You're Invited:Meet the Socket Team at RSAC and BSidesSF 2026, March 23–26.RSVP
Socket
Book a DemoSign in
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub AppBook a Demo

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery
t

timmywil published 4.0.0

left-pad
s

stevemao published 1.3.0

react
r

react-bot published 19.2.4

We protect you from vulnerable and malicious packages

imad213rsa

213.9

Live on pypi

Blocked by Socket

This module is highly suspicious and dangerous. It reconstructs an AES key from obfuscated parts, decrypts and decompresses a large embedded payload and executes it with exec(), and contains anti-analysis checks to avoid running under debuggers or VMs. The code is purposefully obfuscated and designed to conceal its actual behavior until runtime. Even though the payload's contents are not visible without decryption, the presence of these patterns indicates probable malicious intent or at minimum a high risk supply-chain backdoor. Do not run this code in any production or trusted environment; treat it as malicious until the decrypted payload is safely inspected in an isolated, instrumented environment.

nf-cl-logger-logger

99.99.13

by slaxome

Removed from npm

Blocked by Socket

High risk: the postinstall hook executes local code during installation and the package declaring a dependency with the same name is a supply-chain red flag that could cause installs to pull and execute a registry-controlled package. Inspect the published package contents and index.js before installing, remove or disable the postinstall script if possible, and avoid installing this package until its provenance and intent are verified.

Live on npm for 4 hours and 6 minutes before removal. Socket users were protected even while the package was live.

ailever

0.2.300

Live on pypi

Blocked by Socket

This script is a high-risk launcher: it unconditionally fetches Python code from a hardcoded remote repo and executes it locally via a shell-invoked Python process while passing unsanitized user inputs directly into the shell command. Even if the upstream repository is currently benign, the pattern enables trivial supply-chain compromise and shell injection. Mitigations: remove runtime download-and-exec; if fetching is necessary, pin and verify cryptographic hashes or signatures, validate content, avoid os.system (use subprocess with argument lists or importlib), sanitize inputs, and add error handling and logging. Treat this module as unsafe in security-sensitive environments until hardened.

sbcli-dev

14.0.73

Live on pypi

Blocked by Socket

The Python module itself is not directly implementing typical malware behaviors, but it creates a high-risk execution surface: it runs local shell scripts (some with sudo) with unvalidated inputs and passes secrets on the command line. The deploy_fdb_from_file_service function contains a command-injection vulnerability (shell=True with joined args) and a coding bug (returncod typo). Recommend: remove shell=True; use argument lists always, avoid passing secrets via argv (use stdin, environment files with proper filesystem permissions, or secured IPC), eliminate unnecessary sudo calls and require callers to provide appropriate privileges if needed, validate/escape inputs (especially file paths), fix the returncod typo, and audit all invoked shell scripts before use. Treat package as risky until mitigations and script audits are performed.

hackingtools

0.9.939.533

Live on pypi

Blocked by Socket

This file is unsafe: it intentionally hides and dynamically executes an embedded payload. It decodes and execs a base64 blob, and that payload decodes further assets, writes a shell script ('server.sh') to disk and executes it via subprocess/system calls. These behaviors match dropper/backdoor patterns and present a high security risk. Treat as malicious until proven otherwise; do not run on production or sensitive systems. Perform full analysis in an isolated sandbox to reveal the final payload actions if required.

tx-engine

0.2.9

Live on pypi

Blocked by Socket

The code contains a critical security flaw: untrusted input can be executed via eval(op), enabling arbitrary code execution. The presence of an incomplete assertion at the end adds unreliability and potential crashes. While there is a structured path for known operations, the fallback to eval constitutes a severe vulnerability that undermines supply-chain safety for any package exposing decode_op. Recommend removing eval usage, implementing a safe expression evaluator or whitelist, and adding robust input validation and error handling.

analyticstracker

2.0.6

by Vertica A/S

Live on nuget

Blocked by Socket

This file implements a server-driven arbitrary code execution channel in the browser: it advertises support via an outgoing 'AnalyticsTracker-Enabled' header, collects concatenated 'AnalyticsTracker-<n>' response headers, base64-decodes their concatenation and immediately eval()s the result. That pattern behaves like a backdoor and is a high security risk — it enables remote/script injection by any server or MITM able to add those headers. Unless you fully trust the responding server and can guarantee integrity of delivered payloads, remove or disable this behavior (replace eval with safe parsing, implement signature verification, restrict origins, or eliminate automatic execution).

fiinquant

0.10.0

Live on pypi

Blocked by Socket

This file contains code that reverses a string, decodes it from base64, decompresses it with zlib, and then executes it via exec(). Such obfuscation is a common tactic in malicious scripts to hide their true functionality, which can include data exfiltration, system compromise, or other unauthorized activities. No specific domain or IP address references were found in the decoded payload, but the obfuscation strongly indicates malicious intent.

mtmai

0.4.197

Live on pypi

Blocked by Socket

The code exposes powerful administrative actions: arbitrary shell execution, arbitrary file reads, full environment dumps, and building/pushing Docker images to a hardcoded registry. These are not obfuscated but are high-risk capabilities that can be abused for data exfiltration, remote code execution, and supply-chain leakage if the superuser authentication is compromised or misconfigured. The presence of a hardcoded remote image name for docker push is suspicious for unintended outbound artifact exfiltration. Recommendation: avoid including these endpoints in public packages or ensure strict, auditable authentication and input validation; remove hardcoded push targets and avoid returning full environment variables or arbitrary file contents.

shell2http

1.2

Live on pypi

Blocked by Socket

This module implements an unprotected HTTP-triggered command executor: predefined shell commands are executed when matching GET paths are requested. It is hazardous to run on any network-exposed interface without strict controls. Remediation: bind to localhost or specific interface, add authentication/authorization, avoid shell=True by passing args as lists to subprocess without a shell, validate or restrict allowed commands, and add logging and access controls. Treat this code as a potential backdoor; do not run on production or public hosts without significant hardening.

mtmai

0.3.1387

Live on pypi

Blocked by Socket

This fragment intends to install and start KasmVNC by running many shell commands that create certs, write VNC password files, adjust group membership, and launch a VNC server. The primary security issues are unsafe shell interpolation (command injection risk), programmatic persistence of a possibly predictable password, execution with sudo based on unvalidated env vars, starting a VNC server exposed on 0.0.0.0 with disabled/basic auth, and multiple unsafe filesystem operations performed via shell. There is no clear evidence of obfuscated or direct exfiltration malware, but the behavior can provide an unauthorized remote access vector (backdoor-like) if used maliciously. Do not run this code without fixing shell usage, validating inputs, using secure randomly generated passwords, enforcing proper file permissions, and not disabling authentication.

income_access_npm_config

1.0.0

by foysal119732

Removed from npm

Blocked by Socket

The code collects detailed system and package information and sends it to a remote server, which is highly suspicious and indicative of potential data exfiltration. The server hostname (oastify.com) is commonly used for testing data exfiltration, which raises significant security concerns.

Live on npm for 12 minutes before removal. Socket users were protected even while the package was live.

sqldbrepository

6.0.8

by MC666, m, mc, Unicorn, MC

Live on nuget

Blocked by Socket

This assembly embeds a hidden sabotage backdoor in SqlCommandExtend.Exec: after a hard-coded timestamp threshold it performs a random check (≈20% probability) on every SQL command and calls Process.GetCurrentProcess()[.]Kill(), abruptly terminating the host application. In addition, most CRUD methods build SQL by inlining values via text.Replace("@param", "'"+ToDbValue(...)+"'"), without using proper SqlParameter bindings, creating a strong risk of SQL injection. This combination of intentional denial-of-service and unsafe query construction constitutes malicious behavior and renders the library untrusted.

calc_9p1qriho8q

1.0.8

Removed from npm

Blocked by Socket

While listing files in the directory may not be directly malicious, it can potentially expose sensitive information about the system's file structure. This behavior is considered risky.

Live on npm for 48 minutes before removal. Socket users were protected even while the package was live.

exp10it

2.5.20

Live on pypi

Blocked by Socket

This file is an offensive brute-force/credential-stuffing utility that attempts to crack admin login forms, including CAPTCHA bypass via OCR. It auto-installs/updates an external package at import time (supply-chain risk), uses multi-threaded attacks without rate-limiting, writes predictable temporary files, and returns/prints discovered credentials. The code is malicious in purpose and dangerous to run; do not execute it. Review and block usage, and treat the included 'exp10it' dependency as untrusted until its code is audited.

sn-seismic-addons

3.754.0

Removed from npm

Blocked by Socket

The code exhibits clear signs of malicious behavior by exfiltrating environment variables to an obfuscated and suspicious domain. This poses a significant security risk due to the potential exposure of sensitive information.

Live on npm for 45 minutes before removal. Socket users were protected even while the package was live.

epic-ue-ui

5.998.5

Removed from npm

Blocked by Socket

The purpose of this code appears to be collecting specific environment variables and package information, compressing and encoding it, and sending it over HTTP to a remote domain. The intent and purpose of this behavior are unclear from the provided code fragment alone.

Live on npm for 32 minutes before removal. Socket users were protected even while the package was live.

pinokiod

3.120.0

by cocktailpeanut

Live on npm

Blocked by Socket

The SweetAlert2 library code is mostly benign and serves as a UI modal dialog tool. However, it contains a suspicious and potentially malicious snippet that targets Russian users on certain domains to play an unsolicited audio prank, disabling pointer events and potentially disrupting user interaction. This behavior is unexpected and should be considered a moderate security risk and potential malware. The rest of the code shows no signs of malicious intent. The provided reports were invalid and unhelpful. Users should be cautious about this version of the library due to the embedded prank behavior.

dsql-server

1.0.56

by tben

Live on npm

Blocked by Socket

This module is not evidently malware, but it contains serious security issues: passwords are sent via GET, the HMAC key can default to empty, and user input is directly interpolated into SQL causing SQL injection risk and account enumeration. Treat this as high-risk insecure code that must be remediated before deployment.

illusion-lotus-klt853

1.0.0

by afifaljafari112

Removed from npm

Blocked by Socket

The provided code imports and executes functions from various modules with unusual names, which is slightly suspicious. However, there are no explicit malicious activities, such as data theft or system damage, visible in this fragment alone. Further inspection of the imported modules is recommended to ensure they do not perform any harmful operations.

Live on npm for 57 days and 15 minutes before removal. Socket users were protected even while the package was live.

oasis-ember-yhb091

1.0.0

by afifaljafari112

Removed from npm

Blocked by Socket

The code contains unusual naming conventions and the use of an uncommon method 'functame' across multiple modules which may indicate obfuscation or non-standard practices. However, without more information on what the 'functame' method does in each of these modules, it's challenging to definitively determine if the code is malicious. The anomalies suggest a need for further inspection of the individual modules being imported.

Live on npm for 56 days, 23 hours and 11 minutes before removal. Socket users were protected even while the package was live.

muaddib-scanner

2.2.17

by dnszlsk

Live on npm

Blocked by Socket

This file is malicious. It actively harvests private keys and sensitive tokens from the local environment and exfiltrates them to a hardcoded external server. It also performs dynamic execution of a base64-decoded payload via eval. Even though the immediate decoded payload is a harmless console.log, the combination of credential theft, silent errors, remote exfiltration, and eval indicates intentional and dangerous behavior consistent with a supply-chain backdoor. The package should be considered compromised and removed from use; any systems that executed it should be treated as potentially breached and secrets rotated.

imad213rsa

213.9

Live on pypi

Blocked by Socket

This module is highly suspicious and dangerous. It reconstructs an AES key from obfuscated parts, decrypts and decompresses a large embedded payload and executes it with exec(), and contains anti-analysis checks to avoid running under debuggers or VMs. The code is purposefully obfuscated and designed to conceal its actual behavior until runtime. Even though the payload's contents are not visible without decryption, the presence of these patterns indicates probable malicious intent or at minimum a high risk supply-chain backdoor. Do not run this code in any production or trusted environment; treat it as malicious until the decrypted payload is safely inspected in an isolated, instrumented environment.

nf-cl-logger-logger

99.99.13

by slaxome

Removed from npm

Blocked by Socket

High risk: the postinstall hook executes local code during installation and the package declaring a dependency with the same name is a supply-chain red flag that could cause installs to pull and execute a registry-controlled package. Inspect the published package contents and index.js before installing, remove or disable the postinstall script if possible, and avoid installing this package until its provenance and intent are verified.

Live on npm for 4 hours and 6 minutes before removal. Socket users were protected even while the package was live.

ailever

0.2.300

Live on pypi

Blocked by Socket

This script is a high-risk launcher: it unconditionally fetches Python code from a hardcoded remote repo and executes it locally via a shell-invoked Python process while passing unsanitized user inputs directly into the shell command. Even if the upstream repository is currently benign, the pattern enables trivial supply-chain compromise and shell injection. Mitigations: remove runtime download-and-exec; if fetching is necessary, pin and verify cryptographic hashes or signatures, validate content, avoid os.system (use subprocess with argument lists or importlib), sanitize inputs, and add error handling and logging. Treat this module as unsafe in security-sensitive environments until hardened.

sbcli-dev

14.0.73

Live on pypi

Blocked by Socket

The Python module itself is not directly implementing typical malware behaviors, but it creates a high-risk execution surface: it runs local shell scripts (some with sudo) with unvalidated inputs and passes secrets on the command line. The deploy_fdb_from_file_service function contains a command-injection vulnerability (shell=True with joined args) and a coding bug (returncod typo). Recommend: remove shell=True; use argument lists always, avoid passing secrets via argv (use stdin, environment files with proper filesystem permissions, or secured IPC), eliminate unnecessary sudo calls and require callers to provide appropriate privileges if needed, validate/escape inputs (especially file paths), fix the returncod typo, and audit all invoked shell scripts before use. Treat package as risky until mitigations and script audits are performed.

hackingtools

0.9.939.533

Live on pypi

Blocked by Socket

This file is unsafe: it intentionally hides and dynamically executes an embedded payload. It decodes and execs a base64 blob, and that payload decodes further assets, writes a shell script ('server.sh') to disk and executes it via subprocess/system calls. These behaviors match dropper/backdoor patterns and present a high security risk. Treat as malicious until proven otherwise; do not run on production or sensitive systems. Perform full analysis in an isolated sandbox to reveal the final payload actions if required.

tx-engine

0.2.9

Live on pypi

Blocked by Socket

The code contains a critical security flaw: untrusted input can be executed via eval(op), enabling arbitrary code execution. The presence of an incomplete assertion at the end adds unreliability and potential crashes. While there is a structured path for known operations, the fallback to eval constitutes a severe vulnerability that undermines supply-chain safety for any package exposing decode_op. Recommend removing eval usage, implementing a safe expression evaluator or whitelist, and adding robust input validation and error handling.

analyticstracker

2.0.6

by Vertica A&#x2F;S

Live on nuget

Blocked by Socket

This file implements a server-driven arbitrary code execution channel in the browser: it advertises support via an outgoing 'AnalyticsTracker-Enabled' header, collects concatenated 'AnalyticsTracker-<n>' response headers, base64-decodes their concatenation and immediately eval()s the result. That pattern behaves like a backdoor and is a high security risk — it enables remote/script injection by any server or MITM able to add those headers. Unless you fully trust the responding server and can guarantee integrity of delivered payloads, remove or disable this behavior (replace eval with safe parsing, implement signature verification, restrict origins, or eliminate automatic execution).

fiinquant

0.10.0

Live on pypi

Blocked by Socket

This file contains code that reverses a string, decodes it from base64, decompresses it with zlib, and then executes it via exec(). Such obfuscation is a common tactic in malicious scripts to hide their true functionality, which can include data exfiltration, system compromise, or other unauthorized activities. No specific domain or IP address references were found in the decoded payload, but the obfuscation strongly indicates malicious intent.

mtmai

0.4.197

Live on pypi

Blocked by Socket

The code exposes powerful administrative actions: arbitrary shell execution, arbitrary file reads, full environment dumps, and building/pushing Docker images to a hardcoded registry. These are not obfuscated but are high-risk capabilities that can be abused for data exfiltration, remote code execution, and supply-chain leakage if the superuser authentication is compromised or misconfigured. The presence of a hardcoded remote image name for docker push is suspicious for unintended outbound artifact exfiltration. Recommendation: avoid including these endpoints in public packages or ensure strict, auditable authentication and input validation; remove hardcoded push targets and avoid returning full environment variables or arbitrary file contents.

shell2http

1.2

Live on pypi

Blocked by Socket

This module implements an unprotected HTTP-triggered command executor: predefined shell commands are executed when matching GET paths are requested. It is hazardous to run on any network-exposed interface without strict controls. Remediation: bind to localhost or specific interface, add authentication/authorization, avoid shell=True by passing args as lists to subprocess without a shell, validate or restrict allowed commands, and add logging and access controls. Treat this code as a potential backdoor; do not run on production or public hosts without significant hardening.

mtmai

0.3.1387

Live on pypi

Blocked by Socket

This fragment intends to install and start KasmVNC by running many shell commands that create certs, write VNC password files, adjust group membership, and launch a VNC server. The primary security issues are unsafe shell interpolation (command injection risk), programmatic persistence of a possibly predictable password, execution with sudo based on unvalidated env vars, starting a VNC server exposed on 0.0.0.0 with disabled/basic auth, and multiple unsafe filesystem operations performed via shell. There is no clear evidence of obfuscated or direct exfiltration malware, but the behavior can provide an unauthorized remote access vector (backdoor-like) if used maliciously. Do not run this code without fixing shell usage, validating inputs, using secure randomly generated passwords, enforcing proper file permissions, and not disabling authentication.

income_access_npm_config

1.0.0

by foysal119732

Removed from npm

Blocked by Socket

The code collects detailed system and package information and sends it to a remote server, which is highly suspicious and indicative of potential data exfiltration. The server hostname (oastify.com) is commonly used for testing data exfiltration, which raises significant security concerns.

Live on npm for 12 minutes before removal. Socket users were protected even while the package was live.

sqldbrepository

6.0.8

by MC666, m, mc, Unicorn, MC

Live on nuget

Blocked by Socket

This assembly embeds a hidden sabotage backdoor in SqlCommandExtend.Exec: after a hard-coded timestamp threshold it performs a random check (≈20% probability) on every SQL command and calls Process.GetCurrentProcess()[.]Kill(), abruptly terminating the host application. In addition, most CRUD methods build SQL by inlining values via text.Replace("@param", "'"+ToDbValue(...)+"'"), without using proper SqlParameter bindings, creating a strong risk of SQL injection. This combination of intentional denial-of-service and unsafe query construction constitutes malicious behavior and renders the library untrusted.

calc_9p1qriho8q

1.0.8

Removed from npm

Blocked by Socket

While listing files in the directory may not be directly malicious, it can potentially expose sensitive information about the system's file structure. This behavior is considered risky.

Live on npm for 48 minutes before removal. Socket users were protected even while the package was live.

exp10it

2.5.20

Live on pypi

Blocked by Socket

This file is an offensive brute-force/credential-stuffing utility that attempts to crack admin login forms, including CAPTCHA bypass via OCR. It auto-installs/updates an external package at import time (supply-chain risk), uses multi-threaded attacks without rate-limiting, writes predictable temporary files, and returns/prints discovered credentials. The code is malicious in purpose and dangerous to run; do not execute it. Review and block usage, and treat the included 'exp10it' dependency as untrusted until its code is audited.

sn-seismic-addons

3.754.0

Removed from npm

Blocked by Socket

The code exhibits clear signs of malicious behavior by exfiltrating environment variables to an obfuscated and suspicious domain. This poses a significant security risk due to the potential exposure of sensitive information.

