
Security News
Axios Maintainer Confirms Social Engineering Attack Behind npm Compromise
Axios compromise traced to social engineering, showing how attacks on maintainers can bypass controls and expose the broader software supply chain.
Quickly evaluate the security and health of any open source package.
infiltra
2.6
Live on pypi
Blocked by Socket
The code fragment constitutes a malicious PoC exploit designed to leverage CVE-2023-20889 for command execution and information disclosure, including potential data exfiltration via an out-of-band channel. It employs obfuscated-like techniques (base64 payloads, eval) and uses an authenticated flow to reach the payload delivery stage. This demonstrates strong supply-chain risk if surfaced in open-source samples, emphasizing the need for patching and cautious review of example payloads.
arvin-rahnama/dcat-admin
dev-feature-custom-sidebar
Live on composer
Blocked by Socket
The code is mostly a UI/admin library bundle, but it contains at least one explicit malicious/abusive behavior: a locale-and-host-targeted block that injects and auto-plays an external audio file from https://flag-gimn.ru for Russian-language clients on certain TLDs, and temporarily disables pointer events. That behavior is targeted, unexpected, and qualifies as malicious/sabotage or propaganda injection. Additionally, there are multiple risky patterns (eval/new Function on potentially remote-provided strings, insertion of response HTML into the DOM) that expose the application to remote code execution / XSS if inputs or server responses are not fully trusted or are compromised. Recommendation: remove the targeted audio injection block immediately, audit and/or replace any eval-packed modules and avoid executing server-provided scripts via eval. Replace eval/new Function uses with safer alternatives, sanitize any HTML coming from network before inserting into the DOM, and review the origin of this package/version for supply-chain tampering.
dana
0.25.9.1.1
Live on pypi
Blocked by Socket
This module itself contains no obvious hidden backdoor or obfuscated malicious payload, but it intentionally executes external Python files found under multiple search paths (including user-writable locations like the current working directory and user home). That design introduces a high-risk supply-chain/plugin execution vector: untrusted plugin files named <domain>.py or package directories can run arbitrary code via exec_module and class instantiation. Recommend treating plugins from those paths as untrusted, restricting or validating plugin locations, using cryptographic signing or checksum verification, or executing plugins in an isolated process. Do not place sensitive credentials or run as privileged user when plugin discovery paths include writable directories.
meshcentral
0.7.10
by ysainthilaire
Live on npm
Blocked by Socket
This code implements a remote administration/tunneling agent with full remote shell and file system control. Functionality includes spawning shells, reading and writing arbitrary files, renaming/moving/deleting files (including recursive deletes), and opening network tunnels/upgrades to a controller URL. While this may be legitimate MeshAgent agent code, the features constitute high-risk capabilities if included as an unexpected dependency or executed without proper trust and authorization. Treat this module as potentially dangerous in a supply-chain context: it can be used for remote command execution and data access/exfiltration by whoever controls the MeshAgent controller.
mtmai
0.3.1469
Live on pypi
Blocked by Socket
This fragment intends to install and start KasmVNC by running many shell commands that create certs, write VNC password files, adjust group membership, and launch a VNC server. The primary security issues are unsafe shell interpolation (command injection risk), programmatic persistence of a possibly predictable password, execution with sudo based on unvalidated env vars, starting a VNC server exposed on 0.0.0.0 with disabled/basic auth, and multiple unsafe filesystem operations performed via shell. There is no clear evidence of obfuscated or direct exfiltration malware, but the behavior can provide an unauthorized remote access vector (backdoor-like) if used maliciously. Do not run this code without fixing shell usage, validating inputs, using secure randomly generated passwords, enforcing proper file permissions, and not disabling authentication.
consolelofy
1.3.0
by console17777
Removed from npm
Blocked by Socket
