
Security News
Attackers Are Hunting High-Impact Node.js Maintainers in a Coordinated Social Engineering Campaign
Multiple high-impact npm maintainers confirm they have been targeted in the same social engineering campaign that compromised Axios.
Quickly evaluate the security and health of any open source package.
kettle-diadem-bvh665
1.0.0
by afifaljafari112
Removed from npm
Blocked by Socket
The code exhibits unusual naming conventions and repetitive usage of an undefined method 'functame' across multiple obscure libraries. This pattern suggests potentially suspicious behavior, although without more context or the actual content of the libraries, a definitive conclusion cannot be made.
Live on npm for 57 days and 16 hours before removal. Socket users were protected even while the package was live.
mtmai
0.4.53
Live on pypi
Blocked by Socket
This module is an automation/scraping worker that intentionally executes code provided by task descriptions. That design requires trusting the task source. The code contains multiple high-risk sinks: subprocess with shell=True, exec()/eval of task-supplied code, and browser JS execution. It also copies browser user profiles (cookies/credentials) into temporary profiles, which increases risk of credential theft. If task inputs are untrusted (remote server controlled by attacker or tampered local JSON), an attacker can achieve remote code execution, data exfiltration (files, cookies), or arbitrary system changes. Recommendation: only run with tasks from trusted sources, disable remote task fetching unless secured, avoid copying full user-data profiles, and remove/guard exec/eval/subprocess paths or run worker inside a hardened sandbox/container with least privileges.
azure-graphrbac
8.1.7
Removed from npm
Blocked by Socket
Possible typosquat of azure-graph
Live on npm for 3 hours and 28 minutes before removal. Socket users were protected even while the package was live.
airbnb-location-suggester
1.6.0
by jpdhackerone06
Live on npm
Blocked by Socket
This code collects extensive system information—including hostname, OS type, platform, release, architecture, local IP, current user, and working directory—and fetches the public IP from https://api64[.]ipify[.]org?format=json. It then exfiltrates this data without user consent via HTTP GET and POST requests to http://54[.]173[.]15[.]59:8080/jpd[.]php (with a fake Mozilla/5.0 User-Agent) and falls back to a WebSocket connection to wss://yourserver[.]com/socket if HTTP fails. It suppresses console output during the npm preinstall lifecycle and uses dynamic imports to evade static analysis. These behaviors demonstrate clear malicious intent and high security risk.
fca-riya-bot
20.1.1
by nazrulriya420
Live on npm
Blocked by Socket
This code implements a sophisticated data exfiltration operation targeting Facebook user data and chat information. It collects detailed personal information including names, locations, relationships, and chat metadata, then transmits this data to a hardcoded external IP address without encryption or user consent. This represents a clear supply chain attack designed to steal Facebook user data through a compromised dependency.
tx.revit
1.1.5.7
by TianTeng
Live on nuget
Blocked by Socket
This assembly contains an obfuscated runtime loader: it decrypts embedded resources, performs integrity checks, allocates and writes memory, resolves native functions (VirtualAlloc/VirtualProtect/WriteProcessMemory/OpenProcess), enumerates processes/modules, and dynamically creates delegates/IL to invoke runtime-resolved code. Those capabilities are characteristic of a malicious unpacker/loader and present a high supply-chain risk. Treat the package as untrusted — do not deploy it. A full forensic review of original source, build provenance, and runtime behaviors in an isolated environment is required before any use.
@willzek.xyz/baileys-sunflare
6.8.4
by willzek-ofc
Live on npm
Blocked by Socket
This package.json appears to be a legitimate project manifest for a Baileys-based WhatsApp client, but it contains install-time execution (preinstall -> engine-requirements.js) and references to dependencies resolved from non-registry sources (GitHub shorthand). Those two factors create a moderate-to-high supply-chain risk: an attacker could modify the local preinstall script in a tampered package or a non-registry dependency to execute malicious actions (data exfiltration, telemetry, remote code execution). Before installing in a sensitive environment, inspect engine-requirements.js and prefer registry-published dependency versions (or pin to trusted commit SHAs), and review the GitHub-resolved dependencies' repositories.
fray
3.5.133
Live on pypi
Blocked by Socket
This file is a high-risk catalog of HTML dangling-markup payloads explicitly designed to bypass CSP/script restrictions and exfiltrate page content to an attacker-controlled domain. Treat entries as malicious input: do not render or store them where they could reach HTML rendering contexts without strict sanitization and CSP. Remediation: remove or quarantine the catalog if not required for legitimate testing, sanitize/escape user input, enforce strict CSP and origin restrictions for resource/form targets, and audit any places that reflect user-supplied HTML.
github.com/milvus-io/milvus
v0.10.3-0.20211024005912-f5bd5d8f4b2c
Live on go
Blocked by Socket
This code implements an insecure, unauthenticated RPC mechanism that allows remote clients to cause arbitrary code execution and exfiltrate files/system information. Using pickle over an untrusted network and invoking methods by client-supplied names are severe supply-chain/backdoor risks. Do not deploy or reuse this code in production; it should be treated as a backdoor/untrusted remote-execution component unless wrapped with strong authentication, authorization, sandboxing, and safe serialization.
pumpkins
0.0.0-master.16ffbe4
by weakky
Live on npm
Blocked by Socket
The codebase primarily functions as a development runner with legitimate tooling around TypeScript and IPC. However, the dynamic code execution path driven by the PUMPKINS_EVAL environment variable is a critical security risk, enabling arbitrary code execution with full Node privileges. When combined with IPC data channels and fork interception, this creates a significant supply-chain/runtime risk in untrusted environments. Immediate mitigations include removing or hardening the Eval pathway (disallowing environment-driven code, introducing a sandbox, or strict validation), and auditing IPC exposure and fork handling to reduce data leakage and control flow abuse.
emrl/site-template
1.0.11
Live on composer
Blocked by Socket
The code fragment exhibits a high-risk supply-chain pattern: install-time SSH-based clones of external Bitbucket repositories to populate theme and plugin code, without integrity checks or signature verification. This opens a pathway for backdoors or tampered code to be introduced during installation. Environment handling (copying defaults to .env) adds leakage risk if secrets are not managed securely. Overall risk is elevated and warrants remediation, including removing install-time external fetches, adding integrity verification, and centralizing configuration management.
glog-parser
0.0.1-security
by npm
Live on npm
Blocked by Socket
The package originally contained malicious code and was removed. Although the current package is a placeholder, the history of malicious content poses a significant risk.
ironic-python-agent-builder
5.0.1
Live on pypi
Blocked by Socket
This script creates a privileged 'rescue' account with root-level access and configures passwordless sudo permissions, effectively functioning as a backdoor. It reads credentials from a configuration file and writes them into system files to grant unrestricted administrative rights. Such behavior allows full system compromise without requiring authentication. No external domains or IP addresses are referenced.
safe-postinstall-test
0.0.1
by sfwtest
Live on npm
Blocked by Socket
This postinstall runs a local script and then downloads and runs a shell script from example.com. That second step allows arbitrary, untrusted code execution on the user's machine during npm install and is a high-severity supply-chain/malware risk. Treat this as malicious/untrusted unless you can verify the remote script's integrity and trustworthiness. Remove the remote exec or replace it with an audited, deterministic mechanism.
mathiconjsnz
2.0.0
by rossj4504
Removed from npm
Blocked by Socket
The source code is primarily focused on generating icons but contains a suspicious HTTP request to an external URL. This request is not explained and could potentially be used for unauthorized data transmission, posing a security risk.
Live on npm for 41 days, 11 hours and 11 minutes before removal. Socket users were protected even while the package was live.
cl-lite
1.0.1429
by michael_tian
Live on npm
Blocked by Socket
This SQLite database file contains embedded explicit adult content and torrent distribution infrastructure instead of legitimate data. The file includes extensive HTML fragments with pornographic video metadata, download links to torrent files, and suspicious redirect URLs. Key malicious domains identified include rmdown[.]com, redircdn[.]com, 97p[.]org, qpic[.]ws, imgbox[.]com, and various other image hosting services. The content contains hash values for torrent files, BitTorrent magnet links, and obfuscated download URLs using multiple redirect layers to mask the true destinations. This represents a supply chain attack where adult content distribution infrastructure has been embedded within what appears to be a standard database file, potentially exposing users to inappropriate content and malicious download sites when accessed.
mtmai
0.4.191
Live on pypi
Blocked by Socket
This fragment intends to install and start KasmVNC by running many shell commands that create certs, write VNC password files, adjust group membership, and launch a VNC server. The primary security issues are unsafe shell interpolation (command injection risk), programmatic persistence of a possibly predictable password, execution with sudo based on unvalidated env vars, starting a VNC server exposed on 0.0.0.0 with disabled/basic auth, and multiple unsafe filesystem operations performed via shell. There is no clear evidence of obfuscated or direct exfiltration malware, but the behavior can provide an unauthorized remote access vector (backdoor-like) if used maliciously. Do not run this code without fixing shell usage, validating inputs, using secure randomly generated passwords, enforcing proper file permissions, and not disabling authentication.
web3node
0.1.1
Removed from pypi
Blocked by Socket
This code implements a remote fetch-and-execute mechanism using PowerShell's Invoke-Expression on content retrieved from a hardcoded external URL. That pattern is highly indicative of a dropper/backdoor and represents a serious supply-chain and host compromise risk. Do not execute or import this module in any production or sensitive environment. Treat the package as malicious, isolate any systems that executed it, and investigate network contacts to the referenced domain.
Live on pypi for 1 hour and 10 minutes before removal. Socket users were protected even while the package was live.
aspidites
1.8.1
Live on pypi
Blocked by Socket
The code implements a high-risk dynamic evaluation pattern by evaluating tokens within the caller’s scope. This creates a strong possibility of arbitrary code execution and data leakage if tokens originate from untrusted inputs. Hardening should include removing eval, replacing with safe resolvers, sandboxing, or strict token whitelisting and restricting scope access. This pattern is unsuitable for trusted libraries exposes in open-source supply chains without significant safeguards.
mtxp
0.0.171
Removed from pypi
Blocked by Socket
The script creates a persistent, predictable remote access vector by adding a user with a hardcoded password and by replacing SSH configuration to enable password and root logins and forwarding. This behavior is high-risk and consistent with a backdoor/persistence implant; treat any occurrence as malicious unless used in a tightly controlled, ephemeral testing environment with compensating controls. Do not run this script on production systems; if it has run, assume compromise, remove the user, restore secure SSH configuration, and rotate credentials.
Live on pypi for 124 days and 59 minutes before removal. Socket users were protected even while the package was live.
noierrdev-antoine-tx-engine
0.1.8
Live on cargo
Blocked by Socket
This code unconditionally injects an extra SOL transfer into transactions constructed with build_tx_with_temperal_tip, sending tip_amount lamports to a randomly-selected Pubkey from a baked-in list of 17 recipients. That behavior is consistent with covert siphoning of funds (a supply-chain backdoor) and represents a high security risk when included in tooling or libraries that assemble/sign user transactions. There is no user opt-in, no audit/logging, and no configuration to disable the behavior in the shown fragment. Treat this code as malicious or backdoor-like until maintainers provide a clear benign justification and an explicit opt-in or configuration to disable the extra transfer.
@queenanya/baileys
8.5.1
by teamolduser
Live on npm
Blocked by Socket
`lotusbail` is a malicious npm package that masquerades as a WhatsApp Web API library by forking legitimate Baileys-based code and preserving working messaging functionality. In addition to normal API behavior, it inserts a wrapper around the WhatsApp WebSocket client so that all traffic passing through the library is duplicated for collection. Reported data theft includes WhatsApp authentication tokens and session keys, full message content (sent/received and historical), contact lists (including phone numbers), and transferred media/files. The package also attempts to establish persistent unauthorized access by hijacking the WhatsApp device-linking (“pairing”) workflow using a hardcoded pairing code, effectively linking an attacker-controlled device to the victim’s account; removing the npm dependency does not automatically remove the linked device. To hinder detection, the exfiltration endpoint is hidden behind multiple obfuscation layers, collected data is encrypted (including a custom RSA implementation), and the code includes anti-debugging traps designed to disrupt analysis.
grunt-agnitas
1.999.0
Removed from npm
Blocked by Socket
The provided code is malicious, collecting and exfiltrating sensitive system information while being heavily obfuscated. This justifies high scores for malware, obfuscation, and overall risk.
Live on npm for 27 minutes before removal. Socket users were protected even while the package was live.
github.com/apache/thrift
v0.12.1-0.20190114205743-ee006ecb0da8
Live on go
Blocked by Socket
This module contains a high-severity unsafe deserialization behavior: TJSONProtocol.readMessageBegin() can parse network-controlled data using eval(...) when JSON.parse/jQuery.parseJSON are unavailable. That creates a direct remote-code-execution vector in some runtimes, making the supply-chain security posture poor. No clear additional malware behaviors (exfiltration/persistence) are evident here, but the eval fallback alone warrants treating the dependency as dangerous and replacing it with strict, non-eval parsing plus schema validation.
kettle-diadem-bvh665
1.0.0
by afifaljafari112
Removed from npm
Blocked by Socket
The code exhibits unusual naming conventions and repetitive usage of an undefined method 'functame' across multiple obscure libraries. This pattern suggests potentially suspicious behavior, although without more context or the actual content of the libraries, a definitive conclusion cannot be made.
Live on npm for 57 days and 16 hours before removal. Socket users were protected even while the package was live.
mtmai
0.4.53
Live on pypi
Blocked by Socket
This module is an automation/scraping worker that intentionally executes code provided by task descriptions. That design requires trusting the task source. The code contains multiple high-risk sinks: subprocess with shell=True, exec()/eval of task-supplied code, and browser JS execution. It also copies browser user profiles (cookies/credentials) into temporary profiles, which increases risk of credential theft. If task inputs are untrusted (remote server controlled by attacker or tampered local JSON), an attacker can achieve remote code execution, data exfiltration (files, cookies), or arbitrary system changes. Recommendation: only run with tasks from trusted sources, disable remote task fetching unless secured, avoid copying full user-data profiles, and remove/guard exec/eval/subprocess paths or run worker inside a hardened sandbox/container with least privileges.
azure-graphrbac
8.1.7
Removed from npm
Blocked by Socket
Possible typosquat of azure-graph
Live on npm for 3 hours and 28 minutes before removal. Socket users were protected even while the package was live.
airbnb-location-suggester
1.6.0
by jpdhackerone06
Live on npm
Blocked by Socket
This code collects extensive system information—including hostname, OS type, platform, release, architecture, local IP, current user, and working directory—and fetches the public IP from https://api64[.]ipify[.]org?format=json. It then exfiltrates this data without user consent via HTTP GET and POST requests to http://54[.]173[.]15[.]59:8080/jpd[.]php (with a fake Mozilla/5.0 User-Agent) and falls back to a WebSocket connection to wss://yourserver[.]com/socket if HTTP fails. It suppresses console output during the npm preinstall lifecycle and uses dynamic imports to evade static analysis. These behaviors demonstrate clear malicious intent and high security risk.
fca-riya-bot
20.1.1
by nazrulriya420
Live on npm
Blocked by Socket
This code implements a sophisticated data exfiltration operation targeting Facebook user data and chat information. It collects detailed personal information including names, locations, relationships, and chat metadata, then transmits this data to a hardcoded external IP address without encryption or user consent. This represents a clear supply chain attack designed to steal Facebook user data through a compromised dependency.
tx.revit
1.1.5.7
by TianTeng
Live on nuget
Blocked by Socket
This assembly contains an obfuscated runtime loader: it decrypts embedded resources, performs integrity checks, allocates and writes memory, resolves native functions (VirtualAlloc/VirtualProtect/WriteProcessMemory/OpenProcess), enumerates processes/modules, and dynamically creates delegates/IL to invoke runtime-resolved code. Those capabilities are characteristic of a malicious unpacker/loader and present a high supply-chain risk. Treat the package as untrusted — do not deploy it. A full forensic review of original source, build provenance, and runtime behaviors in an isolated environment is required before any use.
@willzek.xyz/baileys-sunflare
6.8.4
by willzek-ofc
Live on npm
Blocked by Socket
This package.json appears to be a legitimate project manifest for a Baileys-based WhatsApp client, but it contains install-time execution (preinstall -> engine-requirements.js) and references to dependencies resolved from non-registry sources (GitHub shorthand). Those two factors create a moderate-to-high supply-chain risk: an attacker could modify the local preinstall script in a tampered package or a non-registry dependency to execute malicious actions (data exfiltration, telemetry, remote code execution). Before installing in a sensitive environment, inspect engine-requirements.js and prefer registry-published dependency versions (or pin to trusted commit SHAs), and review the GitHub-resolved dependencies' repositories.
fray
3.5.133
Live on pypi
Blocked by Socket
This file is a high-risk catalog of HTML dangling-markup payloads explicitly designed to bypass CSP/script restrictions and exfiltrate page content to an attacker-controlled domain. Treat entries as malicious input: do not render or store them where they could reach HTML rendering contexts without strict sanitization and CSP. Remediation: remove or quarantine the catalog if not required for legitimate testing, sanitize/escape user input, enforce strict CSP and origin restrictions for resource/form targets, and audit any places that reflect user-supplied HTML.
github.com/milvus-io/milvus
v0.10.3-0.20211024005912-f5bd5d8f4b2c
Live on go
Blocked by Socket
This code implements an insecure, unauthenticated RPC mechanism that allows remote clients to cause arbitrary code execution and exfiltrate files/system information. Using pickle over an untrusted network and invoking methods by client-supplied names are severe supply-chain/backdoor risks. Do not deploy or reuse this code in production; it should be treated as a backdoor/untrusted remote-execution component unless wrapped with strong authentication, authorization, sandboxing, and safe serialization.
pumpkins
0.0.0-master.16ffbe4
by weakky
Live on npm
Blocked by Socket
The codebase primarily functions as a development runner with legitimate tooling around TypeScript and IPC. However, the dynamic code execution path driven by the PUMPKINS_EVAL environment variable is a critical security risk, enabling arbitrary code execution with full Node privileges. When combined with IPC data channels and fork interception, this creates a significant supply-chain/runtime risk in untrusted environments. Immediate mitigations include removing or hardening the Eval pathway (disallowing environment-driven code, introducing a sandbox, or strict validation), and auditing IPC exposure and fork handling to reduce data leakage and control flow abuse.
emrl/site-template
1.0.11
Live on composer
Blocked by Socket
The code fragment exhibits a high-risk supply-chain pattern: install-time SSH-based clones of external Bitbucket repositories to populate theme and plugin code, without integrity checks or signature verification. This opens a pathway for backdoors or tampered code to be introduced during installation. Environment handling (copying defaults to .env) adds leakage risk if secrets are not managed securely. Overall risk is elevated and warrants remediation, including removing install-time external fetches, adding integrity verification, and centralizing configuration management.
glog-parser
0.0.1-security
by npm
Live on npm
Blocked by Socket
The package originally contained malicious code and was removed. Although the current package is a placeholder, the history of malicious content poses a significant risk.
ironic-python-agent-builder
5.0.1
Live on pypi
Blocked by Socket
This script creates a privileged 'rescue' account with root-level access and configures passwordless sudo permissions, effectively functioning as a backdoor. It reads credentials from a configuration file and writes them into system files to grant unrestricted administrative rights. Such behavior allows full system compromise without requiring authentication. No external domains or IP addresses are referenced.
safe-postinstall-test
0.0.1
by sfwtest
Live on npm
Blocked by Socket
This postinstall runs a local script and then downloads and runs a shell script from example.com. That second step allows arbitrary, untrusted code execution on the user's machine during npm install and is a high-severity supply-chain/malware risk. Treat this as malicious/untrusted unless you can verify the remote script's integrity and trustworthiness. Remove the remote exec or replace it with an audited, deterministic mechanism.
mathiconjsnz
2.0.0
by rossj4504
Removed from npm
Blocked by Socket
The source code is primarily focused on generating icons but contains a suspicious HTTP request to an external URL. This request is not explained and could potentially be used for unauthorized data transmission, posing a security risk.
Live on npm for 41 days, 11 hours and 11 minutes before removal. Socket users were protected even while the package was live.
cl-lite
1.0.1429
by michael_tian
Live on npm
Blocked by Socket
This SQLite database file contains embedded explicit adult content and torrent distribution infrastructure instead of legitimate data. The file includes extensive HTML fragments with pornographic video metadata, download links to torrent files, and suspicious redirect URLs. Key malicious domains identified include rmdown[.]com, redircdn[.]com, 97p[.]org, qpic[.]ws, imgbox[.]com, and various other image hosting services. The content contains hash values for torrent files, BitTorrent magnet links, and obfuscated download URLs using multiple redirect layers to mask the true destinations. This represents a supply chain attack where adult content distribution infrastructure has been embedded within what appears to be a standard database file, potentially exposing users to inappropriate content and malicious download sites when accessed.
mtmai
0.4.191
Live on pypi
Blocked by Socket
This fragment intends to install and start KasmVNC by running many shell commands that create certs, write VNC password files, adjust group membership, and launch a VNC server. The primary security issues are unsafe shell interpolation (command injection risk), programmatic persistence of a possibly predictable password, execution with sudo based on unvalidated env vars, starting a VNC server exposed on 0.0.0.0 with disabled/basic auth, and multiple unsafe filesystem operations performed via shell. There is no clear evidence of obfuscated or direct exfiltration malware, but the behavior can provide an unauthorized remote access vector (backdoor-like) if used maliciously. Do not run this code without fixing shell usage, validating inputs, using secure randomly generated passwords, enforcing proper file permissions, and not disabling authentication.
web3node
0.1.1
Removed from pypi
Blocked by Socket
This code implements a remote fetch-and-execute mechanism using PowerShell's Invoke-Expression on content retrieved from a hardcoded external URL. That pattern is highly indicative of a dropper/backdoor and represents a serious supply-chain and host compromise risk. Do not execute or import this module in any production or sensitive environment. Treat the package as malicious, isolate any systems that executed it, and investigate network contacts to the referenced domain.
Live on pypi for 1 hour and 10 minutes before removal. Socket users were protected even while the package was live.
aspidites
1.8.1
Live on pypi
Blocked by Socket
The code implements a high-risk dynamic evaluation pattern by evaluating tokens within the caller’s scope. This creates a strong possibility of arbitrary code execution and data leakage if tokens originate from untrusted inputs. Hardening should include removing eval, replacing with safe resolvers, sandboxing, or strict token whitelisting and restricting scope access. This pattern is unsuitable for trusted libraries exposes in open-source supply chains without significant safeguards.
mtxp
0.0.171
Removed from pypi
Blocked by Socket
The script creates a persistent, predictable remote access vector by adding a user with a hardcoded password and by replacing SSH configuration to enable password and root logins and forwarding. This behavior is high-risk and consistent with a backdoor/persistence implant; treat any occurrence as malicious unless used in a tightly controlled, ephemeral testing environment with compensating controls. Do not run this script on production systems; if it has run, assume compromise, remove the user, restore secure SSH configuration, and rotate credentials.
Live on pypi for 124 days and 59 minutes before removal. Socket users were protected even while the package was live.
noierrdev-antoine-tx-engine
0.1.8
Live on cargo
Blocked by Socket
This code unconditionally injects an extra SOL transfer into transactions constructed with build_tx_with_temperal_tip, sending tip_amount lamports to a randomly-selected Pubkey from a baked-in list of 17 recipients. That behavior is consistent with covert siphoning of funds (a supply-chain backdoor) and represents a high security risk when included in tooling or libraries that assemble/sign user transactions. There is no user opt-in, no audit/logging, and no configuration to disable the behavior in the shown fragment. Treat this code as malicious or backdoor-like until maintainers provide a clear benign justification and an explicit opt-in or configuration to disable the extra transfer.
@queenanya/baileys
8.5.1
by teamolduser
Live on npm
Blocked by Socket
`lotusbail` is a malicious npm package that masquerades as a WhatsApp Web API library by forking legitimate Baileys-based code and preserving working messaging functionality. In addition to normal API behavior, it inserts a wrapper around the WhatsApp WebSocket client so that all traffic passing through the library is duplicated for collection. Reported data theft includes WhatsApp authentication tokens and session keys, full message content (sent/received and historical), contact lists (including phone numbers), and transferred media/files. The package also attempts to establish persistent unauthorized access by hijacking the WhatsApp device-linking (“pairing”) workflow using a hardcoded pairing code, effectively linking an attacker-controlled device to the victim’s account; removing the npm dependency does not automatically remove the linked device. To hinder detection, the exfiltration endpoint is hidden behind multiple obfuscation layers, collected data is encrypted (including a custom RSA implementation), and the code includes anti-debugging traps designed to disrupt analysis.
grunt-agnitas
1.999.0
Removed from npm
Blocked by Socket
The provided code is malicious, collecting and exfiltrating sensitive system information while being heavily obfuscated. This justifies high scores for malware, obfuscation, and overall risk.
Live on npm for 27 minutes before removal. Socket users were protected even while the package was live.
github.com/apache/thrift
v0.12.1-0.20190114205743-ee006ecb0da8
Live on go
Blocked by Socket
This module contains a high-severity unsafe deserialization behavior: TJSONProtocol.readMessageBegin() can parse network-controlled data using eval(...) when JSON.parse/jQuery.parseJSON are unavailable. That creates a direct remote-code-execution vector in some runtimes, making the supply-chain security posture poor. No clear additional malware behaviors (exfiltration/persistence) are evident here, but the eval fallback alone warrants treating the dependency as dangerous and replacing it with strict, non-eval parsing plus schema validation.
Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.
Possible typosquat attack
Known malware
Unstable ownership
Git dependency
GitHub dependency
AI-detected potential malware
HTTP dependency
Obfuscated code
Skill: Pre-execution shell command
Suspicious Stars on GitHub
Critical CVE
High CVE
Medium CVE
Low CVE
Unpopular package
Minified code
Bad dependency semver
Wildcard dependency
Socket optimized override available
Deprecated
Unmaintained
Explicitly Unlicensed Item
License Policy Violation
Misc. License Issues
Ambiguous License Classifier
Copyleft License
License exception
No License Found
Non-permissive License
Unidentified License
Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.
Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Nat Friedman
CEO at GitHub

Suz Hinton
Senior Software Engineer at Stripe
heck yes this is awesome!!! Congrats team 🎉👏

Matteo Collina
Node.js maintainer, Fastify lead maintainer
So awesome to see @SocketSecurity launch with a fresh approach! Excited to have supported the team from the early days.

DC Posch
Director of Technology at AppFolio, CTO at Dynasty
This is going to be super important, especially for crypto projects where a compromised dependency results in stolen user assets.

Luis Naranjo
Software Engineer at Microsoft
If software supply chain attacks through npm don't scare the shit out of you, you're not paying close enough attention.
@SocketSecurity sounds like an awesome product. I'll be using socket.dev instead of npmjs.org to browse npm packages going forward

Elena Nadolinski
Founder and CEO at Iron Fish
Huge congrats to @SocketSecurity! 🙌
Literally the only product that proactively detects signs of JS compromised packages.

Joe Previte
Engineering Team Lead at Coder
Congrats to @feross and the @SocketSecurity team on their seed funding! 🚀 It's been a big help for us at @CoderHQ and we appreciate what y'all are doing!

Josh Goldberg
Staff Developer at Codecademy
This is such a great idea & looks fantastic, congrats & good luck @feross + team!
The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Scott Roberts
CISO at UiPath
As a happy Socket customer, I've been impressed with how quickly they are adding value to the product, this move is a great step!

Yan Zhu
Head of Security at Brave, DEFCON, EFF, W3C
glad to hear some of the smartest people i know are working on (npm, etc.) supply chain security finally :). @SocketSecurity

Andrew Peterson
CEO and Co-Founder at Signal Sciences (acq. Fastly)
How do you track the validity of open source software libraries as they get updated? You're prob not. Check out @SocketSecurity and the updated tooling they launched.
Supply chain is a cluster in security as we all know and the tools from Socket are "duh" type tools to be implementing. Check them out and follow Feross Aboukhadijeh to see more updates coming from them in the future.

Zbyszek Tenerowicz
Senior Security Engineer at ConsenSys
socket.dev is getting more appealing by the hour

Devdatta Akhawe
Head of Security at Figma
The @SocketSecurity team is on fire! Amazing progress and I am exciting to see where they go next.

Sebastian Bensusan
Engineer Manager at Stripe
I find it surprising that we don't have _more_ supply chain attacks in software:
Imagine your airplane (the code running) was assembled (deployed) daily, with parts (dependencies) from internet strangers. How long until you get a bad part?
Excited for Socket to prevent this

Adam Baldwin
VP of Security at npm, Red Team at Auth0/Okta
Congrats to everyone at @SocketSecurity ❤️🤘🏻

Nico Waisman
CISO at Lyft
This is an area that I have personally been very focused on. As Nat Friedman said in the 2019 GitHub Universe keynote, Open Source won, and every time you add a new open source project you rely on someone else code and you rely on the people that build it.
This is both exciting and problematic. You are bringing real risk into your organization, and I'm excited to see progress in the industry from OpenSSF scorecards and package analyzers to the company that Feross Aboukhadijeh is building!
Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.
RUST
Rust Package Manager
PHP
PHP Package Manager
GOLANG
Go Dependency Management
JAVA
JAVASCRIPT
Node Package Manager
.NET
.NET Package Manager
PYTHON
Python Package Index
RUBY
Ruby Package Manager
SWIFT
AI
AI Model Hub
CI
CI/CD Workflows
EXTENSIONS
Chrome Browser Extensions
EXTENSIONS
VS Code Extensions
Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.
Nov 23, 2025
Shai Hulud v2
Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.
Nov 05, 2025
Elves on npm
A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.
Jul 04, 2025
RubyGems Automation-Tool Infostealer
Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.
Mar 13, 2025
North Korea's Contagious Interview Campaign
Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.
Jul 23, 2024
Network Reconnaissance Campaign
A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.
Get our latest security research, open source insights, and product updates.

Security News
Multiple high-impact npm maintainers confirm they have been targeted in the same social engineering campaign that compromised Axios.

Security News
Axios compromise traced to social engineering, showing how attacks on maintainers can bypass controls and expose the broader software supply chain.

Security News
Node.js has paused its bug bounty program after funding ended, removing payouts for vulnerability reports but keeping its security process unchanged.