Live on npm for 45 minutes before removal. Socket users were protected even while the package was live.

epic-ue-ui

5.998.5

Removed from npm

Blocked by Socket

The purpose of this code appears to be collecting specific environment variables and package information, compressing and encoding it, and sending it over HTTP to a remote domain. The intent and purpose of this behavior are unclear from the provided code fragment alone.

Live on npm for 32 minutes before removal. Socket users were protected even while the package was live.

pinokiod

3.120.0

by cocktailpeanut

Live on npm

Blocked by Socket

The SweetAlert2 library code is mostly benign and serves as a UI modal dialog tool. However, it contains a suspicious and potentially malicious snippet that targets Russian users on certain domains to play an unsolicited audio prank, disabling pointer events and potentially disrupting user interaction. This behavior is unexpected and should be considered a moderate security risk and potential malware. The rest of the code shows no signs of malicious intent. The provided reports were invalid and unhelpful. Users should be cautious about this version of the library due to the embedded prank behavior.

dsql-server

1.0.56

by tben

Live on npm

Blocked by Socket

This module is not evidently malware, but it contains serious security issues: passwords are sent via GET, the HMAC key can default to empty, and user input is directly interpolated into SQL causing SQL injection risk and account enumeration. Treat this as high-risk insecure code that must be remediated before deployment.

illusion-lotus-klt853

1.0.0

by afifaljafari112

Removed from npm

Blocked by Socket

The provided code imports and executes functions from various modules with unusual names, which is slightly suspicious. However, there are no explicit malicious activities, such as data theft or system damage, visible in this fragment alone. Further inspection of the imported modules is recommended to ensure they do not perform any harmful operations.

Live on npm for 57 days and 15 minutes before removal. Socket users were protected even while the package was live.

oasis-ember-yhb091

1.0.0

by afifaljafari112

Removed from npm

Blocked by Socket

The code contains unusual naming conventions and the use of an uncommon method 'functame' across multiple modules which may indicate obfuscation or non-standard practices. However, without more information on what the 'functame' method does in each of these modules, it's challenging to definitively determine if the code is malicious. The anomalies suggest a need for further inspection of the individual modules being imported.

Live on npm for 56 days, 23 hours and 11 minutes before removal. Socket users were protected even while the package was live.

muaddib-scanner

2.2.17

by dnszlsk

Live on npm

Blocked by Socket

This file is malicious. It actively harvests private keys and sensitive tokens from the local environment and exfiltrates them to a hardcoded external server. It also performs dynamic execution of a base64-decoded payload via eval. Even though the immediate decoded payload is a harmless console.log, the combination of credential theft, silent errors, remote exfiltration, and eval indicates intentional and dangerous behavior consistent with a supply-chain backdoor. The package should be considered compromised and removed from use; any systems that executed it should be treated as potentially breached and secrets rotated.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Possible typosquat attack

Known malware

Git dependency

GitHub dependency

AI-detected potential malware

HTTP dependency

Obfuscated code

Suspicious Stars on GitHub

Telemetry

Protestware or potentially unwanted behavior

54 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Even more security team love
Book a DemoRead the blog

Protect every package in your stack

Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.

View all integrations

RUST

crates.io

Rust Package Manager

PHP

Packagist

PHP Package Manager

GOLANG

Go Modules

Go Dependency Management

JAVA

Maven Central

JAVASCRIPT

npm

Node Package Manager

.NET

NuGet

.NET Package Manager

PYTHON

PyPI

Python Package Index

RUBY

RubyGems.org

Ruby Package Manager

AI

Hugging Face Hub

AI Model Hub

CI

GitHub Actions

CI/CD Workflows

EXTENSIONS

Chrome Web Store

Chrome Browser Extensions

EXTENSIONS

Open VSX

VS Code Extensions

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Nov 23, 2025

Shai Hulud v2

Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.

Nov 05, 2025

Elves on npm

A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.

Jul 04, 2025

RubyGems Automation-Tool Infostealer

Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.

Mar 13, 2025

North Korea's Contagious Interview Campaign

Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.

Jul 23, 2024

Network Reconnaissance Campaign

A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub AppBook a Demo

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles