable path is only set to vetted code, audit the external module, or avoid in-place vendor modifications in favor of safer extension mechanisms.

Live on pypi for 20 hours and 45 minutes before removal. Socket users were protected even while the package was live.

xync-client

0.0.99

Live on pypi

Blocked by Socket

This code is malicious in intent: it automates fraudulent interaction with a banking website, contains hardcoded sensitive credentials, evades automation detection, prompts an operator to supply OTPs (social-engineering), performs money transfers, and persists session state to disk for reuse. It should be treated as a tool for account takeover and financial theft. Do not run it; remove any storage_state files and investigate systems where it executed. The snippet also contains syntax errors and is incomplete, but those do not mitigate the clearly malicious purpose.

bapy

0.2.238

Live on pypi

Blocked by Socket

Malicious bash initialization script that performs destructive filesystem operations on macOS systems. When the external helper script 'isuserdarwin.sh' returns true, the script silently executes 'sudo rm -rf' to delete critical user directories including ~/Applications, ~/Movies, ~/Music, ~/Pictures, ~/Public, and ~/Sites without user confirmation. It also removes the macOS sleepimage file at /private/var/vm/sleepimage. The script modifies SSH directory permissions using 'sudo chmod -R go-rw' which can break SSH access or expose credentials. All destructive operations have their output suppressed with '>/dev/null 2>&1' to hide failures and make the actions stealthy. The script uses eval to execute the output of /usr/bin/dircolors, creating a command injection risk if the binary is compromised. It depends on external scripts (paper.sh, isuserdarwin.sh, debug.sh) whose contents are unknown and could execute arbitrary code. The destructive operations are embedded within what appears to be routine shell configuration code, likely to disguise the malicious intent.

bapy

0.2.258

Live on pypi

Blocked by Socket

The script covertly ensures a background SSH local port-forward to a hard-coded external host as root, clearing any existing ssh on the same local port first. This pattern is consistent with establishing a covert access or exfiltration channel (notably to a MongoDB-like service on port 27017). It is high-risk: investigate origins of the script, the remote IP, root SSH keys and authorized_keys, and any processes or tools that use local:9999. If unexpected, remove and rotate credentials/keys and perform host compromise analysis.

hackingtools

3.0.0.46

Live on pypi

Blocked by Socket

The code demonstrates high-risk behavior typical of dropper/packer-like workflows: encrypted payloads embedded in stubs, base64-wrapped code executed at runtime, and optional packaging into executables. While there are syntax anomalies and incomplete branches that prevent immediate execution, the overall pattern is aligned with covert payload delivery or supply-chain risk. Thorough review of the complete, verified source is required before use; treat as dangerous and isolate until confirmed safe.

eslint-plugin-security-rules

0.6.5

by lasselupe33

Live on npm

Blocked by Socket

This file contains explicit, high-risk malicious behavior: it fetches data from a hard-coded external domain and injects that data into numerous execution and DOM sinks (script insertion, event handlers, innerHTML/document.write, eval/new Function, and navigation APIs). The combination of an external hard-coded domain and direct use in dynamic-execution and navigation APIs is consistent with code intended to execute attacker-supplied code and perform redirects/exfiltration. Do not include or run this code in production; treat as malicious.

lidapy

0.0.3

Removed from pypi

Blocked by Socket

This module contains a dangerous dynamic module-loading pattern: it searches broad filesystem locations for <module>.py and executes the first match without validation. While the code shown does not itself perform network exfiltration or contain obvious malicious payloads, the load_from_module design creates a substantial arbitrary code execution / supply-chain risk. Treat this as a high-security-risk pattern: lock down module search paths, validate or sign loaded modules, or avoid searching user/root-wide paths. The likelihood that this fragment is intentionally malicious is low (no obfuscation or payloads), but the vulnerability it introduces is severe and exploitable if an attacker can place or control files on disk.

Live on pypi for 2 hours and 8 minutes before removal. Socket users were protected even while the package was live.

int_pinterest_sfra

99.99.10

by ahmedlsaber42

Removed from npm

Blocked by Socket

This script uses 'wget' to collect and transmit environment variables and system details (e.g., username, user ID, group ID, hostname, shell, home directory, operating system, kernel version, architecture) to a remote host at 3imiu703wzi9xjg7v85om4b23t9kxalz[.]oastify[.]com without user consent, demonstrating malicious intent and posing a significant security risk.

Live on npm for 10 days and 14 hours before removal. Socket users were protected even while the package was live.

bbin

1.0.43

by j5pu

Live on npm

Blocked by Socket

This package intentionally executes global installs/removals and repository-changing commands during lifecycle hooks. That behavior is high risk: it can execute arbitrary code from third-party packages, alter the repository, and potentially run unknown commands like "npm-auth" which could capture credentials or exfiltrate data. Unless you fully trust the publisher and the packages listed, do not install this package. Review the content of the globally installed packages and the implementation of any referenced scripts before allowing installation.

bagbag

0.58.14

Removed from pypi

Blocked by Socket

The code presents significant privacy risks and potential for misuse in generating fake identities, which is indicative of malicious intent. The scraping of sensitive information from a third-party website without clear user consent is highly suspicious.

Live on pypi for 6 minutes before removal. Socket users were protected even while the package was live.

tensorflow-tensorboard

0.1.1

Live on pypi

Blocked by Socket

This code fragment is mostly benign utility code but contains a suspicious hidden 'easter egg' WSGI wrapper that decodes an embedded base64+zlib payload and serves it when a magic QUERY_STRING is present, and it adds an X-Powered-By header. That behavior constitutes a covert response path/backdoor-like functionality and is a supply-chain risk. The fragment as provided is syntactically/semantically broken in multiple places, suggesting it is incomplete or tampered with; however the presence of obfuscated embedded payload and a magic trigger is concerning. Recommend removing or auditing the easteregg functionality and verifying the package contents and provenance before use.

upstartportal

99.99.1

by realvivek07

Removed from npm

Blocked by Socket

This module exhibits strong indicators of malicious supply-chain activity: it harvests sensitive local secrets and configuration files, performs extensive host/network/process and environment discovery, attempts to collect cloud and Kubernetes credentials (AWS/GCP metadata and the Kubernetes service account token), and exfiltrates the gathered data to an external callback server. Exfiltration uses disabled TLS verification (rejectUnauthorized:false) and includes a plaintext HTTP fallback, further increasing the likelihood of successful data theft.

Live on npm for 1 day, 19 hours and 7 minutes before removal. Socket users were protected even while the package was live.

bluelamp-ai

1.0.1

Live on pypi

Blocked by Socket

High-risk loader: the module hides and executes an embedded payload via base64+zlib and exec(), preventing static review and granting the payload full interpreter privileges. Treat as potentially malicious — do not import in production or CI. Decode and audit the decompressed payload in an isolated, offline environment before permitting use. Implement containment (sandbox, offline VM) to inspect behavior and network I/O before trusting.

tastyigniter/ti-theme-orange

4.0.7

Live on composer

Blocked by Socket

This bundle contains genuine open-source UI libraries but has an unmistakable malicious/intrusive insertion inside the SweetAlert2 module: locale+host detection combined with a timed, persistent trigger that disables pointer events and injects & autoplays an audio file hosted on a third-party domain. This behavior is unrelated to the libraries' purpose and constitutes a backdoor/tainted-supply-chain compromise. Treat the package as compromised: do not deploy; obtain official, verified copies; inspect package provenance and lockfiles; and rotate/inspect any client state where this bundle ran.

claudetalk-bridge

2.1.0

by lambdasw

Live on npm

Blocked by Socket

Best-matching report: Report 3. This module is highly suspicious as a remote-controlled bridge: it connects to a hardcoded non-TLS WebSocket relay, accepts remote prompt text without authentication/authorization controls, spawns a local `claude` CLI using that untrusted text, and streams the model’s output back to the relay. The primary risks are privacy/data exfiltration and abuse of local model execution rather than classic malware primitives. Network egress should be restricted/monitored and the relay endpoint treated as a high-sensitivity indicator.

deskpro-notifications-service

69.2.22

by adityan_captain_rip

Removed from npm

Blocked by Socket

The script collects the user's current working directory and sends it to a remote server via DNS lookup, potentially leaking sensitive information.

Live on npm for 11 minutes before removal. Socket users were protected even while the package was live.

@sesamy/sesamy-js

1.117.0

by markusahlstrand

Live on npm

Blocked by Socket

Most of the module aligns with typical SPA OAuth/OIDC and DPoP-auth flows, including JWT validation, token exchange, and caching. The primary high-risk anomaly is the runtime decoding and execution of an embedded base64 JavaScript blob as a Web Worker. Because that worker can coordinate refresh/token retrieval while the module persists access/refresh tokens in browser storage and cookies, any malicious or tampered worker logic could plausibly steal or manipulate tokens. The fragment does not conclusively prove malware, but the worker injection/execution design is a significant supply-chain security red flag that should be independently verified (decode the embedded worker payload and audit its network/storage behavior).

354766/boshu2/agentops/crank/

0999705787a325638808a138a04840edf1c0c42d

Live on socket

Blocked by Socket

[Skill Scanner] Installation of third-party script detected The Crank orchestration blueprint represents a coherent, purpose-built solution for autonomous epic execution using swarm-based parallelism with dual tracking modes and governance hooks. It does not reveal malicious intent or backdoors; however, its power to autonomously modify state across multiple systems warrants strict access control, comprehensive logging, and fail-safes. Treat as BENIGN with SUSPICIOUS potential in untrusted environments until proper safeguards are verified. LLM verification: This skill matches its stated purpose but contains multiple high-risk operational behaviors: mandatory autonomous execution, ability to mutate issue trackers, and spawning of unspecified external worker backends that can run arbitrary code and perform network I/O. No obfuscated or explicitly malicious code was found in the fragment, but the design permits data leakage and unilateral destructive actions. Do not run this skill in production or on sensitive repositories without adding explicit safe

github.com/milvus-io/milvus

v0.10.3-0.20211013132033-59daccf67c95

Live on go

Blocked by Socket

This code implements an insecure, unauthenticated RPC mechanism that allows remote clients to cause arbitrary code execution and exfiltrate files/system information. Using pickle over an untrusted network and invoking methods by client-supplied names are severe supply-chain/backdoor risks. Do not deploy or reuse this code in production; it should be treated as a backdoor/untrusted remote-execution component unless wrapped with strong authentication, authorization, sandboxing, and safe serialization.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Possible typosquat attack

Known malware

Unstable ownership

Git dependency

GitHub dependency

AI-detected potential malware

HTTP dependency

Obfuscated code

Suspicious Stars on GitHub

Telemetry

55 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Book a Demo

Questions? Call us at (844) SOCKET-0

Read the blog

Protect every package in your stack

Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.

View all integrations

RUST

crates.io

Rust Package Manager

PHP

Packagist

PHP Package Manager

GOLANG

Go Modules

Go Dependency Management

JAVA

Maven Central

JAVASCRIPT

npm

Node Package Manager

.NET

NuGet

.NET Package Manager

PYTHON

PyPI

Python Package Index

RUBY

RubyGems.org

Ruby Package Manager

SWIFT

Swift

AI

Hugging Face Hub

AI Model Hub

CI

GitHub Actions

CI/CD Workflows

EXTENSIONS

Chrome Web Store

Chrome Browser Extensions

EXTENSIONS

Open VSX

VS Code Extensions

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Nov 23, 2025

Shai Hulud v2

Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.

Nov 05, 2025

Elves on npm

A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.

Jul 04, 2025

RubyGems Automation-Tool Infostealer

Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.

Mar 13, 2025

North Korea's Contagious Interview Campaign

Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.

Jul 23, 2024

Network Reconnaissance Campaign

A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles