
Research
/Security News
Fake imToken Chrome Extension Steals Seed Phrases via Phishing Redirects
Mixed-script homoglyphs and a lookalike domain mimic imToken’s import flow to capture mnemonics and private keys.
Quickly evaluate the security and health of any open source package.
imad213rsa
213.9
Live on pypi
Blocked by Socket
This module is highly suspicious and dangerous. It reconstructs an AES key from obfuscated parts, decrypts and decompresses a large embedded payload and executes it with exec(), and contains anti-analysis checks to avoid running under debuggers or VMs. The code is purposefully obfuscated and designed to conceal its actual behavior until runtime. Even though the payload's contents are not visible without decryption, the presence of these patterns indicates probable malicious intent or at minimum a high risk supply-chain backdoor. Do not run this code in any production or trusted environment; treat it as malicious until the decrypted payload is safely inspected in an isolated, instrumented environment.
nf-cl-logger-logger
99.99.13
by slaxome
Removed from npm
Blocked by Socket
High risk: the postinstall hook executes local code during installation and the package declaring a dependency with the same name is a supply-chain red flag that could cause installs to pull and execute a registry-controlled package. Inspect the published package contents and index.js before installing, remove or disable the postinstall script if possible, and avoid installing this package until its provenance and intent are verified.
Live on npm for 4 hours and 6 minutes before removal. Socket users were protected even while the package was live.
ailever
0.2.300
Live on pypi
Blocked by Socket
This script is a high-risk launcher: it unconditionally fetches Python code from a hardcoded remote repo and executes it locally via a shell-invoked Python process while passing unsanitized user inputs directly into the shell command. Even if the upstream repository is currently benign, the pattern enables trivial supply-chain compromise and shell injection. Mitigations: remove runtime download-and-exec; if fetching is necessary, pin and verify cryptographic hashes or signatures, validate content, avoid os.system (use subprocess with argument lists or importlib), sanitize inputs, and add error handling and logging. Treat this module as unsafe in security-sensitive environments until hardened.
sbcli-dev
14.0.73
Live on pypi
Blocked by Socket
The Python module itself is not directly implementing typical malware behaviors, but it creates a high-risk execution surface: it runs local shell scripts (some with sudo) with unvalidated inputs and passes secrets on the command line. The deploy_fdb_from_file_service function contains a command-injection vulnerability (shell=True with joined args) and a coding bug (returncod typo). Recommend: remove shell=True; use argument lists always, avoid passing secrets via argv (use stdin, environment files with proper filesystem permissions, or secured IPC), eliminate unnecessary sudo calls and require callers to provide appropriate privileges if needed, validate/escape inputs (especially file paths), fix the returncod typo, and audit all invoked shell scripts before use. Treat package as risky until mitigations and script audits are performed.
hackingtools
0.9.939.533
Live on pypi
Blocked by Socket
This file is unsafe: it intentionally hides and dynamically executes an embedded payload. It decodes and execs a base64 blob, and that payload decodes further assets, writes a shell script ('server.sh') to disk and executes it via subprocess/system calls. These behaviors match dropper/backdoor patterns and present a high security risk. Treat as malicious until proven otherwise; do not run on production or sensitive systems. Perform full analysis in an isolated sandbox to reveal the final payload actions if required.
tx-engine
0.2.9
Live on pypi
Blocked by Socket
The code contains a critical security flaw: untrusted input can be executed via eval(op), enabling arbitrary code execution. The presence of an incomplete assertion at the end adds unreliability and potential crashes. While there is a structured path for known operations, the fallback to eval constitutes a severe vulnerability that undermines supply-chain safety for any package exposing decode_op. Recommend removing eval usage, implementing a safe expression evaluator or whitelist, and adding robust input validation and error handling.
analyticstracker
2.0.6
by Vertica A/S
Live on nuget
Blocked by Socket
This file implements a server-driven arbitrary code execution channel in the browser: it advertises support via an outgoing 'AnalyticsTracker-Enabled' header, collects concatenated 'AnalyticsTracker-<n>' response headers, base64-decodes their concatenation and immediately eval()s the result. That pattern behaves like a backdoor and is a high security risk — it enables remote/script injection by any server or MITM able to add those headers. Unless you fully trust the responding server and can guarantee integrity of delivered payloads, remove or disable this behavior (replace eval with safe parsing, implement signature verification, restrict origins, or eliminate automatic execution).
fiinquant
0.10.0
Live on pypi
Blocked by Socket
This file contains code that reverses a string, decodes it from base64, decompresses it with zlib, and then executes it via exec(). Such obfuscation is a common tactic in malicious scripts to hide their true functionality, which can include data exfiltration, system compromise, or other unauthorized activities. No specific domain or IP address references were found in the decoded payload, but the obfuscation strongly indicates malicious intent.
mtmai
0.4.197
Live on pypi
Blocked by Socket
The code exposes powerful administrative actions: arbitrary shell execution, arbitrary file reads, full environment dumps, and building/pushing Docker images to a hardcoded registry. These are not obfuscated but are high-risk capabilities that can be abused for data exfiltration, remote code execution, and supply-chain leakage if the superuser authentication is compromised or misconfigured. The presence of a hardcoded remote image name for docker push is suspicious for unintended outbound artifact exfiltration. Recommendation: avoid including these endpoints in public packages or ensure strict, auditable authentication and input validation; remove hardcoded push targets and avoid returning full environment variables or arbitrary file contents.
shell2http
1.2
Live on pypi
Blocked by Socket
This module implements an unprotected HTTP-triggered command executor: predefined shell commands are executed when matching GET paths are requested. It is hazardous to run on any network-exposed interface without strict controls. Remediation: bind to localhost or specific interface, add authentication/authorization, avoid shell=True by passing args as lists to subprocess without a shell, validate or restrict allowed commands, and add logging and access controls. Treat this code as a potential backdoor; do not run on production or public hosts without significant hardening.
mtmai
0.3.1387
Live on pypi
Blocked by Socket
This fragment intends to install and start KasmVNC by running many shell commands that create certs, write VNC password files, adjust group membership, and launch a VNC server. The primary security issues are unsafe shell interpolation (command injection risk), programmatic persistence of a possibly predictable password, execution with sudo based on unvalidated env vars, starting a VNC server exposed on 0.0.0.0 with disabled/basic auth, and multiple unsafe filesystem operations performed via shell. There is no clear evidence of obfuscated or direct exfiltration malware, but the behavior can provide an unauthorized remote access vector (backdoor-like) if used maliciously. Do not run this code without fixing shell usage, validating inputs, using secure randomly generated passwords, enforcing proper file permissions, and not disabling authentication.
income_access_npm_config
1.0.0
by foysal119732
Removed from npm
Blocked by Socket
The code collects detailed system and package information and sends it to a remote server, which is highly suspicious and indicative of potential data exfiltration. The server hostname (oastify.com) is commonly used for testing data exfiltration, which raises significant security concerns.
Live on npm for 12 minutes before removal. Socket users were protected even while the package was live.
sqldbrepository
6.0.8
by MC666, m, mc, Unicorn, MC
Live on nuget
Blocked by Socket
This assembly embeds a hidden sabotage backdoor in SqlCommandExtend.Exec: after a hard-coded timestamp threshold it performs a random check (≈20% probability) on every SQL command and calls Process.GetCurrentProcess()[.]Kill(), abruptly terminating the host application. In addition, most CRUD methods build SQL by inlining values via text.Replace("@param", "'"+ToDbValue(...)+"'"), without using proper SqlParameter bindings, creating a strong risk of SQL injection. This combination of intentional denial-of-service and unsafe query construction constitutes malicious behavior and renders the library untrusted.
calc_9p1qriho8q
1.0.8
Removed from npm
Blocked by Socket
While listing files in the directory may not be directly malicious, it can potentially expose sensitive information about the system's file structure. This behavior is considered risky.
Live on npm for 48 minutes before removal. Socket users were protected even while the package was live.
exp10it
2.5.20
Live on pypi
Blocked by Socket
This file is an offensive brute-force/credential-stuffing utility that attempts to crack admin login forms, including CAPTCHA bypass via OCR. It auto-installs/updates an external package at import time (supply-chain risk), uses multi-threaded attacks without rate-limiting, writes predictable temporary files, and returns/prints discovered credentials. The code is malicious in purpose and dangerous to run; do not execute it. Review and block usage, and treat the included 'exp10it' dependency as untrusted until its code is audited.
sn-seismic-addons
3.754.0
Removed from npm
Blocked by Socket
The code exhibits clear signs of malicious behavior by exfiltrating environment variables to an obfuscated and suspicious domain. This poses a significant security risk due to the potential exposure of sensitive information.
Live on npm for 45 minutes before removal. Socket users were protected even while the package was live.
epic-ue-ui
5.998.5
Removed from npm
Blocked by Socket
The purpose of this code appears to be collecting specific environment variables and package information, compressing and encoding it, and sending it over HTTP to a remote domain. The intent and purpose of this behavior are unclear from the provided code fragment alone.
Live on npm for 32 minutes before removal. Socket users were protected even while the package was live.
pinokiod
3.120.0
by cocktailpeanut
Live on npm
Blocked by Socket
The SweetAlert2 library code is mostly benign and serves as a UI modal dialog tool. However, it contains a suspicious and potentially malicious snippet that targets Russian users on certain domains to play an unsolicited audio prank, disabling pointer events and potentially disrupting user interaction. This behavior is unexpected and should be considered a moderate security risk and potential malware. The rest of the code shows no signs of malicious intent. The provided reports were invalid and unhelpful. Users should be cautious about this version of the library due to the embedded prank behavior.
dsql-server
1.0.56
by tben
Live on npm
Blocked by Socket
This module is not evidently malware, but it contains serious security issues: passwords are sent via GET, the HMAC key can default to empty, and user input is directly interpolated into SQL causing SQL injection risk and account enumeration. Treat this as high-risk insecure code that must be remediated before deployment.
illusion-lotus-klt853
1.0.0
by afifaljafari112
Removed from npm
Blocked by Socket
The provided code imports and executes functions from various modules with unusual names, which is slightly suspicious. However, there are no explicit malicious activities, such as data theft or system damage, visible in this fragment alone. Further inspection of the imported modules is recommended to ensure they do not perform any harmful operations.
Live on npm for 57 days and 15 minutes before removal. Socket users were protected even while the package was live.
oasis-ember-yhb091
1.0.0
by afifaljafari112
Removed from npm
Blocked by Socket
The code contains unusual naming conventions and the use of an uncommon method 'functame' across multiple modules which may indicate obfuscation or non-standard practices. However, without more information on what the 'functame' method does in each of these modules, it's challenging to definitively determine if the code is malicious. The anomalies suggest a need for further inspection of the individual modules being imported.
Live on npm for 56 days, 23 hours and 11 minutes before removal. Socket users were protected even while the package was live.
muaddib-scanner
2.2.17
by dnszlsk
Live on npm
Blocked by Socket
This file is malicious. It actively harvests private keys and sensitive tokens from the local environment and exfiltrates them to a hardcoded external server. It also performs dynamic execution of a base64-decoded payload via eval. Even though the immediate decoded payload is a harmless console.log, the combination of credential theft, silent errors, remote exfiltration, and eval indicates intentional and dangerous behavior consistent with a supply-chain backdoor. The package should be considered compromised and removed from use; any systems that executed it should be treated as potentially breached and secrets rotated.
imad213rsa
213.9
Live on pypi
Blocked by Socket
This module is highly suspicious and dangerous. It reconstructs an AES key from obfuscated parts, decrypts and decompresses a large embedded payload and executes it with exec(), and contains anti-analysis checks to avoid running under debuggers or VMs. The code is purposefully obfuscated and designed to conceal its actual behavior until runtime. Even though the payload's contents are not visible without decryption, the presence of these patterns indicates probable malicious intent or at minimum a high risk supply-chain backdoor. Do not run this code in any production or trusted environment; treat it as malicious until the decrypted payload is safely inspected in an isolated, instrumented environment.
nf-cl-logger-logger
99.99.13
by slaxome
Removed from npm
Blocked by Socket
High risk: the postinstall hook executes local code during installation and the package declaring a dependency with the same name is a supply-chain red flag that could cause installs to pull and execute a registry-controlled package. Inspect the published package contents and index.js before installing, remove or disable the postinstall script if possible, and avoid installing this package until its provenance and intent are verified.
Live on npm for 4 hours and 6 minutes before removal. Socket users were protected even while the package was live.
ailever
0.2.300
Live on pypi
Blocked by Socket
This script is a high-risk launcher: it unconditionally fetches Python code from a hardcoded remote repo and executes it locally via a shell-invoked Python process while passing unsanitized user inputs directly into the shell command. Even if the upstream repository is currently benign, the pattern enables trivial supply-chain compromise and shell injection. Mitigations: remove runtime download-and-exec; if fetching is necessary, pin and verify cryptographic hashes or signatures, validate content, avoid os.system (use subprocess with argument lists or importlib), sanitize inputs, and add error handling and logging. Treat this module as unsafe in security-sensitive environments until hardened.
sbcli-dev
14.0.73
Live on pypi
Blocked by Socket
The Python module itself is not directly implementing typical malware behaviors, but it creates a high-risk execution surface: it runs local shell scripts (some with sudo) with unvalidated inputs and passes secrets on the command line. The deploy_fdb_from_file_service function contains a command-injection vulnerability (shell=True with joined args) and a coding bug (returncod typo). Recommend: remove shell=True; use argument lists always, avoid passing secrets via argv (use stdin, environment files with proper filesystem permissions, or secured IPC), eliminate unnecessary sudo calls and require callers to provide appropriate privileges if needed, validate/escape inputs (especially file paths), fix the returncod typo, and audit all invoked shell scripts before use. Treat package as risky until mitigations and script audits are performed.
hackingtools
0.9.939.533
Live on pypi
Blocked by Socket
This file is unsafe: it intentionally hides and dynamically executes an embedded payload. It decodes and execs a base64 blob, and that payload decodes further assets, writes a shell script ('server.sh') to disk and executes it via subprocess/system calls. These behaviors match dropper/backdoor patterns and present a high security risk. Treat as malicious until proven otherwise; do not run on production or sensitive systems. Perform full analysis in an isolated sandbox to reveal the final payload actions if required.
tx-engine
0.2.9
Live on pypi
Blocked by Socket
The code contains a critical security flaw: untrusted input can be executed via eval(op), enabling arbitrary code execution. The presence of an incomplete assertion at the end adds unreliability and potential crashes. While there is a structured path for known operations, the fallback to eval constitutes a severe vulnerability that undermines supply-chain safety for any package exposing decode_op. Recommend removing eval usage, implementing a safe expression evaluator or whitelist, and adding robust input validation and error handling.
analyticstracker
2.0.6
by Vertica A/S
Live on nuget
Blocked by Socket
This file implements a server-driven arbitrary code execution channel in the browser: it advertises support via an outgoing 'AnalyticsTracker-Enabled' header, collects concatenated 'AnalyticsTracker-<n>' response headers, base64-decodes their concatenation and immediately eval()s the result. That pattern behaves like a backdoor and is a high security risk — it enables remote/script injection by any server or MITM able to add those headers. Unless you fully trust the responding server and can guarantee integrity of delivered payloads, remove or disable this behavior (replace eval with safe parsing, implement signature verification, restrict origins, or eliminate automatic execution).
fiinquant
0.10.0
Live on pypi
Blocked by Socket
This file contains code that reverses a string, decodes it from base64, decompresses it with zlib, and then executes it via exec(). Such obfuscation is a common tactic in malicious scripts to hide their true functionality, which can include data exfiltration, system compromise, or other unauthorized activities. No specific domain or IP address references were found in the decoded payload, but the obfuscation strongly indicates malicious intent.
mtmai
0.4.197
Live on pypi
Blocked by Socket
The code exposes powerful administrative actions: arbitrary shell execution, arbitrary file reads, full environment dumps, and building/pushing Docker images to a hardcoded registry. These are not obfuscated but are high-risk capabilities that can be abused for data exfiltration, remote code execution, and supply-chain leakage if the superuser authentication is compromised or misconfigured. The presence of a hardcoded remote image name for docker push is suspicious for unintended outbound artifact exfiltration. Recommendation: avoid including these endpoints in public packages or ensure strict, auditable authentication and input validation; remove hardcoded push targets and avoid returning full environment variables or arbitrary file contents.
shell2http
1.2
Live on pypi
Blocked by Socket
This module implements an unprotected HTTP-triggered command executor: predefined shell commands are executed when matching GET paths are requested. It is hazardous to run on any network-exposed interface without strict controls. Remediation: bind to localhost or specific interface, add authentication/authorization, avoid shell=True by passing args as lists to subprocess without a shell, validate or restrict allowed commands, and add logging and access controls. Treat this code as a potential backdoor; do not run on production or public hosts without significant hardening.
mtmai
0.3.1387
Live on pypi
Blocked by Socket
This fragment intends to install and start KasmVNC by running many shell commands that create certs, write VNC password files, adjust group membership, and launch a VNC server. The primary security issues are unsafe shell interpolation (command injection risk), programmatic persistence of a possibly predictable password, execution with sudo based on unvalidated env vars, starting a VNC server exposed on 0.0.0.0 with disabled/basic auth, and multiple unsafe filesystem operations performed via shell. There is no clear evidence of obfuscated or direct exfiltration malware, but the behavior can provide an unauthorized remote access vector (backdoor-like) if used maliciously. Do not run this code without fixing shell usage, validating inputs, using secure randomly generated passwords, enforcing proper file permissions, and not disabling authentication.
income_access_npm_config
1.0.0
by foysal119732
Removed from npm
Blocked by Socket
The code collects detailed system and package information and sends it to a remote server, which is highly suspicious and indicative of potential data exfiltration. The server hostname (oastify.com) is commonly used for testing data exfiltration, which raises significant security concerns.
Live on npm for 12 minutes before removal. Socket users were protected even while the package was live.
sqldbrepository
6.0.8
by MC666, m, mc, Unicorn, MC
Live on nuget
Blocked by Socket
This assembly embeds a hidden sabotage backdoor in SqlCommandExtend.Exec: after a hard-coded timestamp threshold it performs a random check (≈20% probability) on every SQL command and calls Process.GetCurrentProcess()[.]Kill(), abruptly terminating the host application. In addition, most CRUD methods build SQL by inlining values via text.Replace("@param", "'"+ToDbValue(...)+"'"), without using proper SqlParameter bindings, creating a strong risk of SQL injection. This combination of intentional denial-of-service and unsafe query construction constitutes malicious behavior and renders the library untrusted.
calc_9p1qriho8q
1.0.8
Removed from npm
Blocked by Socket
While listing files in the directory may not be directly malicious, it can potentially expose sensitive information about the system's file structure. This behavior is considered risky.
Live on npm for 48 minutes before removal. Socket users were protected even while the package was live.
exp10it
2.5.20
Live on pypi
Blocked by Socket
This file is an offensive brute-force/credential-stuffing utility that attempts to crack admin login forms, including CAPTCHA bypass via OCR. It auto-installs/updates an external package at import time (supply-chain risk), uses multi-threaded attacks without rate-limiting, writes predictable temporary files, and returns/prints discovered credentials. The code is malicious in purpose and dangerous to run; do not execute it. Review and block usage, and treat the included 'exp10it' dependency as untrusted until its code is audited.
sn-seismic-addons
3.754.0
Removed from npm
Blocked by Socket
The code exhibits clear signs of malicious behavior by exfiltrating environment variables to an obfuscated and suspicious domain. This poses a significant security risk due to the potential exposure of sensitive information.
Live on npm for 45 minutes before removal. Socket users were protected even while the package was live.
epic-ue-ui
5.998.5
Removed from npm
Blocked by Socket
The purpose of this code appears to be collecting specific environment variables and package information, compressing and encoding it, and sending it over HTTP to a remote domain. The intent and purpose of this behavior are unclear from the provided code fragment alone.
Live on npm for 32 minutes before removal. Socket users were protected even while the package was live.
pinokiod
3.120.0
by cocktailpeanut
Live on npm
Blocked by Socket
The SweetAlert2 library code is mostly benign and serves as a UI modal dialog tool. However, it contains a suspicious and potentially malicious snippet that targets Russian users on certain domains to play an unsolicited audio prank, disabling pointer events and potentially disrupting user interaction. This behavior is unexpected and should be considered a moderate security risk and potential malware. The rest of the code shows no signs of malicious intent. The provided reports were invalid and unhelpful. Users should be cautious about this version of the library due to the embedded prank behavior.
dsql-server
1.0.56
by tben
Live on npm
Blocked by Socket
This module is not evidently malware, but it contains serious security issues: passwords are sent via GET, the HMAC key can default to empty, and user input is directly interpolated into SQL causing SQL injection risk and account enumeration. Treat this as high-risk insecure code that must be remediated before deployment.
illusion-lotus-klt853
1.0.0
by afifaljafari112
Removed from npm
Blocked by Socket
The provided code imports and executes functions from various modules with unusual names, which is slightly suspicious. However, there are no explicit malicious activities, such as data theft or system damage, visible in this fragment alone. Further inspection of the imported modules is recommended to ensure they do not perform any harmful operations.
Live on npm for 57 days and 15 minutes before removal. Socket users were protected even while the package was live.
oasis-ember-yhb091
1.0.0
by afifaljafari112
Removed from npm
Blocked by Socket
The code contains unusual naming conventions and the use of an uncommon method 'functame' across multiple modules which may indicate obfuscation or non-standard practices. However, without more information on what the 'functame' method does in each of these modules, it's challenging to definitively determine if the code is malicious. The anomalies suggest a need for further inspection of the individual modules being imported.
Live on npm for 56 days, 23 hours and 11 minutes before removal. Socket users were protected even while the package was live.
muaddib-scanner
2.2.17
by dnszlsk
Live on npm
Blocked by Socket
This file is malicious. It actively harvests private keys and sensitive tokens from the local environment and exfiltrates them to a hardcoded external server. It also performs dynamic execution of a base64-decoded payload via eval. Even though the immediate decoded payload is a harmless console.log, the combination of credential theft, silent errors, remote exfiltration, and eval indicates intentional and dangerous behavior consistent with a supply-chain backdoor. The package should be considered compromised and removed from use; any systems that executed it should be treated as potentially breached and secrets rotated.
Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.
Possible typosquat attack
Known malware
Git dependency
GitHub dependency
AI-detected potential malware
HTTP dependency
Obfuscated code
Suspicious Stars on GitHub
Telemetry
Protestware or potentially unwanted behavior
Critical CVE
High CVE
Medium CVE
Low CVE
Unpopular package
Minified code
Bad dependency semver
Wildcard dependency
Socket optimized override available
Deprecated
Unmaintained
Explicitly Unlicensed Item
License Policy Violation
Misc. License Issues
No License Found
Ambiguous License Classifier
Copyleft License
License exception
Non-permissive License
Unidentified License
Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.
Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Nat Friedman
CEO at GitHub

Suz Hinton
Senior Software Engineer at Stripe
heck yes this is awesome!!! Congrats team 🎉👏

Matteo Collina
Node.js maintainer, Fastify lead maintainer
So awesome to see @SocketSecurity launch with a fresh approach! Excited to have supported the team from the early days.

DC Posch
Director of Technology at AppFolio, CTO at Dynasty
This is going to be super important, especially for crypto projects where a compromised dependency results in stolen user assets.

Luis Naranjo
Software Engineer at Microsoft
If software supply chain attacks through npm don't scare the shit out of you, you're not paying close enough attention.
@SocketSecurity sounds like an awesome product. I'll be using socket.dev instead of npmjs.org to browse npm packages going forward

Elena Nadolinski
Founder and CEO at Iron Fish
Huge congrats to @SocketSecurity! 🙌
Literally the only product that proactively detects signs of JS compromised packages.

Joe Previte
Engineering Team Lead at Coder
Congrats to @feross and the @SocketSecurity team on their seed funding! 🚀 It's been a big help for us at @CoderHQ and we appreciate what y'all are doing!

Josh Goldberg
Staff Developer at Codecademy
This is such a great idea & looks fantastic, congrats & good luck @feross + team!
The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Scott Roberts
CISO at UiPath
As a happy Socket customer, I've been impressed with how quickly they are adding value to the product, this move is a great step!

Yan Zhu
Head of Security at Brave, DEFCON, EFF, W3C
glad to hear some of the smartest people i know are working on (npm, etc.) supply chain security finally :). @SocketSecurity

Andrew Peterson
CEO and Co-Founder at Signal Sciences (acq. Fastly)
How do you track the validity of open source software libraries as they get updated? You're prob not. Check out @SocketSecurity and the updated tooling they launched.
Supply chain is a cluster in security as we all know and the tools from Socket are "duh" type tools to be implementing. Check them out and follow Feross Aboukhadijeh to see more updates coming from them in the future.

Zbyszek Tenerowicz
Senior Security Engineer at ConsenSys
socket.dev is getting more appealing by the hour

Devdatta Akhawe
Head of Security at Figma
The @SocketSecurity team is on fire! Amazing progress and I am exciting to see where they go next.

Sebastian Bensusan
Engineer Manager at Stripe
I find it surprising that we don't have _more_ supply chain attacks in software:
Imagine your airplane (the code running) was assembled (deployed) daily, with parts (dependencies) from internet strangers. How long until you get a bad part?
Excited for Socket to prevent this

Adam Baldwin
VP of Security at npm, Red Team at Auth0/Okta
Congrats to everyone at @SocketSecurity ❤️🤘🏻

Nico Waisman
CISO at Lyft
This is an area that I have personally been very focused on. As Nat Friedman said in the 2019 GitHub Universe keynote, Open Source won, and every time you add a new open source project you rely on someone else code and you rely on the people that build it.
This is both exciting and problematic. You are bringing real risk into your organization, and I'm excited to see progress in the industry from OpenSSF scorecards and package analyzers to the company that Feross Aboukhadijeh is building!
Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.
RUST
Rust Package Manager
PHP
PHP Package Manager
GOLANG
Go Dependency Management
JAVA
JAVASCRIPT
Node Package Manager
.NET
.NET Package Manager
PYTHON
Python Package Index
RUBY
Ruby Package Manager
AI
AI Model Hub
CI
CI/CD Workflows
EXTENSIONS
Chrome Browser Extensions
EXTENSIONS
VS Code Extensions
Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.
Nov 23, 2025
Shai Hulud v2
Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.
Nov 05, 2025
Elves on npm
A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.
Jul 04, 2025
RubyGems Automation-Tool Infostealer
Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.
Mar 13, 2025
North Korea's Contagious Interview Campaign
Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.
Jul 23, 2024
Network Reconnaissance Campaign
A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.
Get our latest security research, open source insights, and product updates.

Research
/Security News
Mixed-script homoglyphs and a lookalike domain mimic imToken’s import flow to capture mnemonics and private keys.

Security News
Latio’s 2026 report recognizes Socket as a Supply Chain Innovator and highlights our work in 0-day malware detection, SCA, and auto-patching.

Company News
Join Socket for live demos, rooftop happy hours, and one-on-one meetings during BSidesSF and RSA 2026 in San Francisco.