
Security News
TeamPCP Is Systematically Targeting Security Tools Across the OSS Ecosystem
TeamPCP is targeting security tools across the OSS ecosystem, turning scanners and CI pipelines into infostealers to access enterprise secrets.
Quickly evaluate the security and health of any open source package.
richpartners-telegram-sdk
1.0.20
by vutisch
Live on npm
Blocked by Socket
This module extracts a stored TON wallet address and a caller-supplied Telegram ID and transmits them to two hardcoded remote endpoints. Although it uses AES-GCM, the encryption key is an empty hard-coded string in this code path, yielding predictable/weak key material that provides effectively no confidentiality. The behavior is stealthy (local flag to limit retransmission), lacks user consent or authentication, and contacts third-party domains—characteristics consistent with covert data exfiltration or a privacy-invasive backdoor. Treat this code as malicious or highly privacy-invasive: block the endpoints, remove or isolate the package, and investigate related modules and network activity.
tdstone
0.2.7
Live on pypi
Blocked by Socket
The code exhibits a high-risk dynamic execution sink (exec on base64-decoded sto_code from input) that enables arbitrary code execution within the process. This poses severe security and supply-chain risks, including potential backdoors, data exfiltration, and tampering of model data. While there are legitimate-looking data handling and serialization paths (pickle/ONNX), they are contingent on untrusted payloads and are not safeguarded by validation or sandboxing. Treat as dangerous and implement strict input validation, sandboxing, or removal of the exec-based payload path.
mtmai
0.4.200
Live on pypi
Blocked by Socket
This module is an automation/scraping worker that intentionally executes code provided by task descriptions. That design requires trusting the task source. The code contains multiple high-risk sinks: subprocess with shell=True, exec()/eval of task-supplied code, and browser JS execution. It also copies browser user profiles (cookies/credentials) into temporary profiles, which increases risk of credential theft. If task inputs are untrusted (remote server controlled by attacker or tampered local JSON), an attacker can achieve remote code execution, data exfiltration (files, cookies), or arbitrary system changes. Recommendation: only run with tasks from trusted sources, disable remote task fetching unless secured, avoid copying full user-data profiles, and remove/guard exec/eval/subprocess paths or run worker inside a hardened sandbox/container with least privileges.
akenoai
1.6.1
Live on pypi
Blocked by Socket
This module intentionally transmits API keys (either a hardcoded default decoded from base64 or any user-provided key) to an external, non-OpenAI endpoint via HTTP POST. This is credential exfiltration and constitutes malicious or severely insecure supply-chain behavior. Do not use this code. Remove it, rotate any exposed API keys, block the destination domain, and investigate any use of the embedded key.
zscams
2.0.35
Live on pypi
Blocked by Socket
This module programmatically installs SSH host and user public keys by appending entries to known_hosts and authorized_keys. The behavior is consistent with installing a persistent backdoor: it grants SSH access, uses a hardcoded actor identifier ('zscams@orangecyberdefense'), lacks validation/authorization, and suppresses exceptions to remain stealthy. Treat this code as high-risk; remove or isolate it, audit call sites and append_to_file implementation, and assume compromise if found in a dependency.
upwest.bundle
1.9.17
by Angelo Santos, Ângelo Santos
Live on nuget
Blocked by Socket
This assembly contains a heavily obfuscated runtime loader that reads embedded resources, performs decryption/verification, allocates/writes native memory, manipulates function pointers and executes code in-process. Those behaviors are classic indicators of a loader/backdoor or packer and present a high supply-chain and runtime compromise risk. The Razor view components are likely a cover for the embedded loader; static constructors call the obfuscated loader, meaning inclusion of the assembly will trigger this behavior. I recommend treating this package as malicious/untrusted and removing it from production and further investigating any runtime activity and artifacts. If this is claimed to be legitimate, demand a full forensic explanation and source-code provenance and remove/replace immediately until validated.
tpcti
0.0.2
Removed from pypi
Blocked by Socket
This file is an intentionally obfuscated dynamic loader/decoder. It embeds large encoded blobs and uses decoded names to call __import__, eval, and to update the module globals at runtime. It also enforces a Python-version gate. While I found no explicit network or shell calls in the visible fragment, the presence of dynamic import/eval and globals.update fed from decoded data is a strong indicator the module will reconstruct and execute hidden code at runtime. That pattern is high risk for supply-chain/malicious payload delivery. I recommend treating this package as suspicious: do not run it in production, and perform an isolated dynamic decode (in a safe instrumented sandbox) to fully reveal the payload before trusting it.
Live on pypi for 1 hour and 57 minutes before removal. Socket users were protected even while the package was live.
kohin-sdk
1.0.23
by sumiy_gorwadiya
Removed from npm
Blocked by Socket
The open-source dependency has several security risks and potential malicious activity, including reentrancy vulnerabilities and unprotected functions.
Live on npm for 1 hour and 26 minutes before removal. Socket users were protected even while the package was live.
fmt.core
2025.105.1
by Paulov / FMTDev
Live on nuget
Blocked by Socket
The codebase includes a high-risk DLL-injection capability (FrostbiteInjection) capable of injecting code into other processes using OpenProcess, VirtualAllocEx, WriteProcessMemory, GetProcAddress, and CreateRemoteThread. While asset-management utilities are legitimate for modding workflows, the injection surface constitutes a potential backdoor risk in a supply-chain context, particularly if exposed in public packages. Strong mitigations are recommended: disable or tightly gate injection features, ensure explicit user consent, apply strict access control and signing, and audit cryptographic material exposure. This warrants ongoing security oversight when distributing or integrating such code in external projects.
ironic-python-agent-builder
2.6.0
Live on pypi
Blocked by Socket
This script creates a privileged 'rescue' account with root-level access and configures passwordless sudo permissions, effectively functioning as a backdoor. It reads credentials from a configuration file and writes them into system files to grant unrestricted administrative rights. Such behavior allows full system compromise without requiring authentication. No external domains or IP addresses are referenced.
terminal-pkg-team3sp20
0.0.6
Live on pypi
Blocked by Socket
This module functions as a remote-control/backdoor-like client: it connects to a hardcoded remote IP, exfiltrates the local IP and all typed keys to that server, and accepts remote commands to control the terminal display and play audio. It also triggers reboot() on certain network errors or conditions. The lack of authentication/encryption and the hardcoded command-and-control address make this code highly suspicious and dangerous to run in production. Treat as a likely backdoor; remove or quarantine and investigate origin and intent.
alex_evil-test-package
1.0.0
by alex07pk
Removed from npm
Blocked by Socket
The code is suspicious because it collects system information and sends it to a potentially malicious remote server without explicit consent or legitimate purpose, indicating potential data theft.
Live on npm for 12 days and 5 hours before removal. Socket users were protected even while the package was live.
bigdl-orca
2.4.0b20231031
Live on pypi
Blocked by Socket
The code contains potential security risks such as hard-coded file paths, subprocess.Popen usage, and the handling of untrusted data through PyArrow Plasma. It is essential to review and address these security concerns before using this code in a production environment.
minesweepervariants
0.2.0
Live on pypi
Blocked by Socket
The code provides an exposed remote terminal-like service that executes an external batch file using arguments supplied by the connected client. This is a classic remote command execution surface with no input validation or authentication, enabling potentially dangerous commands to be run on the host. While there are safeguards for terminating processes and cleaning up, the core behavior is high-risk and could enable remote control, data exfiltration, or system compromise if misused or reachable by untrusted clients.
backdoormbti
0.1.0
Live on pypi
Blocked by Socket
This module implements a Hidden Patch Trojan attack pipeline: it constructs and applies additive and spatial triggers to images and performs ADMM-based optimization to embed a backdoor mask into model weights, persisting a trojaned model artifact. The fragment contains incomplete/buggy references but the overall logic is clearly for backdoor insertion. It poses a significant supply-chain and model-integrity threat: do not run this code or accept artifacts produced by it. Audit related modules and remove or isolate this functionality before using the codebase.
ddos
1.0.1
Live on pypi
Blocked by Socket
This setup.py prepares a Python package that explicitly declares DDoS functionality and exposes console commands that run DDos.__main__.main. While the file itself contains no attack implementation, it makes running the malicious code trivial. Treat the package as malicious/abusive; do not install or execute it and remove or block distribution in registries.
dhemrdhs92011
1.250730.10830
by ongtrieuhau861.001
Live on npm
Blocked by Socket
This file implements an unattended update mechanism that fetches and installs .tgz archives from unverified remote sources—both the npm registry (registry[.]npmjs[.]org) and a configurable Firebase-style database URL—by downloading, extracting them into the application directory and then restarting PM2-managed processes. Because there is no cryptographic signature or checksum validation beyond a simple version check, a compromised registry account or database endpoint could deliver arbitrary code to every host running this updater. Additionally, on startup the script gathers extensive system and package metadata—including public IP (via api[.]ipify[.]org), local IP addresses, hostname, OS/platform, Node.js version, CPU/memory statistics, load averages, working directory and package.json fields—and posts it to a configurable Discord webhook endpoint (discordapp[.]com). This behavior poses both a supply-chain risk and a telemetry/privacy exposure risk, as sensitive host information is sent to an external service without explicit user consent or granular control.
tx.bim
1.1.5.10
by TianTeng
Live on nuget
Blocked by Socket
This assembly contains benign-looking BIM model types at surface level but also includes a large, deliberately obfuscated runtime/unpacker component that reads encrypted embedded resources, decrypts/verifies them, allocates executable memory, writes code into process memory, swaps method pointers and invokes the payload. It performs platform-specific native memory operations (VirtualAlloc/mmap/mprotect), writes to /proc/self/mem on Linux, and calls OpenProcess/WriteProcessMemory — all strong indicators of dynamic code injection and self-modifying behavior. Even if this was produced by a legitimate protector/packer, such behavior violates typical supply-chain safety expectations for a public library because it hides runtime behavior, uses native memory patching, and can execute arbitrary embedded payloads. I recommend not using this package in production and treating it as high-risk until the authors provide verifiable source-to-binary build reproducibility and justification for the loader behavior.
examtool
2.1.9b80.dev2
Live on pypi
Blocked by Socket
This module purposefully enables command execution and remote downloads during LaTeX rendering. The transformation that replaces \includegraphics{http...} with a write18 wget call and the use of pdflatex --shell-escape are unsafe when any part of the LaTeX input (exam or subs) is or can be attacker-controlled. The code permits arbitrary command execution and network fetches with no sanitization or sandboxing — a high-risk behavior in a supply-chain context. Do not run this on untrusted input; if retained, restrict inputs strictly or remove the write18/wget mechanism and avoid --shell-escape. Use subprocess with sanitized args and sandboxing instead.
pv_ho3ein
1.0.1
by h0x3ein
Removed from npm
Blocked by Socket
The command 'calc' is not recognized as a standard command, which raises suspicion. It is recommended to investigate the purpose and source of this command before executing it.
Live on npm for 2 hours and 6 minutes before removal. Socket users were protected even while the package was live.
s3en
1.2.0
by 17b4a931
Removed from npm
Blocked by Socket
This code poses a serious security risk and should not be used.
Live on npm for 12 minutes before removal. Socket users were protected even while the package was live.
rrshare
4.2.2
Live on pypi
Blocked by Socket
The code unconditionally kills all running Streamlit processes and then attempts to start a Streamlit app from a user-specific path. This behavior can disrupt legitimate usage and execute potentially untrusted user code without validation. While it may be intended for self-restart or deployment, the lack of safety nets (validation, error handling, logging, and user prompts) represents a significant reliability and security risk that warrants safer alternatives (graceful shutdown, confirm prompts, path validation, and explicit permissions).
pinokiod
3.8.66
by cocktailpeanut
Live on npm
Blocked by Socket
The SweetAlert2 library code is mostly benign and serves as a UI modal dialog tool. However, it contains a suspicious and potentially malicious snippet that targets Russian users on certain domains to play an unsolicited audio prank, disabling pointer events and potentially disrupting user interaction. This behavior is unexpected and should be considered a moderate security risk and potential malware. The rest of the code shows no signs of malicious intent. The provided reports were invalid and unhelpful. Users should be cautious about this version of the library due to the embedded prank behavior.
mtmai
0.3.729
Live on pypi
Blocked by Socket
This fragment intends to install and start KasmVNC by running many shell commands that create certs, write VNC password files, adjust group membership, and launch a VNC server. The primary security issues are unsafe shell interpolation (command injection risk), programmatic persistence of a possibly predictable password, execution with sudo based on unvalidated env vars, starting a VNC server exposed on 0.0.0.0 with disabled/basic auth, and multiple unsafe filesystem operations performed via shell. There is no clear evidence of obfuscated or direct exfiltration malware, but the behavior can provide an unauthorized remote access vector (backdoor-like) if used maliciously. Do not run this code without fixing shell usage, validating inputs, using secure randomly generated passwords, enforcing proper file permissions, and not disabling authentication.
ailever
0.2.653
Live on pypi
Blocked by Socket
The code exhibits a dangerous remote code execution pattern: it downloads and immediately runs a remote Python payload without integrity checks, sandboxing, or input validation. This creates a severe supply-chain and runtime security risk. Recommended mitigations include removing dynamic downloads, validating payloads with cryptographic hashes or signatures, using safe subprocess invocations with argument lists, and implementing strict input sanitization. If remote functionality must remain, switch to a trusted-internal mechanism (e.g., plugin architecture with signed components, offline verification) and add robust error handling and logging.
richpartners-telegram-sdk
1.0.20
by vutisch
Live on npm
Blocked by Socket
This module extracts a stored TON wallet address and a caller-supplied Telegram ID and transmits them to two hardcoded remote endpoints. Although it uses AES-GCM, the encryption key is an empty hard-coded string in this code path, yielding predictable/weak key material that provides effectively no confidentiality. The behavior is stealthy (local flag to limit retransmission), lacks user consent or authentication, and contacts third-party domains—characteristics consistent with covert data exfiltration or a privacy-invasive backdoor. Treat this code as malicious or highly privacy-invasive: block the endpoints, remove or isolate the package, and investigate related modules and network activity.
tdstone
0.2.7
Live on pypi
Blocked by Socket
The code exhibits a high-risk dynamic execution sink (exec on base64-decoded sto_code from input) that enables arbitrary code execution within the process. This poses severe security and supply-chain risks, including potential backdoors, data exfiltration, and tampering of model data. While there are legitimate-looking data handling and serialization paths (pickle/ONNX), they are contingent on untrusted payloads and are not safeguarded by validation or sandboxing. Treat as dangerous and implement strict input validation, sandboxing, or removal of the exec-based payload path.
mtmai
0.4.200
Live on pypi
Blocked by Socket
This module is an automation/scraping worker that intentionally executes code provided by task descriptions. That design requires trusting the task source. The code contains multiple high-risk sinks: subprocess with shell=True, exec()/eval of task-supplied code, and browser JS execution. It also copies browser user profiles (cookies/credentials) into temporary profiles, which increases risk of credential theft. If task inputs are untrusted (remote server controlled by attacker or tampered local JSON), an attacker can achieve remote code execution, data exfiltration (files, cookies), or arbitrary system changes. Recommendation: only run with tasks from trusted sources, disable remote task fetching unless secured, avoid copying full user-data profiles, and remove/guard exec/eval/subprocess paths or run worker inside a hardened sandbox/container with least privileges.
akenoai
1.6.1
Live on pypi
Blocked by Socket
This module intentionally transmits API keys (either a hardcoded default decoded from base64 or any user-provided key) to an external, non-OpenAI endpoint via HTTP POST. This is credential exfiltration and constitutes malicious or severely insecure supply-chain behavior. Do not use this code. Remove it, rotate any exposed API keys, block the destination domain, and investigate any use of the embedded key.
zscams
2.0.35
Live on pypi
Blocked by Socket
This module programmatically installs SSH host and user public keys by appending entries to known_hosts and authorized_keys. The behavior is consistent with installing a persistent backdoor: it grants SSH access, uses a hardcoded actor identifier ('zscams@orangecyberdefense'), lacks validation/authorization, and suppresses exceptions to remain stealthy. Treat this code as high-risk; remove or isolate it, audit call sites and append_to_file implementation, and assume compromise if found in a dependency.
upwest.bundle
1.9.17
by Angelo Santos, Ângelo Santos
Live on nuget
Blocked by Socket
This assembly contains a heavily obfuscated runtime loader that reads embedded resources, performs decryption/verification, allocates/writes native memory, manipulates function pointers and executes code in-process. Those behaviors are classic indicators of a loader/backdoor or packer and present a high supply-chain and runtime compromise risk. The Razor view components are likely a cover for the embedded loader; static constructors call the obfuscated loader, meaning inclusion of the assembly will trigger this behavior. I recommend treating this package as malicious/untrusted and removing it from production and further investigating any runtime activity and artifacts. If this is claimed to be legitimate, demand a full forensic explanation and source-code provenance and remove/replace immediately until validated.
tpcti
0.0.2
Removed from pypi
Blocked by Socket
This file is an intentionally obfuscated dynamic loader/decoder. It embeds large encoded blobs and uses decoded names to call __import__, eval, and to update the module globals at runtime. It also enforces a Python-version gate. While I found no explicit network or shell calls in the visible fragment, the presence of dynamic import/eval and globals.update fed from decoded data is a strong indicator the module will reconstruct and execute hidden code at runtime. That pattern is high risk for supply-chain/malicious payload delivery. I recommend treating this package as suspicious: do not run it in production, and perform an isolated dynamic decode (in a safe instrumented sandbox) to fully reveal the payload before trusting it.
Live on pypi for 1 hour and 57 minutes before removal. Socket users were protected even while the package was live.
kohin-sdk
1.0.23
by sumiy_gorwadiya
Removed from npm
Blocked by Socket
The open-source dependency has several security risks and potential malicious activity, including reentrancy vulnerabilities and unprotected functions.
Live on npm for 1 hour and 26 minutes before removal. Socket users were protected even while the package was live.
fmt.core
2025.105.1
by Paulov / FMTDev
Live on nuget
Blocked by Socket
The codebase includes a high-risk DLL-injection capability (FrostbiteInjection) capable of injecting code into other processes using OpenProcess, VirtualAllocEx, WriteProcessMemory, GetProcAddress, and CreateRemoteThread. While asset-management utilities are legitimate for modding workflows, the injection surface constitutes a potential backdoor risk in a supply-chain context, particularly if exposed in public packages. Strong mitigations are recommended: disable or tightly gate injection features, ensure explicit user consent, apply strict access control and signing, and audit cryptographic material exposure. This warrants ongoing security oversight when distributing or integrating such code in external projects.
ironic-python-agent-builder
2.6.0
Live on pypi
Blocked by Socket
This script creates a privileged 'rescue' account with root-level access and configures passwordless sudo permissions, effectively functioning as a backdoor. It reads credentials from a configuration file and writes them into system files to grant unrestricted administrative rights. Such behavior allows full system compromise without requiring authentication. No external domains or IP addresses are referenced.
terminal-pkg-team3sp20
0.0.6
Live on pypi
Blocked by Socket
This module functions as a remote-control/backdoor-like client: it connects to a hardcoded remote IP, exfiltrates the local IP and all typed keys to that server, and accepts remote commands to control the terminal display and play audio. It also triggers reboot() on certain network errors or conditions. The lack of authentication/encryption and the hardcoded command-and-control address make this code highly suspicious and dangerous to run in production. Treat as a likely backdoor; remove or quarantine and investigate origin and intent.
alex_evil-test-package
1.0.0
by alex07pk
Removed from npm
Blocked by Socket
The code is suspicious because it collects system information and sends it to a potentially malicious remote server without explicit consent or legitimate purpose, indicating potential data theft.
Live on npm for 12 days and 5 hours before removal. Socket users were protected even while the package was live.
bigdl-orca
2.4.0b20231031
Live on pypi
Blocked by Socket
The code contains potential security risks such as hard-coded file paths, subprocess.Popen usage, and the handling of untrusted data through PyArrow Plasma. It is essential to review and address these security concerns before using this code in a production environment.
minesweepervariants
0.2.0
Live on pypi
Blocked by Socket
The code provides an exposed remote terminal-like service that executes an external batch file using arguments supplied by the connected client. This is a classic remote command execution surface with no input validation or authentication, enabling potentially dangerous commands to be run on the host. While there are safeguards for terminating processes and cleaning up, the core behavior is high-risk and could enable remote control, data exfiltration, or system compromise if misused or reachable by untrusted clients.
backdoormbti
0.1.0
Live on pypi
Blocked by Socket
This module implements a Hidden Patch Trojan attack pipeline: it constructs and applies additive and spatial triggers to images and performs ADMM-based optimization to embed a backdoor mask into model weights, persisting a trojaned model artifact. The fragment contains incomplete/buggy references but the overall logic is clearly for backdoor insertion. It poses a significant supply-chain and model-integrity threat: do not run this code or accept artifacts produced by it. Audit related modules and remove or isolate this functionality before using the codebase.
ddos
1.0.1
Live on pypi
Blocked by Socket
This setup.py prepares a Python package that explicitly declares DDoS functionality and exposes console commands that run DDos.__main__.main. While the file itself contains no attack implementation, it makes running the malicious code trivial. Treat the package as malicious/abusive; do not install or execute it and remove or block distribution in registries.
dhemrdhs92011
1.250730.10830
by ongtrieuhau861.001
Live on npm
Blocked by Socket
This file implements an unattended update mechanism that fetches and installs .tgz archives from unverified remote sources—both the npm registry (registry[.]npmjs[.]org) and a configurable Firebase-style database URL—by downloading, extracting them into the application directory and then restarting PM2-managed processes. Because there is no cryptographic signature or checksum validation beyond a simple version check, a compromised registry account or database endpoint could deliver arbitrary code to every host running this updater. Additionally, on startup the script gathers extensive system and package metadata—including public IP (via api[.]ipify[.]org), local IP addresses, hostname, OS/platform, Node.js version, CPU/memory statistics, load averages, working directory and package.json fields—and posts it to a configurable Discord webhook endpoint (discordapp[.]com). This behavior poses both a supply-chain risk and a telemetry/privacy exposure risk, as sensitive host information is sent to an external service without explicit user consent or granular control.
tx.bim
1.1.5.10
by TianTeng
Live on nuget
Blocked by Socket
This assembly contains benign-looking BIM model types at surface level but also includes a large, deliberately obfuscated runtime/unpacker component that reads encrypted embedded resources, decrypts/verifies them, allocates executable memory, writes code into process memory, swaps method pointers and invokes the payload. It performs platform-specific native memory operations (VirtualAlloc/mmap/mprotect), writes to /proc/self/mem on Linux, and calls OpenProcess/WriteProcessMemory — all strong indicators of dynamic code injection and self-modifying behavior. Even if this was produced by a legitimate protector/packer, such behavior violates typical supply-chain safety expectations for a public library because it hides runtime behavior, uses native memory patching, and can execute arbitrary embedded payloads. I recommend not using this package in production and treating it as high-risk until the authors provide verifiable source-to-binary build reproducibility and justification for the loader behavior.
examtool
2.1.9b80.dev2
Live on pypi
Blocked by Socket
This module purposefully enables command execution and remote downloads during LaTeX rendering. The transformation that replaces \includegraphics{http...} with a write18 wget call and the use of pdflatex --shell-escape are unsafe when any part of the LaTeX input (exam or subs) is or can be attacker-controlled. The code permits arbitrary command execution and network fetches with no sanitization or sandboxing — a high-risk behavior in a supply-chain context. Do not run this on untrusted input; if retained, restrict inputs strictly or remove the write18/wget mechanism and avoid --shell-escape. Use subprocess with sanitized args and sandboxing instead.
pv_ho3ein
1.0.1
by h0x3ein
Removed from npm
Blocked by Socket
The command 'calc' is not recognized as a standard command, which raises suspicion. It is recommended to investigate the purpose and source of this command before executing it.
Live on npm for 2 hours and 6 minutes before removal. Socket users were protected even while the package was live.
s3en
1.2.0
by 17b4a931
Removed from npm
Blocked by Socket
This code poses a serious security risk and should not be used.
Live on npm for 12 minutes before removal. Socket users were protected even while the package was live.
rrshare
4.2.2
Live on pypi
Blocked by Socket
The code unconditionally kills all running Streamlit processes and then attempts to start a Streamlit app from a user-specific path. This behavior can disrupt legitimate usage and execute potentially untrusted user code without validation. While it may be intended for self-restart or deployment, the lack of safety nets (validation, error handling, logging, and user prompts) represents a significant reliability and security risk that warrants safer alternatives (graceful shutdown, confirm prompts, path validation, and explicit permissions).
pinokiod
3.8.66
by cocktailpeanut
Live on npm
Blocked by Socket
The SweetAlert2 library code is mostly benign and serves as a UI modal dialog tool. However, it contains a suspicious and potentially malicious snippet that targets Russian users on certain domains to play an unsolicited audio prank, disabling pointer events and potentially disrupting user interaction. This behavior is unexpected and should be considered a moderate security risk and potential malware. The rest of the code shows no signs of malicious intent. The provided reports were invalid and unhelpful. Users should be cautious about this version of the library due to the embedded prank behavior.
mtmai
0.3.729
Live on pypi
Blocked by Socket
This fragment intends to install and start KasmVNC by running many shell commands that create certs, write VNC password files, adjust group membership, and launch a VNC server. The primary security issues are unsafe shell interpolation (command injection risk), programmatic persistence of a possibly predictable password, execution with sudo based on unvalidated env vars, starting a VNC server exposed on 0.0.0.0 with disabled/basic auth, and multiple unsafe filesystem operations performed via shell. There is no clear evidence of obfuscated or direct exfiltration malware, but the behavior can provide an unauthorized remote access vector (backdoor-like) if used maliciously. Do not run this code without fixing shell usage, validating inputs, using secure randomly generated passwords, enforcing proper file permissions, and not disabling authentication.
ailever
0.2.653
Live on pypi
Blocked by Socket
The code exhibits a dangerous remote code execution pattern: it downloads and immediately runs a remote Python payload without integrity checks, sandboxing, or input validation. This creates a severe supply-chain and runtime security risk. Recommended mitigations include removing dynamic downloads, validating payloads with cryptographic hashes or signatures, using safe subprocess invocations with argument lists, and implementing strict input sanitization. If remote functionality must remain, switch to a trusted-internal mechanism (e.g., plugin architecture with signed components, offline verification) and add robust error handling and logging.
Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.
Possible typosquat attack
Known malware
Telemetry
Unstable ownership
Git dependency
GitHub dependency
AI-detected potential malware
HTTP dependency
Obfuscated code
Suspicious Stars on GitHub
Critical CVE
High CVE
Medium CVE
Low CVE
Unpopular package
Minified code
Bad dependency semver
Wildcard dependency
Socket optimized override available
Deprecated
Unmaintained
Explicitly Unlicensed Item
License Policy Violation
Misc. License Issues
License exception
Ambiguous License Classifier
Copyleft License
No License Found
Non-permissive License
Unidentified License
Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.
Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Nat Friedman
CEO at GitHub

Suz Hinton
Senior Software Engineer at Stripe
heck yes this is awesome!!! Congrats team 🎉👏

Matteo Collina
Node.js maintainer, Fastify lead maintainer
So awesome to see @SocketSecurity launch with a fresh approach! Excited to have supported the team from the early days.

DC Posch
Director of Technology at AppFolio, CTO at Dynasty
This is going to be super important, especially for crypto projects where a compromised dependency results in stolen user assets.

Luis Naranjo
Software Engineer at Microsoft
If software supply chain attacks through npm don't scare the shit out of you, you're not paying close enough attention.
@SocketSecurity sounds like an awesome product. I'll be using socket.dev instead of npmjs.org to browse npm packages going forward

Elena Nadolinski
Founder and CEO at Iron Fish
Huge congrats to @SocketSecurity! 🙌
Literally the only product that proactively detects signs of JS compromised packages.

Joe Previte
Engineering Team Lead at Coder
Congrats to @feross and the @SocketSecurity team on their seed funding! 🚀 It's been a big help for us at @CoderHQ and we appreciate what y'all are doing!

Josh Goldberg
Staff Developer at Codecademy
This is such a great idea & looks fantastic, congrats & good luck @feross + team!
The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Scott Roberts
CISO at UiPath
As a happy Socket customer, I've been impressed with how quickly they are adding value to the product, this move is a great step!

Yan Zhu
Head of Security at Brave, DEFCON, EFF, W3C
glad to hear some of the smartest people i know are working on (npm, etc.) supply chain security finally :). @SocketSecurity

Andrew Peterson
CEO and Co-Founder at Signal Sciences (acq. Fastly)
How do you track the validity of open source software libraries as they get updated? You're prob not. Check out @SocketSecurity and the updated tooling they launched.
Supply chain is a cluster in security as we all know and the tools from Socket are "duh" type tools to be implementing. Check them out and follow Feross Aboukhadijeh to see more updates coming from them in the future.

Zbyszek Tenerowicz
Senior Security Engineer at ConsenSys
socket.dev is getting more appealing by the hour

Devdatta Akhawe
Head of Security at Figma
The @SocketSecurity team is on fire! Amazing progress and I am exciting to see where they go next.

Sebastian Bensusan
Engineer Manager at Stripe
I find it surprising that we don't have _more_ supply chain attacks in software:
Imagine your airplane (the code running) was assembled (deployed) daily, with parts (dependencies) from internet strangers. How long until you get a bad part?
Excited for Socket to prevent this

Adam Baldwin
VP of Security at npm, Red Team at Auth0/Okta
Congrats to everyone at @SocketSecurity ❤️🤘🏻

Nico Waisman
CISO at Lyft
This is an area that I have personally been very focused on. As Nat Friedman said in the 2019 GitHub Universe keynote, Open Source won, and every time you add a new open source project you rely on someone else code and you rely on the people that build it.
This is both exciting and problematic. You are bringing real risk into your organization, and I'm excited to see progress in the industry from OpenSSF scorecards and package analyzers to the company that Feross Aboukhadijeh is building!
Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.
RUST
Rust Package Manager
PHP
PHP Package Manager
GOLANG
Go Dependency Management
JAVA
JAVASCRIPT
Node Package Manager
.NET
.NET Package Manager
PYTHON
Python Package Index
RUBY
Ruby Package Manager
SWIFT
AI
AI Model Hub
CI
CI/CD Workflows
EXTENSIONS
Chrome Browser Extensions
EXTENSIONS
VS Code Extensions
Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.
Nov 23, 2025
Shai Hulud v2
Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.
Nov 05, 2025
Elves on npm
A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.
Jul 04, 2025
RubyGems Automation-Tool Infostealer
Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.
Mar 13, 2025
North Korea's Contagious Interview Campaign
Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.
Jul 23, 2024
Network Reconnaissance Campaign
A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.
Get our latest security research, open source insights, and product updates.

Security News
TeamPCP is targeting security tools across the OSS ecosystem, turning scanners and CI pipelines into infostealers to access enterprise secrets.

Security News
TypeScript 6.0 introduces new standard APIs, modern default settings, and deprecations as it prepares projects for the upcoming TypeScript 7.0 release.

Security News
/Research
Newly published Trivy Docker images (0.69.4, 0.69.5, and 0.69.6) were found to contain infostealer IOCs and were pushed to Docker Hub without corresponding GitHub releases.