This module contains a concealed, encrypted JavaScript payload and the code to decrypt-and-execute it at runtime while exposing powerful host APIs (require, process, module, etc.) to the payload. That combination is a strong indicator of a backdoor or supply-chain malicious capability: the code is explicitly designed to hide behavior and execute it later, and the sandboxing is undermined by exporting host capabilities. Treat as malicious/untrusted and remove or fully audit the decrypted payload in an isolated environment before any execution.
Live on npm for 18 days, 5 hours and 12 minutes before removal. Socket users were protected even while the package was live.
sbcli-dev
6.3.1
Live on pypi
Blocked by Socket
No direct malware code is present in the fragment (no obvious backdoor, reverse shell, or exfiltration implemented in this file itself). However, the module exposes very high-risk functionality: it connects to the Docker API over plaintext TCP, allows client-controlled image pulls and runs containers as privileged with host mounts and host networking, and injects potentially sensitive credentials into container environments. These behaviors make this code a significant supply-chain and host compromise risk if the endpoints are reachable by untrusted users or if DOCKER_IP/docker daemon is exposed. Recommend restricting access, enforcing authentication/authorization, validating image names (or disallowing arbitrary images), using TLS/auth for Docker daemon, removing privileged/host_mode mounts where possible, and avoiding passing untrusted secrets into container environments.
ploy-ansible
2.0.0
Live on pypi
Blocked by Socket
This code implements a backdoor/remote access trojan that provides complete system access through arbitrary command execution, unrestricted file operations, and persistent remote control capabilities. The lack of security controls makes it extremely dangerous.
bluelamp-ai
0.45.4
Live on pypi
Blocked by Socket
This module uses packing/obfuscation (base64 + zlib) and executes the resulting code at import time via exec(). That pattern is high-risk because it conceals behavior and bypasses normal code review. Without decompressing the payload we cannot definitively label the package malicious, but the packaging pattern is suspicious and should be treated as untrusted. Perform safe, isolated decompression and full audit before using; do not run in production until verified.
duowen-agent
0.1.66
Live on pypi
Blocked by Socket
This module implements an interactive Python execution tool that runs arbitrary Python code via exec and captures stdout. There are no hardcoded malicious artifacts, but the design is inherently high-risk: untrusted input yields full remote code execution and data exfiltration capability. Additionally, a bug (typo 'outpu') causes a NameError on return, breaking intended behavior and potentially exposing stack traces. Treat this code as dangerous if reachable from untrusted contexts and apply sandboxing/isolation or remove runtime exec exposure.
arcverc
1.0.0
by arceus69
Removed from npm
Blocked by Socket
The code collects sensitive system and user information, including the user's home directory, hostname, username, DNS server configuration, and package details, and sends this data to an external server at uig2nlmp4f3xpwtwk3360tai99f03rrg[.]oastify[.]com via an HTTPS POST request without user consent. This behavior is indicative of malware, posing a significant security and privacy risk.
Live on npm for 1 hour and 26 minutes before removal. Socket users were protected even while the package was live.
azure-graphrbac
5.0.1
Removed from npm
Blocked by Socket
The code contains several red flags indicating potentially malicious behavior: sending sensitive system information (hostname, username, home directory) to a remote server, and reading and sending the contents of 'package.json'. This is highly indicative of data exfiltration.
Live on npm for 3 minutes before removal. Socket users were protected even while the package was live.
pkscreener
0.46.20250207.697
Live on pypi
Blocked by Socket
This module implements covert telemetry/exfiltration: it silently collects local username and IP-based location and uploads daily aggregated records to a hardcoded GitHub repository. That behavior is privacy-invasive and constitutes a supply-chain risk for consumers of the package. The implementation uses weak obfuscation (base64), brittle JSON handling, and swallows exceptions, increasing the likelihood of stealthy, unintended data leakage. Actionable advice: treat this as malicious/unwanted telemetry unless documented explicit opt-in exists; remove or disable the telemetry code, or require explicit user consent and secure the transport (authentication and encryption), and fix robust JSON/file handling and error reporting before use.
fca-deku-remake
31.40.15
by imdeku
Removed from npm
Blocked by Socket
The code demonstrates risky behaviors such as executing shell commands based on environment variables and global configurations without proper validation, automatic installation, and execution of packages from external sources, and potential for command injection. These behaviors can be exploited for malicious purposes, making the code potentially unsafe.
Live on npm for 2 minutes before removal. Socket users were protected even while the package was live.
354766/laurigates/claude-plugins/configure-reusable-workflows/
e389d5ea13c4f25a3e149ee9929d5be1974f0166
Live on socket
Blocked by Socket
[Skill Scanner] Natural language instruction to download and install from URL detected The approach is functional for adding Claude-powered checks via reusable workflows, but carries elevated security and supply-chain risks due to reliance on an external main-branch action and handling of a long-lived OAuth token. Recommend pinning external action versions, auditing claude-plugins, minimizing token exposure (avoid printing secrets, use masked logs), and applying least-privilege principals with clear token rotation and monitoring. Treat as MEDIUM-HIGH risk until mitigations are in place. LLM verification: The skill’s purpose is coherent with its described capabilities to bootstrap Claude-powered reusable workflows. However, notable risk indicators include dependency on external templates, handling of a sensitive OAuth token, and documentation that references acquiring credentials from an external provider and potentially downloading from URLs. This elevates security risk to a moderate-to-high level unless mitigations (trusted source verification, token scoping/pinning, secret rotation, and access
@emilgroup/billing-sdk
1.56.1
by cover42devs
Removed from npm
Blocked by Socket
This package will execute index.js automatically on install. That behavior is potentially dangerous because index.js can perform many malicious actions (data exfiltration, creating backdoors, modifying the system). You must inspect the contents of index.js (and other scripts in the package) before installing or running in an untrusted environment. If you cannot inspect the file, treat this as a high-risk package to install.
Live on npm for 1 hour and 49 minutes before removal. Socket users were protected even while the package was live.
daumu
89.3.5
by mtdev008742
Removed from npm
Blocked by Socket
The code collects and sends sensitive system information to potentially suspicious external domains without user consent, which is a significant security risk. The use of 'rejectUnauthorized: false' further exacerbates the risk by disabling SSL/TLS certificate validation.
Live on npm for 14 days, 22 hours and 48 minutes before removal. Socket users were protected even while the package was live.
kagsa
1.2.0
Live on pypi
Blocked by Socket
The file contains obfuscated utility code that implements a range of functionalities including web manipulation, keyboard input handling, mathematical operations, random number generation, encoding/decoding, JSON processing, HTTP communication, and system command execution. Notably, the code hooks keyboard events via methods that record keystrokes, which poses a risk of keylogging and data theft. It also includes methods to retrieve system information and execute system commands, which could be exploited to perform unauthorized operations. The HTTP request functionality is capable of sending data to external servers, and while no specific remote IP addresses or domain names are hardcoded, the design allows for dynamic assignment of endpoints (for example, URLs such as http://example[.]com could potentially be used). The intentionally obfuscated naming conventions further suggest an effort to hide malicious intent.
sbcli-dev
4.0.52
Live on pypi
Blocked by Socket
No direct malware code is present in the fragment (no obvious backdoor, reverse shell, or exfiltration implemented in this file itself). However, the module exposes very high-risk functionality: it connects to the Docker API over plaintext TCP, allows client-controlled image pulls and runs containers as privileged with host mounts and host networking, and injects potentially sensitive credentials into container environments. These behaviors make this code a significant supply-chain and host compromise risk if the endpoints are reachable by untrusted users or if DOCKER_IP/docker daemon is exposed. Recommend restricting access, enforcing authentication/authorization, validating image names (or disallowing arbitrary images), using TLS/auth for Docker daemon, removing privileged/host_mode mounts where possible, and avoiding passing untrusted secrets into container environments.
infiltra
2.6
Live on pypi
Blocked by Socket
The code fragment constitutes a malicious PoC exploit designed to leverage CVE-2023-20889 for command execution and information disclosure, including potential data exfiltration via an out-of-band channel. It employs obfuscated-like techniques (base64 payloads, eval) and uses an authenticated flow to reach the payload delivery stage. This demonstrates strong supply-chain risk if surfaced in open-source samples, emphasizing the need for patching and cautious review of example payloads.
arvin-rahnama/dcat-admin
dev-feature-custom-sidebar
Live on composer
Blocked by Socket
The code is mostly a UI/admin library bundle, but it contains at least one explicit malicious/abusive behavior: a locale-and-host-targeted block that injects and auto-plays an external audio file from https://flag-gimn.ru for Russian-language clients on certain TLDs, and temporarily disables pointer events. That behavior is targeted, unexpected, and qualifies as malicious/sabotage or propaganda injection. Additionally, there are multiple risky patterns (eval/new Function on potentially remote-provided strings, insertion of response HTML into the DOM) that expose the application to remote code execution / XSS if inputs or server responses are not fully trusted or are compromised. Recommendation: remove the targeted audio injection block immediately, audit and/or replace any eval-packed modules and avoid executing server-provided scripts via eval. Replace eval/new Function uses with safer alternatives, sanitize any HTML coming from network before inserting into the DOM, and review the origin of this package/version for supply-chain tampering.
dana
0.25.9.1.1
Live on pypi
Blocked by Socket
This module itself contains no obvious hidden backdoor or obfuscated malicious payload, but it intentionally executes external Python files found under multiple search paths (including user-writable locations like the current working directory and user home). That design introduces a high-risk supply-chain/plugin execution vector: untrusted plugin files named <domain>.py or package directories can run arbitrary code via exec_module and class instantiation. Recommend treating plugins from those paths as untrusted, restricting or validating plugin locations, using cryptographic signing or checksum verification, or executing plugins in an isolated process. Do not place sensitive credentials or run as privileged user when plugin discovery paths include writable directories.
meshcentral
0.7.10
by ysainthilaire
Live on npm
Blocked by Socket
This code implements a remote administration/tunneling agent with full remote shell and file system control. Functionality includes spawning shells, reading and writing arbitrary files, renaming/moving/deleting files (including recursive deletes), and opening network tunnels/upgrades to a controller URL. While this may be legitimate MeshAgent agent code, the features constitute high-risk capabilities if included as an unexpected dependency or executed without proper trust and authorization. Treat this module as potentially dangerous in a supply-chain context: it can be used for remote command execution and data access/exfiltration by whoever controls the MeshAgent controller.
mtmai
0.3.1469
Live on pypi
Blocked by Socket
This fragment intends to install and start KasmVNC by running many shell commands that create certs, write VNC password files, adjust group membership, and launch a VNC server. The primary security issues are unsafe shell interpolation (command injection risk), programmatic persistence of a possibly predictable password, execution with sudo based on unvalidated env vars, starting a VNC server exposed on 0.0.0.0 with disabled/basic auth, and multiple unsafe filesystem operations performed via shell. There is no clear evidence of obfuscated or direct exfiltration malware, but the behavior can provide an unauthorized remote access vector (backdoor-like) if used maliciously. Do not run this code without fixing shell usage, validating inputs, using secure randomly generated passwords, enforcing proper file permissions, and not disabling authentication.
consolelofy
1.3.0
by console17777
Removed from npm
Blocked by Socket
This module contains a concealed, encrypted JavaScript payload and the code to decrypt-and-execute it at runtime while exposing powerful host APIs (require, process, module, etc.) to the payload. That combination is a strong indicator of a backdoor or supply-chain malicious capability: the code is explicitly designed to hide behavior and execute it later, and the sandboxing is undermined by exporting host capabilities. Treat as malicious/untrusted and remove or fully audit the decrypted payload in an isolated environment before any execution.
Live on npm for 18 days, 5 hours and 12 minutes before removal. Socket users were protected even while the package was live.
sbcli-dev
6.3.1
Live on pypi
Blocked by Socket
No direct malware code is present in the fragment (no obvious backdoor, reverse shell, or exfiltration implemented in this file itself). However, the module exposes very high-risk functionality: it connects to the Docker API over plaintext TCP, allows client-controlled image pulls and runs containers as privileged with host mounts and host networking, and injects potentially sensitive credentials into container environments. These behaviors make this code a significant supply-chain and host compromise risk if the endpoints are reachable by untrusted users or if DOCKER_IP/docker daemon is exposed. Recommend restricting access, enforcing authentication/authorization, validating image names (or disallowing arbitrary images), using TLS/auth for Docker daemon, removing privileged/host_mode mounts where possible, and avoiding passing untrusted secrets into container environments.
ploy-ansible
2.0.0
Live on pypi
Blocked by Socket
This code implements a backdoor/remote access trojan that provides complete system access through arbitrary command execution, unrestricted file operations, and persistent remote control capabilities. The lack of security controls makes it extremely dangerous.
bluelamp-ai
0.45.4
Live on pypi
Blocked by Socket
This module uses packing/obfuscation (base64 + zlib) and executes the resulting code at import time via exec(). That pattern is high-risk because it conceals behavior and bypasses normal code review. Without decompressing the payload we cannot definitively label the package malicious, but the packaging pattern is suspicious and should be treated as untrusted. Perform safe, isolated decompression and full audit before using; do not run in production until verified.
duowen-agent
0.1.66
Live on pypi
Blocked by Socket
This module implements an interactive Python execution tool that runs arbitrary Python code via exec and captures stdout. There are no hardcoded malicious artifacts, but the design is inherently high-risk: untrusted input yields full remote code execution and data exfiltration capability. Additionally, a bug (typo 'outpu') causes a NameError on return, breaking intended behavior and potentially exposing stack traces. Treat this code as dangerous if reachable from untrusted contexts and apply sandboxing/isolation or remove runtime exec exposure.
arcverc
1.0.0
by arceus69
Removed from npm
Blocked by Socket
The code collects sensitive system and user information, including the user's home directory, hostname, username, DNS server configuration, and package details, and sends this data to an external server at uig2nlmp4f3xpwtwk3360tai99f03rrg[.]oastify[.]com via an HTTPS POST request without user consent. This behavior is indicative of malware, posing a significant security and privacy risk.
Live on npm for 1 hour and 26 minutes before removal. Socket users were protected even while the package was live.
azure-graphrbac
5.0.1
Removed from npm
Blocked by Socket
The code contains several red flags indicating potentially malicious behavior: sending sensitive system information (hostname, username, home directory) to a remote server, and reading and sending the contents of 'package.json'. This is highly indicative of data exfiltration.
Live on npm for 3 minutes before removal. Socket users were protected even while the package was live.
pkscreener
0.46.20250207.697
Live on pypi
Blocked by Socket
This module implements covert telemetry/exfiltration: it silently collects local username and IP-based location and uploads daily aggregated records to a hardcoded GitHub repository. That behavior is privacy-invasive and constitutes a supply-chain risk for consumers of the package. The implementation uses weak obfuscation (base64), brittle JSON handling, and swallows exceptions, increasing the likelihood of stealthy, unintended data leakage. Actionable advice: treat this as malicious/unwanted telemetry unless documented explicit opt-in exists; remove or disable the telemetry code, or require explicit user consent and secure the transport (authentication and encryption), and fix robust JSON/file handling and error reporting before use.
fca-deku-remake
31.40.15
by imdeku
Removed from npm
Blocked by Socket
The code demonstrates risky behaviors such as executing shell commands based on environment variables and global configurations without proper validation, automatic installation, and execution of packages from external sources, and potential for command injection. These behaviors can be exploited for malicious purposes, making the code potentially unsafe.
Live on npm for 2 minutes before removal. Socket users were protected even while the package was live.
354766/laurigates/claude-plugins/configure-reusable-workflows/
e389d5ea13c4f25a3e149ee9929d5be1974f0166
Live on socket
Blocked by Socket
[Skill Scanner] Natural language instruction to download and install from URL detected The approach is functional for adding Claude-powered checks via reusable workflows, but carries elevated security and supply-chain risks due to reliance on an external main-branch action and handling of a long-lived OAuth token. Recommend pinning external action versions, auditing claude-plugins, minimizing token exposure (avoid printing secrets, use masked logs), and applying least-privilege principals with clear token rotation and monitoring. Treat as MEDIUM-HIGH risk until mitigations are in place. LLM verification: The skill’s purpose is coherent with its described capabilities to bootstrap Claude-powered reusable workflows. However, notable risk indicators include dependency on external templates, handling of a sensitive OAuth token, and documentation that references acquiring credentials from an external provider and potentially downloading from URLs. This elevates security risk to a moderate-to-high level unless mitigations (trusted source verification, token scoping/pinning, secret rotation, and access
@emilgroup/billing-sdk
1.56.1
by cover42devs
Removed from npm
Blocked by Socket
This package will execute index.js automatically on install. That behavior is potentially dangerous because index.js can perform many malicious actions (data exfiltration, creating backdoors, modifying the system). You must inspect the contents of index.js (and other scripts in the package) before installing or running in an untrusted environment. If you cannot inspect the file, treat this as a high-risk package to install.
Live on npm for 1 hour and 49 minutes before removal. Socket users were protected even while the package was live.
daumu
89.3.5
by mtdev008742
Removed from npm
Blocked by Socket
The code collects and sends sensitive system information to potentially suspicious external domains without user consent, which is a significant security risk. The use of 'rejectUnauthorized: false' further exacerbates the risk by disabling SSL/TLS certificate validation.
Live on npm for 14 days, 22 hours and 48 minutes before removal. Socket users were protected even while the package was live.
kagsa
1.2.0
Live on pypi
Blocked by Socket
The file contains obfuscated utility code that implements a range of functionalities including web manipulation, keyboard input handling, mathematical operations, random number generation, encoding/decoding, JSON processing, HTTP communication, and system command execution. Notably, the code hooks keyboard events via methods that record keystrokes, which poses a risk of keylogging and data theft. It also includes methods to retrieve system information and execute system commands, which could be exploited to perform unauthorized operations. The HTTP request functionality is capable of sending data to external servers, and while no specific remote IP addresses or domain names are hardcoded, the design allows for dynamic assignment of endpoints (for example, URLs such as http://example[.]com could potentially be used). The intentionally obfuscated naming conventions further suggest an effort to hide malicious intent.
sbcli-dev
4.0.52
Live on pypi
Blocked by Socket
No direct malware code is present in the fragment (no obvious backdoor, reverse shell, or exfiltration implemented in this file itself). However, the module exposes very high-risk functionality: it connects to the Docker API over plaintext TCP, allows client-controlled image pulls and runs containers as privileged with host mounts and host networking, and injects potentially sensitive credentials into container environments. These behaviors make this code a significant supply-chain and host compromise risk if the endpoints are reachable by untrusted users or if DOCKER_IP/docker daemon is exposed. Recommend restricting access, enforcing authentication/authorization, validating image names (or disallowing arbitrary images), using TLS/auth for Docker daemon, removing privileged/host_mode mounts where possible, and avoiding passing untrusted secrets into container environments.
Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.
Possible typosquat attack
Known malware
Unstable ownership
Git dependency
GitHub dependency
AI-detected potential malware
HTTP dependency
Obfuscated code
Skill: Pre-execution shell command
Suspicious Stars on GitHub
Critical CVE
High CVE
Medium CVE
Low CVE
Unpopular package
Minified code
Bad dependency semver
Wildcard dependency
Socket optimized override available
Deprecated
Unmaintained
Explicitly Unlicensed Item
License Policy Violation
Misc. License Issues
Ambiguous License Classifier
Copyleft License
License exception
No License Found
Non-permissive License
Unidentified License
Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.
Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Nat Friedman
CEO at GitHub

Suz Hinton
Senior Software Engineer at Stripe
heck yes this is awesome!!! Congrats team 🎉👏

Matteo Collina
Node.js maintainer, Fastify lead maintainer
So awesome to see @SocketSecurity launch with a fresh approach! Excited to have supported the team from the early days.

DC Posch
Director of Technology at AppFolio, CTO at Dynasty
This is going to be super important, especially for crypto projects where a compromised dependency results in stolen user assets.

Luis Naranjo
Software Engineer at Microsoft
If software supply chain attacks through npm don't scare the shit out of you, you're not paying close enough attention.
@SocketSecurity sounds like an awesome product. I'll be using socket.dev instead of npmjs.org to browse npm packages going forward

Elena Nadolinski
Founder and CEO at Iron Fish
Huge congrats to @SocketSecurity! 🙌
Literally the only product that proactively detects signs of JS compromised packages.

Joe Previte
Engineering Team Lead at Coder
Congrats to @feross and the @SocketSecurity team on their seed funding! 🚀 It's been a big help for us at @CoderHQ and we appreciate what y'all are doing!

Josh Goldberg
Staff Developer at Codecademy
This is such a great idea & looks fantastic, congrats & good luck @feross + team!
The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Scott Roberts
CISO at UiPath
As a happy Socket customer, I've been impressed with how quickly they are adding value to the product, this move is a great step!

Yan Zhu
Head of Security at Brave, DEFCON, EFF, W3C
glad to hear some of the smartest people i know are working on (npm, etc.) supply chain security finally :). @SocketSecurity

Andrew Peterson
CEO and Co-Founder at Signal Sciences (acq. Fastly)
How do you track the validity of open source software libraries as they get updated? You're prob not. Check out @SocketSecurity and the updated tooling they launched.
Supply chain is a cluster in security as we all know and the tools from Socket are "duh" type tools to be implementing. Check them out and follow Feross Aboukhadijeh to see more updates coming from them in the future.

Zbyszek Tenerowicz
Senior Security Engineer at ConsenSys
socket.dev is getting more appealing by the hour

Devdatta Akhawe
Head of Security at Figma
The @SocketSecurity team is on fire! Amazing progress and I am exciting to see where they go next.

Sebastian Bensusan
Engineer Manager at Stripe
I find it surprising that we don't have _more_ supply chain attacks in software:
Imagine your airplane (the code running) was assembled (deployed) daily, with parts (dependencies) from internet strangers. How long until you get a bad part?
Excited for Socket to prevent this

Adam Baldwin
VP of Security at npm, Red Team at Auth0/Okta
Congrats to everyone at @SocketSecurity ❤️🤘🏻

Nico Waisman
CISO at Lyft
This is an area that I have personally been very focused on. As Nat Friedman said in the 2019 GitHub Universe keynote, Open Source won, and every time you add a new open source project you rely on someone else code and you rely on the people that build it.
This is both exciting and problematic. You are bringing real risk into your organization, and I'm excited to see progress in the industry from OpenSSF scorecards and package analyzers to the company that Feross Aboukhadijeh is building!
Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.
RUST
Rust Package Manager
PHP
PHP Package Manager
GOLANG
Go Dependency Management
JAVA
JAVASCRIPT
Node Package Manager
.NET
.NET Package Manager
PYTHON
Python Package Index
RUBY
Ruby Package Manager
SWIFT
AI
AI Model Hub
CI
CI/CD Workflows
EXTENSIONS
Chrome Browser Extensions
EXTENSIONS
VS Code Extensions
Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.
Nov 23, 2025
Shai Hulud v2
Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.
Nov 05, 2025
Elves on npm
A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.
Jul 04, 2025
RubyGems Automation-Tool Infostealer
Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.
Mar 13, 2025
North Korea's Contagious Interview Campaign
Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.
Jul 23, 2024
Network Reconnaissance Campaign
A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.
Get our latest security research, open source insights, and product updates.

Security News
Axios compromise traced to social engineering, showing how attacks on maintainers can bypass controls and expose the broader software supply chain.

Security News
Node.js has paused its bug bounty program after funding ended, removing payouts for vulnerability reports but keeping its security process unchanged.

Security News
The Axios compromise shows how time-dependent dependency resolution makes exposure harder to detect and contain.