
Company News
Socket Named Top Sales Organization by RepVue
Socket won two 2026 Reppy Awards from RepVue, ranking in the top 5% of all sales orgs. AE Alexandra Lister shares what it's like to grow a sales career here.
Questions? Call us at (844) SOCKET-0
Quickly evaluate the security and health of any open source package.
netkiller-devops
0.7.11
Live on pypi
Blocked by Socket
This script is a legitimate-looking MySQL backup utility that dumps database schemas to files and pushes them to a git repository. It contains high-risk practices: plaintext hardcoded DB credentials and automated pushes of backups to a remote (git@192.168.30.5:...) which can lead to data exfiltration if the remote is not fully trusted. I find no clear signs of active malware (no reverse shell, no obfuscation, no code injection), but the script poses a moderate-to-high security risk due to credential exposure and potential unauthorized data disclosure.
stuphos
2.0.5
Live on pypi
Blocked by Socket
This module constructs configurable tracking endpoints and transmits local information (boot time, system name, secret key) to them. The most serious issue is that the remote response is forwarded unchanged into a privileged internal command-execution API (ExecuteTrustedCommandMessage) via callObjectMethod. That creates a clear remote-to-trusted-execution path — effectively a backdoor if the tracking endpoint or configuration is attacker-controlled. The presence of a hard-coded default secret key and lack of any response validation amplify the risk. Combined, these behaviors constitute a high security risk for supply-chain/backdoor exploitation. Additionally, the code as provided contains a syntax error in GetBootStartTime that would prevent execution; if corrected, the runtime risks described apply. Recommend removing or hardening the remote-response -> trusted-execution flow (e.g., signing, strict schema validation, authorization checks), removing hard-coded secrets, and avoiding automatic execution of remote-sourced messages.
@okx_ai/okx-trade-mcp
1.2.8-beta.1
by oker_steve
Live on npm
Blocked by Socket
This package will attempt to run scripts/postinstall.js during install. The build step copies that file from a parent directory (../../scripts/postinstall-notice.js) into the package scripts/ folder, and the package relies on a file: devDependency. Both facts increase supply-chain risk: the postinstall code executed during npm install may originate from outside the package registry and can run arbitrary Node code (data exfiltration, telemetry, shell command execution, etc.). You should inspect the exact contents of the referenced postinstall-notice.js and the file:../core package before trusting this package. Treat this as a high security risk until verified.
@vendasta/sales-orders
4.3.0
by vendasta
Live on npm
Blocked by Socket
The code largely represents a standard generated API client for document-related endpoints. The critical concern is the embedded obfuscated payload at the end of the file, which could enable remote code execution or data exfiltration if executed under certain conditions. This constitutes a significant supply-chain risk. Immediate actions: audit the build process, verify no post-build transformations reintroduce such payloads, scan for dynamic evaluation paths, and consider replacing or isolating the package until the payload can be reconciled or removed.
plotxy
1.0.7
Removed from pypi
Blocked by Socket
The code is a transformation tool that injects monkey patches into an ESLint Linter implementation. The main security concern is the dynamic require of a module path taken from an environment variable and the resulting embedding of that module's APIs into a patched linter file. That pattern allows arbitrary code (if the env var or module is untrusted) to run during both patch generation and later when the patched linter executes, to suppress lint findings, and to alter module resolution. The snippet itself is not obfuscated or directly malicious, but it creates a high-impact capability that must be tightly controlled: ensure the environment-variable path is only set to vetted code, audit the external module, or avoid in-place vendor modifications in favor of safer extension mechanisms.
Live on pypi for 20 hours and 45 minutes before removal. Socket users were protected even while the package was live.
xync-client
0.0.99
Live on pypi
Blocked by Socket
This code is malicious in intent: it automates fraudulent interaction with a banking website, contains hardcoded sensitive credentials, evades automation detection, prompts an operator to supply OTPs (social-engineering), performs money transfers, and persists session state to disk for reuse. It should be treated as a tool for account takeover and financial theft. Do not run it; remove any storage_state files and investigate systems where it executed. The snippet also contains syntax errors and is incomplete, but those do not mitigate the clearly malicious purpose.
bapy
0.2.238
Live on pypi
Blocked by Socket
Malicious bash initialization script that performs destructive filesystem operations on macOS systems. When the external helper script 'isuserdarwin.sh' returns true, the script silently executes 'sudo rm -rf' to delete critical user directories including ~/Applications, ~/Movies, ~/Music, ~/Pictures, ~/Public, and ~/Sites without user confirmation. It also removes the macOS sleepimage file at /private/var/vm/sleepimage. The script modifies SSH directory permissions using 'sudo chmod -R go-rw' which can break SSH access or expose credentials. All destructive operations have their output suppressed with '>/dev/null 2>&1' to hide failures and make the actions stealthy. The script uses eval to execute the output of /usr/bin/dircolors, creating a command injection risk if the binary is compromised. It depends on external scripts (paper.sh, isuserdarwin.sh, debug.sh) whose contents are unknown and could execute arbitrary code. The destructive operations are embedded within what appears to be routine shell configuration code, likely to disguise the malicious intent.
bapy
0.2.258
Live on pypi
Blocked by Socket
The script covertly ensures a background SSH local port-forward to a hard-coded external host as root, clearing any existing ssh on the same local port first. This pattern is consistent with establishing a covert access or exfiltration channel (notably to a MongoDB-like service on port 27017). It is high-risk: investigate origins of the script, the remote IP, root SSH keys and authorized_keys, and any processes or tools that use local:9999. If unexpected, remove and rotate credentials/keys and perform host compromise analysis.
hackingtools
3.0.0.46
Live on pypi
Blocked by Socket
The code demonstrates high-risk behavior typical of dropper/packer-like workflows: encrypted payloads embedded in stubs, base64-wrapped code executed at runtime, and optional packaging into executables. While there are syntax anomalies and incomplete branches that prevent immediate execution, the overall pattern is aligned with covert payload delivery or supply-chain risk. Thorough review of the complete, verified source is required before use; treat as dangerous and isolate until confirmed safe.
eslint-plugin-security-rules
0.6.5
by lasselupe33
Live on npm
Blocked by Socket
This file contains explicit, high-risk malicious behavior: it fetches data from a hard-coded external domain and injects that data into numerous execution and DOM sinks (script insertion, event handlers, innerHTML/document.write, eval/new Function, and navigation APIs). The combination of an external hard-coded domain and direct use in dynamic-execution and navigation APIs is consistent with code intended to execute attacker-supplied code and perform redirects/exfiltration. Do not include or run this code in production; treat as malicious.
lidapy
0.0.3
Removed from pypi
Blocked by Socket
This module contains a dangerous dynamic module-loading pattern: it searches broad filesystem locations for <module>.py and executes the first match without validation. While the code shown does not itself perform network exfiltration or contain obvious malicious payloads, the load_from_module design creates a substantial arbitrary code execution / supply-chain risk. Treat this as a high-security-risk pattern: lock down module search paths, validate or sign loaded modules, or avoid searching user/root-wide paths. The likelihood that this fragment is intentionally malicious is low (no obfuscation or payloads), but the vulnerability it introduces is severe and exploitable if an attacker can place or control files on disk.
Live on pypi for 2 hours and 8 minutes before removal. Socket users were protected even while the package was live.
int_pinterest_sfra
99.99.10
by ahmedlsaber42
Removed from npm
Blocked by Socket
This script uses 'wget' to collect and transmit environment variables and system details (e.g., username, user ID, group ID, hostname, shell, home directory, operating system, kernel version, architecture) to a remote host at 3imiu703wzi9xjg7v85om4b23t9kxalz[.]oastify[.]com without user consent, demonstrating malicious intent and posing a significant security risk.
Live on npm for 10 days and 14 hours before removal. Socket users were protected even while the package was live.
bbin
1.0.43
by j5pu
Live on npm
Blocked by Socket
This package intentionally executes global installs/removals and repository-changing commands during lifecycle hooks. That behavior is high risk: it can execute arbitrary code from third-party packages, alter the repository, and potentially run unknown commands like "npm-auth" which could capture credentials or exfiltrate data. Unless you fully trust the publisher and the packages listed, do not install this package. Review the content of the globally installed packages and the implementation of any referenced scripts before allowing installation.
bagbag
0.58.14
Removed from pypi
Blocked by Socket
The code presents significant privacy risks and potential for misuse in generating fake identities, which is indicative of malicious intent. The scraping of sensitive information from a third-party website without clear user consent is highly suspicious.
Live on pypi for 6 minutes before removal. Socket users were protected even while the package was live.
tensorflow-tensorboard
0.1.1
Live on pypi
Blocked by Socket
This code fragment is mostly benign utility code but contains a suspicious hidden 'easter egg' WSGI wrapper that decodes an embedded base64+zlib payload and serves it when a magic QUERY_STRING is present, and it adds an X-Powered-By header. That behavior constitutes a covert response path/backdoor-like functionality and is a supply-chain risk. The fragment as provided is syntactically/semantically broken in multiple places, suggesting it is incomplete or tampered with; however the presence of obfuscated embedded payload and a magic trigger is concerning. Recommend removing or auditing the easteregg functionality and verifying the package contents and provenance before use.
upstartportal
99.99.1
by realvivek07
Removed from npm
Blocked by Socket
This module exhibits strong indicators of malicious supply-chain activity: it harvests sensitive local secrets and configuration files, performs extensive host/network/process and environment discovery, attempts to collect cloud and Kubernetes credentials (AWS/GCP metadata and the Kubernetes service account token), and exfiltrates the gathered data to an external callback server. Exfiltration uses disabled TLS verification (rejectUnauthorized:false) and includes a plaintext HTTP fallback, further increasing the likelihood of successful data theft.
Live on npm for 1 day, 19 hours and 7 minutes before removal. Socket users were protected even while the package was live.
bluelamp-ai
1.0.1
Live on pypi
Blocked by Socket
High-risk loader: the module hides and executes an embedded payload via base64+zlib and exec(), preventing static review and granting the payload full interpreter privileges. Treat as potentially malicious — do not import in production or CI. Decode and audit the decompressed payload in an isolated, offline environment before permitting use. Implement containment (sandbox, offline VM) to inspect behavior and network I/O before trusting.
tastyigniter/ti-theme-orange
4.0.7
Live on composer
Blocked by Socket
This bundle contains genuine open-source UI libraries but has an unmistakable malicious/intrusive insertion inside the SweetAlert2 module: locale+host detection combined with a timed, persistent trigger that disables pointer events and injects & autoplays an audio file hosted on a third-party domain. This behavior is unrelated to the libraries' purpose and constitutes a backdoor/tainted-supply-chain compromise. Treat the package as compromised: do not deploy; obtain official, verified copies; inspect package provenance and lockfiles; and rotate/inspect any client state where this bundle ran.
claudetalk-bridge
2.1.0
by lambdasw
Live on npm
Blocked by Socket
Best-matching report: Report 3. This module is highly suspicious as a remote-controlled bridge: it connects to a hardcoded non-TLS WebSocket relay, accepts remote prompt text without authentication/authorization controls, spawns a local `claude` CLI using that untrusted text, and streams the model’s output back to the relay. The primary risks are privacy/data exfiltration and abuse of local model execution rather than classic malware primitives. Network egress should be restricted/monitored and the relay endpoint treated as a high-sensitivity indicator.
deskpro-notifications-service
69.2.22
by adityan_captain_rip
Removed from npm
Blocked by Socket
The script collects the user's current working directory and sends it to a remote server via DNS lookup, potentially leaking sensitive information.
Live on npm for 11 minutes before removal. Socket users were protected even while the package was live.
@sesamy/sesamy-js
1.117.0
by markusahlstrand
Live on npm
Blocked by Socket
Most of the module aligns with typical SPA OAuth/OIDC and DPoP-auth flows, including JWT validation, token exchange, and caching. The primary high-risk anomaly is the runtime decoding and execution of an embedded base64 JavaScript blob as a Web Worker. Because that worker can coordinate refresh/token retrieval while the module persists access/refresh tokens in browser storage and cookies, any malicious or tampered worker logic could plausibly steal or manipulate tokens. The fragment does not conclusively prove malware, but the worker injection/execution design is a significant supply-chain security red flag that should be independently verified (decode the embedded worker payload and audit its network/storage behavior).
354766/boshu2/agentops/crank/
0999705787a325638808a138a04840edf1c0c42d
Live on socket
Blocked by Socket
[Skill Scanner] Installation of third-party script detected The Crank orchestration blueprint represents a coherent, purpose-built solution for autonomous epic execution using swarm-based parallelism with dual tracking modes and governance hooks. It does not reveal malicious intent or backdoors; however, its power to autonomously modify state across multiple systems warrants strict access control, comprehensive logging, and fail-safes. Treat as BENIGN with SUSPICIOUS potential in untrusted environments until proper safeguards are verified. LLM verification: This skill matches its stated purpose but contains multiple high-risk operational behaviors: mandatory autonomous execution, ability to mutate issue trackers, and spawning of unspecified external worker backends that can run arbitrary code and perform network I/O. No obfuscated or explicitly malicious code was found in the fragment, but the design permits data leakage and unilateral destructive actions. Do not run this skill in production or on sensitive repositories without adding explicit safe
github.com/milvus-io/milvus
v0.10.3-0.20211013132033-59daccf67c95
Live on go
Blocked by Socket
This code implements an insecure, unauthenticated RPC mechanism that allows remote clients to cause arbitrary code execution and exfiltrate files/system information. Using pickle over an untrusted network and invoking methods by client-supplied names are severe supply-chain/backdoor risks. Do not deploy or reuse this code in production; it should be treated as a backdoor/untrusted remote-execution component unless wrapped with strong authentication, authorization, sandboxing, and safe serialization.
netkiller-devops
0.7.11
Live on pypi
Blocked by Socket
This script is a legitimate-looking MySQL backup utility that dumps database schemas to files and pushes them to a git repository. It contains high-risk practices: plaintext hardcoded DB credentials and automated pushes of backups to a remote (git@192.168.30.5:...) which can lead to data exfiltration if the remote is not fully trusted. I find no clear signs of active malware (no reverse shell, no obfuscation, no code injection), but the script poses a moderate-to-high security risk due to credential exposure and potential unauthorized data disclosure.
stuphos
2.0.5
Live on pypi
Blocked by Socket
This module constructs configurable tracking endpoints and transmits local information (boot time, system name, secret key) to them. The most serious issue is that the remote response is forwarded unchanged into a privileged internal command-execution API (ExecuteTrustedCommandMessage) via callObjectMethod. That creates a clear remote-to-trusted-execution path — effectively a backdoor if the tracking endpoint or configuration is attacker-controlled. The presence of a hard-coded default secret key and lack of any response validation amplify the risk. Combined, these behaviors constitute a high security risk for supply-chain/backdoor exploitation. Additionally, the code as provided contains a syntax error in GetBootStartTime that would prevent execution; if corrected, the runtime risks described apply. Recommend removing or hardening the remote-response -> trusted-execution flow (e.g., signing, strict schema validation, authorization checks), removing hard-coded secrets, and avoiding automatic execution of remote-sourced messages.
@okx_ai/okx-trade-mcp
1.2.8-beta.1
by oker_steve
Live on npm
Blocked by Socket
This package will attempt to run scripts/postinstall.js during install. The build step copies that file from a parent directory (../../scripts/postinstall-notice.js) into the package scripts/ folder, and the package relies on a file: devDependency. Both facts increase supply-chain risk: the postinstall code executed during npm install may originate from outside the package registry and can run arbitrary Node code (data exfiltration, telemetry, shell command execution, etc.). You should inspect the exact contents of the referenced postinstall-notice.js and the file:../core package before trusting this package. Treat this as a high security risk until verified.
@vendasta/sales-orders
4.3.0
by vendasta
Live on npm
Blocked by Socket
The code largely represents a standard generated API client for document-related endpoints. The critical concern is the embedded obfuscated payload at the end of the file, which could enable remote code execution or data exfiltration if executed under certain conditions. This constitutes a significant supply-chain risk. Immediate actions: audit the build process, verify no post-build transformations reintroduce such payloads, scan for dynamic evaluation paths, and consider replacing or isolating the package until the payload can be reconciled or removed.
plotxy
1.0.7
Removed from pypi
Blocked by Socket
The code is a transformation tool that injects monkey patches into an ESLint Linter implementation. The main security concern is the dynamic require of a module path taken from an environment variable and the resulting embedding of that module's APIs into a patched linter file. That pattern allows arbitrary code (if the env var or module is untrusted) to run during both patch generation and later when the patched linter executes, to suppress lint findings, and to alter module resolution. The snippet itself is not obfuscated or directly malicious, but it creates a high-impact capability that must be tightly controlled: ensure the environment-variable path is only set to vetted code, audit the external module, or avoid in-place vendor modifications in favor of safer extension mechanisms.
Live on pypi for 20 hours and 45 minutes before removal. Socket users were protected even while the package was live.
xync-client
0.0.99
Live on pypi
Blocked by Socket
This code is malicious in intent: it automates fraudulent interaction with a banking website, contains hardcoded sensitive credentials, evades automation detection, prompts an operator to supply OTPs (social-engineering), performs money transfers, and persists session state to disk for reuse. It should be treated as a tool for account takeover and financial theft. Do not run it; remove any storage_state files and investigate systems where it executed. The snippet also contains syntax errors and is incomplete, but those do not mitigate the clearly malicious purpose.
bapy
0.2.238
Live on pypi
Blocked by Socket
Malicious bash initialization script that performs destructive filesystem operations on macOS systems. When the external helper script 'isuserdarwin.sh' returns true, the script silently executes 'sudo rm -rf' to delete critical user directories including ~/Applications, ~/Movies, ~/Music, ~/Pictures, ~/Public, and ~/Sites without user confirmation. It also removes the macOS sleepimage file at /private/var/vm/sleepimage. The script modifies SSH directory permissions using 'sudo chmod -R go-rw' which can break SSH access or expose credentials. All destructive operations have their output suppressed with '>/dev/null 2>&1' to hide failures and make the actions stealthy. The script uses eval to execute the output of /usr/bin/dircolors, creating a command injection risk if the binary is compromised. It depends on external scripts (paper.sh, isuserdarwin.sh, debug.sh) whose contents are unknown and could execute arbitrary code. The destructive operations are embedded within what appears to be routine shell configuration code, likely to disguise the malicious intent.
bapy
0.2.258
Live on pypi
Blocked by Socket
The script covertly ensures a background SSH local port-forward to a hard-coded external host as root, clearing any existing ssh on the same local port first. This pattern is consistent with establishing a covert access or exfiltration channel (notably to a MongoDB-like service on port 27017). It is high-risk: investigate origins of the script, the remote IP, root SSH keys and authorized_keys, and any processes or tools that use local:9999. If unexpected, remove and rotate credentials/keys and perform host compromise analysis.
hackingtools
3.0.0.46
Live on pypi
Blocked by Socket
The code demonstrates high-risk behavior typical of dropper/packer-like workflows: encrypted payloads embedded in stubs, base64-wrapped code executed at runtime, and optional packaging into executables. While there are syntax anomalies and incomplete branches that prevent immediate execution, the overall pattern is aligned with covert payload delivery or supply-chain risk. Thorough review of the complete, verified source is required before use; treat as dangerous and isolate until confirmed safe.
eslint-plugin-security-rules
0.6.5
by lasselupe33
Live on npm
Blocked by Socket
This file contains explicit, high-risk malicious behavior: it fetches data from a hard-coded external domain and injects that data into numerous execution and DOM sinks (script insertion, event handlers, innerHTML/document.write, eval/new Function, and navigation APIs). The combination of an external hard-coded domain and direct use in dynamic-execution and navigation APIs is consistent with code intended to execute attacker-supplied code and perform redirects/exfiltration. Do not include or run this code in production; treat as malicious.
lidapy
0.0.3
Removed from pypi
Blocked by Socket
This module contains a dangerous dynamic module-loading pattern: it searches broad filesystem locations for <module>.py and executes the first match without validation. While the code shown does not itself perform network exfiltration or contain obvious malicious payloads, the load_from_module design creates a substantial arbitrary code execution / supply-chain risk. Treat this as a high-security-risk pattern: lock down module search paths, validate or sign loaded modules, or avoid searching user/root-wide paths. The likelihood that this fragment is intentionally malicious is low (no obfuscation or payloads), but the vulnerability it introduces is severe and exploitable if an attacker can place or control files on disk.
Live on pypi for 2 hours and 8 minutes before removal. Socket users were protected even while the package was live.
int_pinterest_sfra
99.99.10
by ahmedlsaber42
Removed from npm
Blocked by Socket
This script uses 'wget' to collect and transmit environment variables and system details (e.g., username, user ID, group ID, hostname, shell, home directory, operating system, kernel version, architecture) to a remote host at 3imiu703wzi9xjg7v85om4b23t9kxalz[.]oastify[.]com without user consent, demonstrating malicious intent and posing a significant security risk.
Live on npm for 10 days and 14 hours before removal. Socket users were protected even while the package was live.
bbin
1.0.43
by j5pu
Live on npm
Blocked by Socket
This package intentionally executes global installs/removals and repository-changing commands during lifecycle hooks. That behavior is high risk: it can execute arbitrary code from third-party packages, alter the repository, and potentially run unknown commands like "npm-auth" which could capture credentials or exfiltrate data. Unless you fully trust the publisher and the packages listed, do not install this package. Review the content of the globally installed packages and the implementation of any referenced scripts before allowing installation.
bagbag
0.58.14
Removed from pypi
Blocked by Socket
The code presents significant privacy risks and potential for misuse in generating fake identities, which is indicative of malicious intent. The scraping of sensitive information from a third-party website without clear user consent is highly suspicious.
Live on pypi for 6 minutes before removal. Socket users were protected even while the package was live.
tensorflow-tensorboard
0.1.1
Live on pypi
Blocked by Socket
This code fragment is mostly benign utility code but contains a suspicious hidden 'easter egg' WSGI wrapper that decodes an embedded base64+zlib payload and serves it when a magic QUERY_STRING is present, and it adds an X-Powered-By header. That behavior constitutes a covert response path/backdoor-like functionality and is a supply-chain risk. The fragment as provided is syntactically/semantically broken in multiple places, suggesting it is incomplete or tampered with; however the presence of obfuscated embedded payload and a magic trigger is concerning. Recommend removing or auditing the easteregg functionality and verifying the package contents and provenance before use.
upstartportal
99.99.1
by realvivek07
Removed from npm
Blocked by Socket
This module exhibits strong indicators of malicious supply-chain activity: it harvests sensitive local secrets and configuration files, performs extensive host/network/process and environment discovery, attempts to collect cloud and Kubernetes credentials (AWS/GCP metadata and the Kubernetes service account token), and exfiltrates the gathered data to an external callback server. Exfiltration uses disabled TLS verification (rejectUnauthorized:false) and includes a plaintext HTTP fallback, further increasing the likelihood of successful data theft.
Live on npm for 1 day, 19 hours and 7 minutes before removal. Socket users were protected even while the package was live.
bluelamp-ai
1.0.1
Live on pypi
Blocked by Socket
High-risk loader: the module hides and executes an embedded payload via base64+zlib and exec(), preventing static review and granting the payload full interpreter privileges. Treat as potentially malicious — do not import in production or CI. Decode and audit the decompressed payload in an isolated, offline environment before permitting use. Implement containment (sandbox, offline VM) to inspect behavior and network I/O before trusting.
tastyigniter/ti-theme-orange
4.0.7
Live on composer
Blocked by Socket
This bundle contains genuine open-source UI libraries but has an unmistakable malicious/intrusive insertion inside the SweetAlert2 module: locale+host detection combined with a timed, persistent trigger that disables pointer events and injects & autoplays an audio file hosted on a third-party domain. This behavior is unrelated to the libraries' purpose and constitutes a backdoor/tainted-supply-chain compromise. Treat the package as compromised: do not deploy; obtain official, verified copies; inspect package provenance and lockfiles; and rotate/inspect any client state where this bundle ran.
claudetalk-bridge
2.1.0
by lambdasw
Live on npm
Blocked by Socket
Best-matching report: Report 3. This module is highly suspicious as a remote-controlled bridge: it connects to a hardcoded non-TLS WebSocket relay, accepts remote prompt text without authentication/authorization controls, spawns a local `claude` CLI using that untrusted text, and streams the model’s output back to the relay. The primary risks are privacy/data exfiltration and abuse of local model execution rather than classic malware primitives. Network egress should be restricted/monitored and the relay endpoint treated as a high-sensitivity indicator.
deskpro-notifications-service
69.2.22
by adityan_captain_rip
Removed from npm
Blocked by Socket
The script collects the user's current working directory and sends it to a remote server via DNS lookup, potentially leaking sensitive information.
Live on npm for 11 minutes before removal. Socket users were protected even while the package was live.
@sesamy/sesamy-js
1.117.0
by markusahlstrand
Live on npm
Blocked by Socket
Most of the module aligns with typical SPA OAuth/OIDC and DPoP-auth flows, including JWT validation, token exchange, and caching. The primary high-risk anomaly is the runtime decoding and execution of an embedded base64 JavaScript blob as a Web Worker. Because that worker can coordinate refresh/token retrieval while the module persists access/refresh tokens in browser storage and cookies, any malicious or tampered worker logic could plausibly steal or manipulate tokens. The fragment does not conclusively prove malware, but the worker injection/execution design is a significant supply-chain security red flag that should be independently verified (decode the embedded worker payload and audit its network/storage behavior).
354766/boshu2/agentops/crank/
0999705787a325638808a138a04840edf1c0c42d
Live on socket
Blocked by Socket
[Skill Scanner] Installation of third-party script detected The Crank orchestration blueprint represents a coherent, purpose-built solution for autonomous epic execution using swarm-based parallelism with dual tracking modes and governance hooks. It does not reveal malicious intent or backdoors; however, its power to autonomously modify state across multiple systems warrants strict access control, comprehensive logging, and fail-safes. Treat as BENIGN with SUSPICIOUS potential in untrusted environments until proper safeguards are verified. LLM verification: This skill matches its stated purpose but contains multiple high-risk operational behaviors: mandatory autonomous execution, ability to mutate issue trackers, and spawning of unspecified external worker backends that can run arbitrary code and perform network I/O. No obfuscated or explicitly malicious code was found in the fragment, but the design permits data leakage and unilateral destructive actions. Do not run this skill in production or on sensitive repositories without adding explicit safe
github.com/milvus-io/milvus
v0.10.3-0.20211013132033-59daccf67c95
Live on go
Blocked by Socket
This code implements an insecure, unauthenticated RPC mechanism that allows remote clients to cause arbitrary code execution and exfiltrate files/system information. Using pickle over an untrusted network and invoking methods by client-supplied names are severe supply-chain/backdoor risks. Do not deploy or reuse this code in production; it should be treated as a backdoor/untrusted remote-execution component unless wrapped with strong authentication, authorization, sandboxing, and safe serialization.
Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.
Possible typosquat attack
Known malware
Unstable ownership
Git dependency
GitHub dependency
AI-detected potential malware
HTTP dependency
Obfuscated code
Suspicious Stars on GitHub
Telemetry
Critical CVE
High CVE
Medium CVE
Low CVE
Unpopular package
Minified code
Bad dependency semver
Wildcard dependency
Socket optimized override available
Deprecated
Unmaintained
Explicitly Unlicensed Item
License Policy Violation
Misc. License Issues
Ambiguous License Classifier
Copyleft License
License exception
No License Found
Non-permissive License
Unidentified License
Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.
Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Nat Friedman
CEO at GitHub

Suz Hinton
Senior Software Engineer at Stripe
heck yes this is awesome!!! Congrats team 🎉👏

Matteo Collina
Node.js maintainer, Fastify lead maintainer
So awesome to see @SocketSecurity launch with a fresh approach! Excited to have supported the team from the early days.

DC Posch
Director of Technology at AppFolio, CTO at Dynasty
This is going to be super important, especially for crypto projects where a compromised dependency results in stolen user assets.

Luis Naranjo
Software Engineer at Microsoft
If software supply chain attacks through npm don't scare the shit out of you, you're not paying close enough attention.
@SocketSecurity sounds like an awesome product. I'll be using socket.dev instead of npmjs.org to browse npm packages going forward

Elena Nadolinski
Founder and CEO at Iron Fish
Huge congrats to @SocketSecurity! 🙌
Literally the only product that proactively detects signs of JS compromised packages.

Joe Previte
Engineering Team Lead at Coder
Congrats to @feross and the @SocketSecurity team on their seed funding! 🚀 It's been a big help for us at @CoderHQ and we appreciate what y'all are doing!

Josh Goldberg
Staff Developer at Codecademy
This is such a great idea & looks fantastic, congrats & good luck @feross + team!
The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Scott Roberts
CISO at UiPath
As a happy Socket customer, I've been impressed with how quickly they are adding value to the product, this move is a great step!

Yan Zhu
Head of Security at Brave, DEFCON, EFF, W3C
glad to hear some of the smartest people i know are working on (npm, etc.) supply chain security finally :). @SocketSecurity

Andrew Peterson
CEO and Co-Founder at Signal Sciences (acq. Fastly)
How do you track the validity of open source software libraries as they get updated? You're prob not. Check out @SocketSecurity and the updated tooling they launched.
Supply chain is a cluster in security as we all know and the tools from Socket are "duh" type tools to be implementing. Check them out and follow Feross Aboukhadijeh to see more updates coming from them in the future.

Zbyszek Tenerowicz
Senior Security Engineer at ConsenSys
socket.dev is getting more appealing by the hour

Devdatta Akhawe
Head of Security at Figma
The @SocketSecurity team is on fire! Amazing progress and I am exciting to see where they go next.

Sebastian Bensusan
Engineer Manager at Stripe
I find it surprising that we don't have _more_ supply chain attacks in software:
Imagine your airplane (the code running) was assembled (deployed) daily, with parts (dependencies) from internet strangers. How long until you get a bad part?
Excited for Socket to prevent this

Adam Baldwin
VP of Security at npm, Red Team at Auth0/Okta
Congrats to everyone at @SocketSecurity ❤️🤘🏻

Nico Waisman
CISO at Lyft
This is an area that I have personally been very focused on. As Nat Friedman said in the 2019 GitHub Universe keynote, Open Source won, and every time you add a new open source project you rely on someone else code and you rely on the people that build it.
This is both exciting and problematic. You are bringing real risk into your organization, and I'm excited to see progress in the industry from OpenSSF scorecards and package analyzers to the company that Feross Aboukhadijeh is building!
Questions? Call us at (844) SOCKET-0
Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.
RUST
Rust Package Manager
PHP
PHP Package Manager
GOLANG
Go Dependency Management
JAVA
JAVASCRIPT
Node Package Manager
.NET
.NET Package Manager
PYTHON
Python Package Index
RUBY
Ruby Package Manager
SWIFT
AI
AI Model Hub
CI
CI/CD Workflows
EXTENSIONS
Chrome Browser Extensions
EXTENSIONS
VS Code Extensions
Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.
Nov 23, 2025
Shai Hulud v2
Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.
Nov 05, 2025
Elves on npm
A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.
Jul 04, 2025
RubyGems Automation-Tool Infostealer
Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.
Mar 13, 2025
North Korea's Contagious Interview Campaign
Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.
Jul 23, 2024
Network Reconnaissance Campaign
A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.
Questions? Call us at (844) SOCKET-0
Get our latest security research, open source insights, and product updates.

Company News
Socket won two 2026 Reppy Awards from RepVue, ranking in the top 5% of all sales orgs. AE Alexandra Lister shares what it's like to grow a sales career here.

Security News
NIST will stop enriching most CVEs under a new risk-based model, narrowing the NVD's scope as vulnerability submissions continue to surge.

Company News
/Security News
Socket is an initial recipient of OpenAI's Cybersecurity Grant Program, which commits $10M in API credits to defenders securing open source software.