
Security News
Axios Maintainer Confirms Social Engineering Attack Behind npm Compromise
Axios compromise traced to social engineering, showing how attacks on maintainers can bypass controls and expose the broader software supply chain.
Quickly evaluate the security and health of any open source package.
unipin_the_leading_digital_entertainment_enabler561
1.0.2
by khadijaakter86628
Removed from npm
Blocked by Socket
The code poses a high security risk due to hardcoded credentials and automated publishing, which could be exploited for spamming or malicious distribution. The intent and use of the code are questionable.
Live on npm for 1 minute before removal. Socket users were protected even while the package was live.
mtmai
0.3.763
Live on pypi
Blocked by Socket
This fragment intends to install and start KasmVNC by running many shell commands that create certs, write VNC password files, adjust group membership, and launch a VNC server. The primary security issues are unsafe shell interpolation (command injection risk), programmatic persistence of a possibly predictable password, execution with sudo based on unvalidated env vars, starting a VNC server exposed on 0.0.0.0 with disabled/basic auth, and multiple unsafe filesystem operations performed via shell. There is no clear evidence of obfuscated or direct exfiltration malware, but the behavior can provide an unauthorized remote access vector (backdoor-like) if used maliciously. Do not run this code without fixing shell usage, validating inputs, using secure randomly generated passwords, enforcing proper file permissions, and not disabling authentication.
pymediawikidocker
0.20.5
Live on pypi
Blocked by Socket
This script is intentionally destructive: it removes a sudoers fragment and uninstalls the sudo package (on Debian/Ubuntu systems) and thus can lock out administrators and impede recovery. It is high-risk sabotage rather than covert data-exfiltration malware. Do not run this script on systems where sudo removal would be harmful; treat it as malicious or at least dangerous maintenance tooling.
luksdk-web
1.1.15
by luksdk
Live on npm
Blocked by Socket
The analyzed code implements a sophisticated, runtime interception framework injected into an iframe to hijack resource loading (scripts, images, network requests) and to reroute cocos engine asset resolution through blob-backed resources. Although it could serve legitimate offline or sandbox purposes, its broad API monkey-patching, persistence mechanisms, and extensive resource remapping constitute a high-risk pattern typical of backdoors or supply-chain tampering. It should be considered suspicious for public deployment and requires strict review, provenance verification, and removal or secure hardening before use in open-source packages.
argutrackdnn.edison.annotation
2.0.250901
by ArgutrackDNN.Edison.Annotation
Live on nuget
Blocked by Socket
This module contains highly suspicious and potentially malicious functionality. It implements an obfuscated runtime loader/unpacker: it reads embedded resources, performs cryptographic transforms, allocates and writes to native executable memory, changes memory protections and invokes code via delegated/native entry points. It also dynamically generates delegates and patches static fields using resolved metadata tokens and low-level reflection, and uses platform-specific P/Invoke to alter process memory and runtime JIT behavior. These are strong indicators of in-memory code injection/loader or backdoor/supply-chain behavior. Treat this package as high-risk: do not use without further code provenance, a full audit of embedded resources, and dynamic analysis in a safe sandbox.
airbnb-env
99.99.99
by bate5a511
Removed from npm
Blocked by Socket
The analyzed source code contains a malicious backdoor that stealthily collects and exfiltrates sensitive system and package information to a suspicious external server. This is a high-risk security incident indicative of spyware or supply chain compromise. The code is not obfuscated but is clearly designed for data theft. Immediate action is recommended to block and remove this package from any environment.
Live on npm for 2 hours and 5 minutes before removal. Socket users were protected even while the package was live.
metro-evaluator
1.0.0
by yub02
Removed from npm
Blocked by Socket
This code performs unsafe dynamic execution of externally fetched content. It constitutes a severe supply-chain and RCE risk: an attacker who can modify the remote file or intercept/forge the response can execute arbitrary code in the host process. Even if the current URL returns non-JS (HTML), making eval likely to throw, the pattern remains dangerous if the remote content is changed. Replace this pattern: do not eval network data. If dynamic behavior is required, use signed artifacts, verify integrity (cryptographic signature or pinned hash), fetch raw content endpoints, restrict capabilities (run in isolated process or Node VM with limited context), and enforce size/time limits and content-type checks.
Live on npm for 5 days, 4 hours and 23 minutes before removal. Socket users were protected even while the package was live.
@claudeink/mcp-server
2.2.9
by weekdmond
Live on npm
Blocked by Socket
High-risk behavior exists in this dependency bundle: gray-matter includes a `javascript` engine that directly executes attacker-controlled input using `eval`, and js-yaml full schema supports constructing executable functions via `new Function` from YAML tags. This combination enables RCE/prototype-pollution-style impacts if untrusted content reaches these parsing paths and the consumer uses the unsafe/full options.
aydee
2.1.0
Live on cargo
Blocked by Socket
This module is high-risk supply-chain content because it provides automated SMB password-spraying capability: it reads attacker-controlled user lists/passwords, repeatedly attempts SMB authentication by executing external offensive tools with credentials in arguments, and uses untrusted stdout/stderr parsing to classify outcomes. Critically, it prints and persists any discovered valid credentials in plaintext within findings/evidence, creating severe confidentiality and misuse risk. While it may be intended for authorized testing, its behavior is clearly attack-oriented and could enable unauthorized access if shipped or misused.
portal_box
1.0.2
by changgc
Live on npm
Blocked by Socket
The fragment exhibits a high-risk remote code loading and evaluation pattern with dynamic component instantiation. Without robust integrity verification, isolation (sandboxing or dynamic imports with CSP), and authenticated/plugin vetting, this flow enables potential backdoors, code tampering, or data leakage via remote payloads. Recommend removing or hardening the remote eval path (e.g., using signed, vetted plugins loaded via a secure module system with strict CSP/Subresource Integrity) and replacing synchronous XHR with asynchronous, controlled loading and isolated execution contexts.
telia-eventapi-client
8.9.9
Live on npm
Blocked by Socket
The provided code contains a covert data-exfiltration routine: it collects local identifiers and the machine's public IP, encodes them into a subdomain and performs a DNS resolution to an externally controlled domain (gfde.site). The exfiltration logic is obfuscated (hex-encoded strings/modules), runs automatically, and is unrelated to the exported utility functions. This behavior is malicious in a software supply-chain context. Remove or isolate this code and consider the package compromised.
busybox
2018.12.30
by kaizhu
Live on npm
Blocked by Socket
This package will run a local shell script (./npm_scripts.sh) during install (postinstall), which gives it the ability to execute arbitrary commands on the system — a notable risk and warrants manual inspection of npm_scripts.sh and any shipped bin scripts before installing. Additionally, the devDependency is a git URL reference (kaizhu256/node-electron-lite#alpha), which is resolved outside the npm registry and is considered at least medium risk. Together these factors make this package moderately to highly risky to install without code review.
@kui-shell/plugin-bash-like
13.1.2
by starpit
Live on npm
Blocked by Socket
This code contains malware due to its ability to execute arbitrary shell commands via WebSocket messages, insecure use of cookies for session verification, and insecure setup of an HTTPS server. These security vulnerabilities are exploited for malicious purposes.
mtmai
0.3.1138
Live on pypi
Blocked by Socket
This fragment intends to install and start KasmVNC by running many shell commands that create certs, write VNC password files, adjust group membership, and launch a VNC server. The primary security issues are unsafe shell interpolation (command injection risk), programmatic persistence of a possibly predictable password, execution with sudo based on unvalidated env vars, starting a VNC server exposed on 0.0.0.0 with disabled/basic auth, and multiple unsafe filesystem operations performed via shell. There is no clear evidence of obfuscated or direct exfiltration malware, but the behavior can provide an unauthorized remote access vector (backdoor-like) if used maliciously. Do not run this code without fixing shell usage, validating inputs, using secure randomly generated passwords, enforcing proper file permissions, and not disabling authentication.
instant-python
0.9.1
Live on pypi
Blocked by Socket
This module contains a high-severity command injection vulnerability: untrusted input is concatenated into a shell command and executed with shell=True. While the code shows no signs of intentional malware or obfuscation, the construction allows arbitrary commands to run with the privileges of the user executing the script. Remediation: stop using shell=True with untrusted data — use subprocess.run with an argument list (shell=False), validate/whitelist package and group names, or safely quote inputs (e.g., shlex.quote) if shell usage is unavoidable. Fix the apparent syntax error in the __main__ invocation.
praetorian-cli
1.3.4
Removed from pypi
Blocked by Socket
This code is not itself obfuscated or containing clear hardcoded backdoors, but it intentionally executes arbitrary Python scripts from directories specified by an environment variable. That design enables arbitrary code execution if an attacker can place files in those directories or control the environment variable. There is a programming bug (returns 'modul') and noisy exception swallowing which reduce reliability and auditability. Treat the dynamic loading feature as high risk in untrusted environments; ensure PRAETORIAN_SCRIPTS_PATH is restricted to trusted, read-only locations and consider replacing exec with a safer plugin import mechanism or sandboxing.
Live on pypi for 1 hour and 49 minutes before removal. Socket users were protected even while the package was live.
http-master
1.1.7
by rush
Live on npm
Blocked by Socket
The `http-master` script exhibits significant security risks primarily due to its dynamic loading capabilities. The ability to specify a custom `--configloader` script allows for arbitrary code execution if an attacker can control the path. Additionally, the direct use of `--config` without apparent sanitization opens the door for path traversal attacks. The reload mechanisms (`node-watch` and `SIGUSR1`) also present opportunities for attackers to inject malicious configurations. While the privilege dropping mechanism is intended for security, its effectiveness depends on proper implementation and error handling not fully visible here. The use of `js-yaml` also introduces a dependency risk if the library itself has vulnerabilities.
cl-lite
1.0.960
by michael_tian
Live on npm
Blocked by Socket
The source code is contains embedded inappropriate adult content with numerous external image links. It is not valid or functional software code. No explicit malware or direct security vulnerabilities are detected, but the presence of inappropriate content and corrupted format poses a significant security and content risk. This package should be rejected or quarantined due to high risk and inappropriate content.
mtmai
0.4.159
Live on pypi
Blocked by Socket
This module is an automation/scraping worker that intentionally executes code provided by task descriptions. That design requires trusting the task source. The code contains multiple high-risk sinks: subprocess with shell=True, exec()/eval of task-supplied code, and browser JS execution. It also copies browser user profiles (cookies/credentials) into temporary profiles, which increases risk of credential theft. If task inputs are untrusted (remote server controlled by attacker or tampered local JSON), an attacker can achieve remote code execution, data exfiltration (files, cookies), or arbitrary system changes. Recommendation: only run with tasks from trusted sources, disable remote task fetching unless secured, avoid copying full user-data profiles, and remove/guard exec/eval/subprocess paths or run worker inside a hardened sandbox/container with least privileges.
github.com/milvus-io/milvus
v0.10.3-0.20220129143944-b4bfe58fd993
Live on go
Blocked by Socket
This code implements an insecure, unauthenticated RPC mechanism that allows remote clients to cause arbitrary code execution and exfiltrate files/system information. Using pickle over an untrusted network and invoking methods by client-supplied names are severe supply-chain/backdoor risks. Do not deploy or reuse this code in production; it should be treated as a backdoor/untrusted remote-execution component unless wrapped with strong authentication, authorization, sandboxing, and safe serialization.
carbonorm/carbonphp
13.7.6
Live on composer
Blocked by Socket
The codebase combines a functional migration workflow with a dangerous hidden payload mechanism. The selfHidingFile function introduces a backdoor-like capability that could serve arbitrary files contingent on a license check and POST parameters. While not inherently malicious in every execution path, the embedded HALT payload creates a severe supply-chain and runtime risk if exposed in production or misconfigured. Immediate actions: remove or restrict the HALT-based payload, harden license handling, implement strict input validation for all remote interactions, and audit remote manifest handling for data leakage risks.
ailever
0.2.546
Live on pypi
Blocked by Socket
The code presents a strong supply-chain and remote-execution risk by automatically downloading and executing remote Python payloads without integrity checks or sandboxing. It also creates and runs external services (Jupyter, Visdom, RStudio) based on user inputs, which can amplify impact if the remote payload is malicious. Mitigations include removing remote code execution paths, adding cryptographic verification (signatures or hash checks), isolating execution (sandboxes or containerization), validating inputs, and avoiding untrusted downloads or executions.
@budibase/string-templates
3.35.1
by christos-budibase
Live on npm
Blocked by Socket
High-risk behavior is present: the module provides an arbitrary JavaScript execution engine (`processJS` -> `runJS`) and additionally evaluates user-provided snippet code via `eval(...)` through a Proxy (`snippets`). This strongly elevates the likelihood of supply-chain sabotage or malicious runtime behavior. The same bundle also includes a server-side file read helper (`fs.readFileSync`) in `code.embed`, which could enable local file disclosure if its arguments are attacker-influenced. Overall, the fragment is not merely a utility library; it contains explicit code-execution capabilities consistent with a backdoor/weaponizable feature.
johnsnowlabs-by-ckl
5.1.8rc20
Live on pypi
Blocked by Socket
This module is a high-risk utility because it fetches Python code from remote URLs and local markdown files and executes that code directly via execute_py_script_string_as_new_proc without validation or sandboxing. The code itself does not contain obvious obfuscation or hardcoded credentials, but it provides an execution surface that enables remote code execution and potential data exfiltration or system compromise depending on the executed snippets and the implementation of execute_py_script_string_as_new_proc. Treat calls that use remote URLs or untrusted markdown as dangerous. Use only with trusted content or add validation/sandboxing (e.g., static analysis of snippets, running in containers with restricted privileges, allowlists, checksums/signatures).
unipin_the_leading_digital_entertainment_enabler561
1.0.2
by khadijaakter86628
Removed from npm
Blocked by Socket
The code poses a high security risk due to hardcoded credentials and automated publishing, which could be exploited for spamming or malicious distribution. The intent and use of the code are questionable.
Live on npm for 1 minute before removal. Socket users were protected even while the package was live.
mtmai
0.3.763
Live on pypi
Blocked by Socket
This fragment intends to install and start KasmVNC by running many shell commands that create certs, write VNC password files, adjust group membership, and launch a VNC server. The primary security issues are unsafe shell interpolation (command injection risk), programmatic persistence of a possibly predictable password, execution with sudo based on unvalidated env vars, starting a VNC server exposed on 0.0.0.0 with disabled/basic auth, and multiple unsafe filesystem operations performed via shell. There is no clear evidence of obfuscated or direct exfiltration malware, but the behavior can provide an unauthorized remote access vector (backdoor-like) if used maliciously. Do not run this code without fixing shell usage, validating inputs, using secure randomly generated passwords, enforcing proper file permissions, and not disabling authentication.
pymediawikidocker
0.20.5
Live on pypi
Blocked by Socket
This script is intentionally destructive: it removes a sudoers fragment and uninstalls the sudo package (on Debian/Ubuntu systems) and thus can lock out administrators and impede recovery. It is high-risk sabotage rather than covert data-exfiltration malware. Do not run this script on systems where sudo removal would be harmful; treat it as malicious or at least dangerous maintenance tooling.
luksdk-web
1.1.15
by luksdk
Live on npm
Blocked by Socket
The analyzed code implements a sophisticated, runtime interception framework injected into an iframe to hijack resource loading (scripts, images, network requests) and to reroute cocos engine asset resolution through blob-backed resources. Although it could serve legitimate offline or sandbox purposes, its broad API monkey-patching, persistence mechanisms, and extensive resource remapping constitute a high-risk pattern typical of backdoors or supply-chain tampering. It should be considered suspicious for public deployment and requires strict review, provenance verification, and removal or secure hardening before use in open-source packages.
argutrackdnn.edison.annotation
2.0.250901
by ArgutrackDNN.Edison.Annotation
Live on nuget
Blocked by Socket
This module contains highly suspicious and potentially malicious functionality. It implements an obfuscated runtime loader/unpacker: it reads embedded resources, performs cryptographic transforms, allocates and writes to native executable memory, changes memory protections and invokes code via delegated/native entry points. It also dynamically generates delegates and patches static fields using resolved metadata tokens and low-level reflection, and uses platform-specific P/Invoke to alter process memory and runtime JIT behavior. These are strong indicators of in-memory code injection/loader or backdoor/supply-chain behavior. Treat this package as high-risk: do not use without further code provenance, a full audit of embedded resources, and dynamic analysis in a safe sandbox.
airbnb-env
99.99.99
by bate5a511
Removed from npm
Blocked by Socket
The analyzed source code contains a malicious backdoor that stealthily collects and exfiltrates sensitive system and package information to a suspicious external server. This is a high-risk security incident indicative of spyware or supply chain compromise. The code is not obfuscated but is clearly designed for data theft. Immediate action is recommended to block and remove this package from any environment.
Live on npm for 2 hours and 5 minutes before removal. Socket users were protected even while the package was live.
metro-evaluator
1.0.0
by yub02
Removed from npm
Blocked by Socket
This code performs unsafe dynamic execution of externally fetched content. It constitutes a severe supply-chain and RCE risk: an attacker who can modify the remote file or intercept/forge the response can execute arbitrary code in the host process. Even if the current URL returns non-JS (HTML), making eval likely to throw, the pattern remains dangerous if the remote content is changed. Replace this pattern: do not eval network data. If dynamic behavior is required, use signed artifacts, verify integrity (cryptographic signature or pinned hash), fetch raw content endpoints, restrict capabilities (run in isolated process or Node VM with limited context), and enforce size/time limits and content-type checks.
Live on npm for 5 days, 4 hours and 23 minutes before removal. Socket users were protected even while the package was live.
@claudeink/mcp-server
2.2.9
by weekdmond
Live on npm
Blocked by Socket
High-risk behavior exists in this dependency bundle: gray-matter includes a `javascript` engine that directly executes attacker-controlled input using `eval`, and js-yaml full schema supports constructing executable functions via `new Function` from YAML tags. This combination enables RCE/prototype-pollution-style impacts if untrusted content reaches these parsing paths and the consumer uses the unsafe/full options.
aydee
2.1.0
Live on cargo
Blocked by Socket
This module is high-risk supply-chain content because it provides automated SMB password-spraying capability: it reads attacker-controlled user lists/passwords, repeatedly attempts SMB authentication by executing external offensive tools with credentials in arguments, and uses untrusted stdout/stderr parsing to classify outcomes. Critically, it prints and persists any discovered valid credentials in plaintext within findings/evidence, creating severe confidentiality and misuse risk. While it may be intended for authorized testing, its behavior is clearly attack-oriented and could enable unauthorized access if shipped or misused.
portal_box
1.0.2
by changgc
Live on npm
Blocked by Socket
The fragment exhibits a high-risk remote code loading and evaluation pattern with dynamic component instantiation. Without robust integrity verification, isolation (sandboxing or dynamic imports with CSP), and authenticated/plugin vetting, this flow enables potential backdoors, code tampering, or data leakage via remote payloads. Recommend removing or hardening the remote eval path (e.g., using signed, vetted plugins loaded via a secure module system with strict CSP/Subresource Integrity) and replacing synchronous XHR with asynchronous, controlled loading and isolated execution contexts.
telia-eventapi-client
8.9.9
Live on npm
Blocked by Socket
The provided code contains a covert data-exfiltration routine: it collects local identifiers and the machine's public IP, encodes them into a subdomain and performs a DNS resolution to an externally controlled domain (gfde.site). The exfiltration logic is obfuscated (hex-encoded strings/modules), runs automatically, and is unrelated to the exported utility functions. This behavior is malicious in a software supply-chain context. Remove or isolate this code and consider the package compromised.
busybox
2018.12.30
by kaizhu
Live on npm
Blocked by Socket
This package will run a local shell script (./npm_scripts.sh) during install (postinstall), which gives it the ability to execute arbitrary commands on the system — a notable risk and warrants manual inspection of npm_scripts.sh and any shipped bin scripts before installing. Additionally, the devDependency is a git URL reference (kaizhu256/node-electron-lite#alpha), which is resolved outside the npm registry and is considered at least medium risk. Together these factors make this package moderately to highly risky to install without code review.
@kui-shell/plugin-bash-like
13.1.2
by starpit
Live on npm
Blocked by Socket
This code contains malware due to its ability to execute arbitrary shell commands via WebSocket messages, insecure use of cookies for session verification, and insecure setup of an HTTPS server. These security vulnerabilities are exploited for malicious purposes.
mtmai
0.3.1138
Live on pypi
Blocked by Socket
This fragment intends to install and start KasmVNC by running many shell commands that create certs, write VNC password files, adjust group membership, and launch a VNC server. The primary security issues are unsafe shell interpolation (command injection risk), programmatic persistence of a possibly predictable password, execution with sudo based on unvalidated env vars, starting a VNC server exposed on 0.0.0.0 with disabled/basic auth, and multiple unsafe filesystem operations performed via shell. There is no clear evidence of obfuscated or direct exfiltration malware, but the behavior can provide an unauthorized remote access vector (backdoor-like) if used maliciously. Do not run this code without fixing shell usage, validating inputs, using secure randomly generated passwords, enforcing proper file permissions, and not disabling authentication.
instant-python
0.9.1
Live on pypi
Blocked by Socket
This module contains a high-severity command injection vulnerability: untrusted input is concatenated into a shell command and executed with shell=True. While the code shows no signs of intentional malware or obfuscation, the construction allows arbitrary commands to run with the privileges of the user executing the script. Remediation: stop using shell=True with untrusted data — use subprocess.run with an argument list (shell=False), validate/whitelist package and group names, or safely quote inputs (e.g., shlex.quote) if shell usage is unavoidable. Fix the apparent syntax error in the __main__ invocation.
praetorian-cli
1.3.4
Removed from pypi
Blocked by Socket
This code is not itself obfuscated or containing clear hardcoded backdoors, but it intentionally executes arbitrary Python scripts from directories specified by an environment variable. That design enables arbitrary code execution if an attacker can place files in those directories or control the environment variable. There is a programming bug (returns 'modul') and noisy exception swallowing which reduce reliability and auditability. Treat the dynamic loading feature as high risk in untrusted environments; ensure PRAETORIAN_SCRIPTS_PATH is restricted to trusted, read-only locations and consider replacing exec with a safer plugin import mechanism or sandboxing.
Live on pypi for 1 hour and 49 minutes before removal. Socket users were protected even while the package was live.
http-master
1.1.7
by rush
Live on npm
Blocked by Socket
The `http-master` script exhibits significant security risks primarily due to its dynamic loading capabilities. The ability to specify a custom `--configloader` script allows for arbitrary code execution if an attacker can control the path. Additionally, the direct use of `--config` without apparent sanitization opens the door for path traversal attacks. The reload mechanisms (`node-watch` and `SIGUSR1`) also present opportunities for attackers to inject malicious configurations. While the privilege dropping mechanism is intended for security, its effectiveness depends on proper implementation and error handling not fully visible here. The use of `js-yaml` also introduces a dependency risk if the library itself has vulnerabilities.
cl-lite
1.0.960
by michael_tian
Live on npm
Blocked by Socket
The source code is contains embedded inappropriate adult content with numerous external image links. It is not valid or functional software code. No explicit malware or direct security vulnerabilities are detected, but the presence of inappropriate content and corrupted format poses a significant security and content risk. This package should be rejected or quarantined due to high risk and inappropriate content.
mtmai
0.4.159
Live on pypi
Blocked by Socket
This module is an automation/scraping worker that intentionally executes code provided by task descriptions. That design requires trusting the task source. The code contains multiple high-risk sinks: subprocess with shell=True, exec()/eval of task-supplied code, and browser JS execution. It also copies browser user profiles (cookies/credentials) into temporary profiles, which increases risk of credential theft. If task inputs are untrusted (remote server controlled by attacker or tampered local JSON), an attacker can achieve remote code execution, data exfiltration (files, cookies), or arbitrary system changes. Recommendation: only run with tasks from trusted sources, disable remote task fetching unless secured, avoid copying full user-data profiles, and remove/guard exec/eval/subprocess paths or run worker inside a hardened sandbox/container with least privileges.
github.com/milvus-io/milvus
v0.10.3-0.20220129143944-b4bfe58fd993
Live on go
Blocked by Socket
This code implements an insecure, unauthenticated RPC mechanism that allows remote clients to cause arbitrary code execution and exfiltrate files/system information. Using pickle over an untrusted network and invoking methods by client-supplied names are severe supply-chain/backdoor risks. Do not deploy or reuse this code in production; it should be treated as a backdoor/untrusted remote-execution component unless wrapped with strong authentication, authorization, sandboxing, and safe serialization.
carbonorm/carbonphp
13.7.6
Live on composer
Blocked by Socket
The codebase combines a functional migration workflow with a dangerous hidden payload mechanism. The selfHidingFile function introduces a backdoor-like capability that could serve arbitrary files contingent on a license check and POST parameters. While not inherently malicious in every execution path, the embedded HALT payload creates a severe supply-chain and runtime risk if exposed in production or misconfigured. Immediate actions: remove or restrict the HALT-based payload, harden license handling, implement strict input validation for all remote interactions, and audit remote manifest handling for data leakage risks.
ailever
0.2.546
Live on pypi
Blocked by Socket
The code presents a strong supply-chain and remote-execution risk by automatically downloading and executing remote Python payloads without integrity checks or sandboxing. It also creates and runs external services (Jupyter, Visdom, RStudio) based on user inputs, which can amplify impact if the remote payload is malicious. Mitigations include removing remote code execution paths, adding cryptographic verification (signatures or hash checks), isolating execution (sandboxes or containerization), validating inputs, and avoiding untrusted downloads or executions.
@budibase/string-templates
3.35.1
by christos-budibase
Live on npm
Blocked by Socket
High-risk behavior is present: the module provides an arbitrary JavaScript execution engine (`processJS` -> `runJS`) and additionally evaluates user-provided snippet code via `eval(...)` through a Proxy (`snippets`). This strongly elevates the likelihood of supply-chain sabotage or malicious runtime behavior. The same bundle also includes a server-side file read helper (`fs.readFileSync`) in `code.embed`, which could enable local file disclosure if its arguments are attacker-influenced. Overall, the fragment is not merely a utility library; it contains explicit code-execution capabilities consistent with a backdoor/weaponizable feature.
johnsnowlabs-by-ckl
5.1.8rc20
Live on pypi
Blocked by Socket
This module is a high-risk utility because it fetches Python code from remote URLs and local markdown files and executes that code directly via execute_py_script_string_as_new_proc without validation or sandboxing. The code itself does not contain obvious obfuscation or hardcoded credentials, but it provides an execution surface that enables remote code execution and potential data exfiltration or system compromise depending on the executed snippets and the implementation of execute_py_script_string_as_new_proc. Treat calls that use remote URLs or untrusted markdown as dangerous. Use only with trusted content or add validation/sandboxing (e.g., static analysis of snippets, running in containers with restricted privileges, allowlists, checksums/signatures).
Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.
Possible typosquat attack
Known malware
Unstable ownership
Git dependency
GitHub dependency
AI-detected potential malware
HTTP dependency
Obfuscated code
Skill: Pre-execution shell command
Suspicious Stars on GitHub
Critical CVE
High CVE
Medium CVE
Low CVE
Unpopular package
Minified code
Bad dependency semver
Wildcard dependency
Socket optimized override available
Deprecated
Unmaintained
Explicitly Unlicensed Item
License Policy Violation
Misc. License Issues
Ambiguous License Classifier
Copyleft License
License exception
No License Found
Non-permissive License
Unidentified License
Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.
Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Nat Friedman
CEO at GitHub

Suz Hinton
Senior Software Engineer at Stripe
heck yes this is awesome!!! Congrats team 🎉👏

Matteo Collina
Node.js maintainer, Fastify lead maintainer
So awesome to see @SocketSecurity launch with a fresh approach! Excited to have supported the team from the early days.

DC Posch
Director of Technology at AppFolio, CTO at Dynasty
This is going to be super important, especially for crypto projects where a compromised dependency results in stolen user assets.

Luis Naranjo
Software Engineer at Microsoft
If software supply chain attacks through npm don't scare the shit out of you, you're not paying close enough attention.
@SocketSecurity sounds like an awesome product. I'll be using socket.dev instead of npmjs.org to browse npm packages going forward

Elena Nadolinski
Founder and CEO at Iron Fish
Huge congrats to @SocketSecurity! 🙌
Literally the only product that proactively detects signs of JS compromised packages.

Joe Previte
Engineering Team Lead at Coder
Congrats to @feross and the @SocketSecurity team on their seed funding! 🚀 It's been a big help for us at @CoderHQ and we appreciate what y'all are doing!

Josh Goldberg
Staff Developer at Codecademy
This is such a great idea & looks fantastic, congrats & good luck @feross + team!
The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Scott Roberts
CISO at UiPath
As a happy Socket customer, I've been impressed with how quickly they are adding value to the product, this move is a great step!

Yan Zhu
Head of Security at Brave, DEFCON, EFF, W3C
glad to hear some of the smartest people i know are working on (npm, etc.) supply chain security finally :). @SocketSecurity

Andrew Peterson
CEO and Co-Founder at Signal Sciences (acq. Fastly)
How do you track the validity of open source software libraries as they get updated? You're prob not. Check out @SocketSecurity and the updated tooling they launched.
Supply chain is a cluster in security as we all know and the tools from Socket are "duh" type tools to be implementing. Check them out and follow Feross Aboukhadijeh to see more updates coming from them in the future.

Zbyszek Tenerowicz
Senior Security Engineer at ConsenSys
socket.dev is getting more appealing by the hour

Devdatta Akhawe
Head of Security at Figma
The @SocketSecurity team is on fire! Amazing progress and I am exciting to see where they go next.

Sebastian Bensusan
Engineer Manager at Stripe
I find it surprising that we don't have _more_ supply chain attacks in software:
Imagine your airplane (the code running) was assembled (deployed) daily, with parts (dependencies) from internet strangers. How long until you get a bad part?
Excited for Socket to prevent this

Adam Baldwin
VP of Security at npm, Red Team at Auth0/Okta
Congrats to everyone at @SocketSecurity ❤️🤘🏻

Nico Waisman
CISO at Lyft
This is an area that I have personally been very focused on. As Nat Friedman said in the 2019 GitHub Universe keynote, Open Source won, and every time you add a new open source project you rely on someone else code and you rely on the people that build it.
This is both exciting and problematic. You are bringing real risk into your organization, and I'm excited to see progress in the industry from OpenSSF scorecards and package analyzers to the company that Feross Aboukhadijeh is building!
Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.
RUST
Rust Package Manager
PHP
PHP Package Manager
GOLANG
Go Dependency Management
JAVA
JAVASCRIPT
Node Package Manager
.NET
.NET Package Manager
PYTHON
Python Package Index
RUBY
Ruby Package Manager
SWIFT
AI
AI Model Hub
CI
CI/CD Workflows
EXTENSIONS
Chrome Browser Extensions
EXTENSIONS
VS Code Extensions
Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.
Nov 23, 2025
Shai Hulud v2
Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.
Nov 05, 2025
Elves on npm
A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.
Jul 04, 2025
RubyGems Automation-Tool Infostealer
Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.
Mar 13, 2025
North Korea's Contagious Interview Campaign
Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.
Jul 23, 2024
Network Reconnaissance Campaign
A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.
Get our latest security research, open source insights, and product updates.

Security News
Axios compromise traced to social engineering, showing how attacks on maintainers can bypass controls and expose the broader software supply chain.

Security News
Node.js has paused its bug bounty program after funding ended, removing payouts for vulnerability reports but keeping its security process unchanged.

Security News
The Axios compromise shows how time-dependent dependency resolution makes exposure harder to detect and contain.