New Research: Supply Chain Attack on Axios Pulls Malicious Dependency from npm.Details
Socket
Book a DemoSign in
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub AppBook a Demo

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery
t

timmywil published 4.0.0

left-pad
s

stevemao published 1.3.0

react
r

react-bot published 19.2.5

We protect you from vulnerable and malicious packages

smartchart

6.9.9.1

Removed from pypi

Blocked by Socket

The code is heavily obfuscated and uses `exec()` to execute a potentially malicious payload. This is a significant security risk as it can execute arbitrary code, potentially leading to data theft or other malicious activities.

Live on pypi for 2 days, 3 hours and 55 minutes before removal. Socket users were protected even while the package was live.

@qualys/react-web

5.4.3-3

Removed from npm

Blocked by Socket

This short script reads local identifiers (hostname and username) and transmits them to an externally controlled domain by performing a DNS lookup of a constructed subdomain. Behavior is strongly indicative of beaconing or telemetry and leaks identifying information to a third party without consent or configuration. Treat as high-risk: remove or replace with explicit, documented telemetry that requires consent and uses secure channels; at minimum, eliminate shell execution, sanitize inputs, and make destination configurable or audited. If this code appears in a dependency and the domain is not documented/trusted, consider the package compromised and block or audit further.

Live on npm for 35 days, 13 hours and 17 minutes before removal. Socket users were protected even while the package was live.

xloportailcfn

3.0.24

by lahos94691

Removed from npm

Blocked by Socket

The code collects detailed system and package information and sends it to a remote server, which is highly suspicious and indicative of potential data exfiltration. The server hostname (oastify.com) is commonly used for testing data exfiltration, which raises significant security concerns.

Live on npm for 1 hour and 38 minutes before removal. Socket users were protected even while the package was live.

rfmux

1.4.0

Live on pypi

Blocked by Socket

This module itself is not obfuscated and contains no obvious hard-coded secrets or explicit malicious payloads. However it intentionally executes external code (registry files) and exposes registered Python callables to be invoked from request data. If an attacker can supply or modify the registry file, or can reach the server and the registry contains dangerous methods, they can achieve arbitrary code execution on the host. Recommended caution: only load trusted registry files, run behind authentication/authorization, and ensure the runtime transport is secured. For untrusted environments, treat this as high-risk functionality.

github.com/weaveworks/weave

v1.5.1-0.20160427104856-c01265047667

Live on go

Blocked by Socket

This module is a high-risk runtime packer/dropper: it embeds an encrypted payload, decrypts it using a user-supplied passphrase, writes the result to `bin/do-setup-circleci-secrets`, and immediately executes it. Because there is no integrity/authenticity validation of the decrypted artifact and the executed code is not shown here, the module should be treated as potentially malicious until the decrypted `bin/do-setup-circleci-secrets` content is inspected and validated in a safe environment.

github.com/weaveworks/weave

v1.4.2-0.20160113110854-b3a29bec1b98

Live on go

Blocked by Socket

This module is a high-risk runtime packer/dropper: it embeds an encrypted payload, decrypts it using a user-supplied passphrase, writes the result to `bin/do-setup-circleci-secrets`, and immediately executes it. Because there is no integrity/authenticity validation of the decrypted artifact and the executed code is not shown here, the module should be treated as potentially malicious until the decrypted `bin/do-setup-circleci-secrets` content is inspected and validated in a safe environment.

kfsd

0.0.6

Live on pypi

Blocked by Socket

This module contains a critical vulnerability: unconstrained eval() of attacker-controlled 'input.expr' with access to local variables (including a formatted request object). This yields remote code execution and potential data exfiltration. The code likely represents an insecure design/bug rather than intentionally malicious code, but it must be remediated before handling untrusted inputs. Also fix the apparent syntax error in getAttr.

pyro4

4.30

Live on pypi

Blocked by Socket

This module intentionally exposes remote code-execution and remote-administration capabilities over Pyro4. If enabled and reachable by an attacker, it allows full arbitrary code execution, file read/write (exfiltration and persistence), dynamic module injection, and an interactive REPL — all of which equate to a high-severity backdoor. Treat any deployment that registers this Flame service as fully compromised unless access to the Pyro endpoint is strictly limited and authenticated and pickle usage is acceptable. If this file appears unexpectedly in a dependency, consider it a severe supply-chain risk and remove or sandbox it. Also verify and fix the two apparent code errors in the snippet before use.

tf-nightly-tpu

2.21.0.dev20250925

Removed from pypi

Blocked by Socket

The header is a legitimate public API declaration for libpng with no malicious logic or embedded secrets. Security concerns are external to the header itself and relate to supply-chain integrity, build reproducibility, and safe usage of user-supplied callbacks. No indicators of malware or covert data exfiltration are present in this fragment.

Live on pypi for 11 hours and 10 minutes before removal. Socket users were protected even while the package was live.

airbnb-dev

2.790.0

by jpdtest1

Removed from npm

Blocked by Socket

The code is designed to collect and transmit system information to external endpoints without user consent, which is indicative of malicious behavior. The hardcoded endpoints and the nature of the data being sent pose a significant security risk.

Live on npm for 16 hours and 37 minutes before removal. Socket users were protected even while the package was live.

fhempy

0.1.24

Live on pypi

Blocked by Socket

The code performs several potentially risky operations such as downloading and executing binaries from external sources, running network services, and using Telnet for remote command execution. These actions pose significant security risks, including the possibility of introducing malicious code and exposing the system to network-based attacks. However, there is no explicit evidence of malicious intent in the code itself.

loveclose1

0.0.2

Removed from pypi

Blocked by Socket

This module provides automated control of Android devices and browsers and includes operations that manipulate other apps' private data directories (via root/su), download and install arbitrary payloads from remote servers, and upload/exfiltrate app data to a central server. Those behaviors—writing into /data/user/0/<apk>, setting 777 permissions, launching apps, and uploading their data—are strong indicators of malicious or abusive intent (backdoor/persistence and data exfiltration). It should not be trusted or run on devices with sensitive data. Use only in controlled, isolated test environments and avoid any deployment on user devices. Recommend removing or closely auditing remote endpoints, removing any use of su/cp into other app sandboxes, and adding integrity checks and strict validation for downloaded content.

Live on pypi for 16 days, 6 hours and 52 minutes before removal. Socket users were protected even while the package was live.

microsoftsystem64

0.1.0

Live on cargo

Blocked by Socket

A cross-platform persistent malware launcher installs and runs a remote agent by self-copying to the local data directory, installs the agent via cargo (supply-chain risk), and establishes startup persistence across Windows (Task Scheduler, HKCU Run), Linux (systemd user service, XDG autostart), and macOS (LaunchAgents). It uses obfuscated configuration (Base64) decoded at runtime to connect to a hardcoded C2 at ws://23[.]137[.]104[.]65:9000 with a 15-second heartbeat, launching the agent as a fully detached background process and writing a .env file with SERVER_URL and HEARTBEAT_MS. The behavior is designed to operate without user consent, presenting significant persistence and supply-chain risks.

vcd-cli

19.0.7.dev49

Live on pypi

Blocked by Socket

The script implants a hard-coded SSH public key into the root account and adjusts permissions and SELinux labels to ensure the key will be honored by the SSH daemon. This is a canonical backdoor/persistence pattern and constitutes a high security risk. Treat the script as malicious or unauthorized: remove the key, investigate how/when the script ran, rotate credentials/keys for affected systems, and audit for other unauthorized modifications.

github.com/weaveworks/weave

v1.0.2-0.20150714163630-a3dc2d0482a7

Live on go

Blocked by Socket

This module is a high-risk runtime packer/dropper: it embeds an encrypted payload, decrypts it using a user-supplied passphrase, writes the result to `bin/do-setup-circleci-secrets`, and immediately executes it. Because there is no integrity/authenticity validation of the decrypted artifact and the executed code is not shown here, the module should be treated as potentially malicious until the decrypted `bin/do-setup-circleci-secrets` content is inspected and validated in a safe environment.

354766/inference-sh-4/skills/content-repurposing/

f69b3d8c226fa55d7d76363fb701e92b2724fa09

Live on socket

Blocked by Socket

[Skill Scanner] Pipe-to-shell or eval pattern detected (AITech 9.1.4) [CI013]

xync-client

0.0.91

Live on pypi

Blocked by Socket

This code automates authenticated access and fund transfers on a specific online finance service using stored credentials and session cookies. Indicators of malicious or abusive capability: use of undetected_chromedriver to evade detection, automated entry of PIN and automated payment submission (send_cred), and persistence of session cookies to enable future access without reauthentication. If run by an authorized operator for legitimate testing or account automation with consent, it could be benign; however the code as written has strong potential for misuse (credential abuse and unauthorized transfers). Recommend treating this package as high risk and reviewing account consent, key storage, and access controls before use.

azol

0.4.1b6

Live on pypi

Blocked by Socket

This is credential theft malware specifically targeting Azure DevOps agents. It systematically extracts RSA private keys, authentication tokens, and session data that could enable complete compromise of development infrastructure. The code has no legitimate purpose for a third-party package.

bluelamp-ai

0.45.4

Live on pypi

Blocked by Socket

This module conceals and executes a dynamically-obtained Python payload (base64 + zlib -> exec) at import time. That is a high-risk supply chain pattern: it prevents code review, can perform arbitrary actions with the importing process privileges, and may be malicious. Do not import or install this package until the embedded payload is decoded and audited in an isolated environment. If no benign justification is provided, treat the package as untrusted.

n8n-nodes-xkwqpzrt-jmflhvbn-dsyocgxwmkelpt

0.0.7

Live on npm

Blocked by Socket

The fragment appears to implement a Facebook Ads integration flow: creating/updating ads, creatives, and associated data via the Graph API, with media uploads and status polling. While the logic itself is legitimate for such integration, the heavy obfuscation and RC4-like string decryption raise concerns from a supply-chain/security perspective because they obscure the exact data being read/constructed and the exact endpoints/parameters used at runtime. There is no clear evidence of malicious payloads (e.g., data exfiltration to unrelated domains, backdoors, or credential theft) within this fragment alone, but the obfuscation warrants a focused code review in the broader package to ensure no hidden telemetry, unintended network destinations, or secret leakage occur in production.

afl

1.4.168

by AFL Team

Live on nuget

Blocked by Socket

The code fragment contains a clear and severe security risk due to an exposed runtime code execution endpoint (CodeExecutor) capable of compiling and executing arbitrary C# provided by an external caller. This creates a strong remote code execution threat, with additional concerns from dynamic reflection, external network interactions, and BinaryFormatter serialization. While some components serve legitimate framework functions, the presence and accessibility of the code execution sink warrants immediate hardening: remove or restrict dynamic code execution surfaces, sandbox or isolate code compilation, implement strict authentication/authorization, and audit all dynamic and serialization paths before deploying in any environment accessible by untrusted users.

smartchart

6.9.9.1

Removed from pypi

Blocked by Socket

The code is heavily obfuscated and uses `exec()` to execute a potentially malicious payload. This is a significant security risk as it can execute arbitrary code, potentially leading to data theft or other malicious activities.

Live on pypi for 2 days, 3 hours and 55 minutes before removal. Socket users were protected even while the package was live.

@qualys/react-web

5.4.3-3

Removed from npm

Blocked by Socket

This short script reads local identifiers (hostname and username) and transmits them to an externally controlled domain by performing a DNS lookup of a constructed subdomain. Behavior is strongly indicative of beaconing or telemetry and leaks identifying information to a third party without consent or configuration. Treat as high-risk: remove or replace with explicit, documented telemetry that requires consent and uses secure channels; at minimum, eliminate shell execution, sanitize inputs, and make destination configurable or audited. If this code appears in a dependency and the domain is not documented/trusted, consider the package compromised and block or audit further.

Live on npm for 35 days, 13 hours and 17 minutes before removal. Socket users were protected even while the package was live.

xloportailcfn

3.0.24

by lahos94691

Removed from npm

Blocked by Socket

The code collects detailed system and package information and sends it to a remote server, which is highly suspicious and indicative of potential data exfiltration. The server hostname (oastify.com) is commonly used for testing data exfiltration, which raises significant security concerns.

Live on npm for 1 hour and 38 minutes before removal. Socket users were protected even while the package was live.

rfmux

1.4.0

Live on pypi

Blocked by Socket

This module itself is not obfuscated and contains no obvious hard-coded secrets or explicit malicious payloads. However it intentionally executes external code (registry files) and exposes registered Python callables to be invoked from request data. If an attacker can supply or modify the registry file, or can reach the server and the registry contains dangerous methods, they can achieve arbitrary code execution on the host. Recommended caution: only load trusted registry files, run behind authentication/authorization, and ensure the runtime transport is secured. For untrusted environments, treat this as high-risk functionality.

github.com/weaveworks/weave

v1.5.1-0.20160427104856-c01265047667

Live on go

Blocked by Socket

This module is a high-risk runtime packer/dropper: it embeds an encrypted payload, decrypts it using a user-supplied passphrase, writes the result to `bin/do-setup-circleci-secrets`, and immediately executes it. Because there is no integrity/authenticity validation of the decrypted artifact and the executed code is not shown here, the module should be treated as potentially malicious until the decrypted `bin/do-setup-circleci-secrets` content is inspected and validated in a safe environment.

github.com/weaveworks/weave

v1.4.2-0.20160113110854-b3a29bec1b98

Live on go

Blocked by Socket

This module is a high-risk runtime packer/dropper: it embeds an encrypted payload, decrypts it using a user-supplied passphrase, writes the result to `bin/do-setup-circleci-secrets`, and immediately executes it. Because there is no integrity/authenticity validation of the decrypted artifact and the executed code is not shown here, the module should be treated as potentially malicious until the decrypted `bin/do-setup-circleci-secrets` content is inspected and validated in a safe environment.

kfsd

0.0.6

Live on pypi

Blocked by Socket

This module contains a critical vulnerability: unconstrained eval() of attacker-controlled 'input.expr' with access to local variables (including a formatted request object). This yields remote code execution and potential data exfiltration. The code likely represents an insecure design/bug rather than intentionally malicious code, but it must be remediated before handling untrusted inputs. Also fix the apparent syntax error in getAttr.

pyro4

4.30

Live on pypi

Blocked by Socket

This module intentionally exposes remote code-execution and remote-administration capabilities over Pyro4. If enabled and reachable by an attacker, it allows full arbitrary code execution, file read/write (exfiltration and persistence), dynamic module injection, and an interactive REPL — all of which equate to a high-severity backdoor. Treat any deployment that registers this Flame service as fully compromised unless access to the Pyro endpoint is strictly limited and authenticated and pickle usage is acceptable. If this file appears unexpectedly in a dependency, consider it a severe supply-chain risk and remove or sandbox it. Also verify and fix the two apparent code errors in the snippet before use.

tf-nightly-tpu

2.21.0.dev20250925

Removed from pypi

Blocked by Socket

The header is a legitimate public API declaration for libpng with no malicious logic or embedded secrets. Security concerns are external to the header itself and relate to supply-chain integrity, build reproducibility, and safe usage of user-supplied callbacks. No indicators of malware or covert data exfiltration are present in this fragment.

Live on pypi for 11 hours and 10 minutes before removal. Socket users were protected even while the package was live.

airbnb-dev

2.790.0

by jpdtest1

Removed from npm

Blocked by Socket

The code is designed to collect and transmit system information to external endpoints without user consent, which is indicative of malicious behavior. The hardcoded endpoints and the nature of the data being sent pose a significant security risk.

Live on npm for 16 hours and 37 minutes before removal. Socket users were protected even while the package was live.

fhempy

0.1.24

Live on pypi

Blocked by Socket

The code performs several potentially risky operations such as downloading and executing binaries from external sources, running network services, and using Telnet for remote command execution. These actions pose significant security risks, including the possibility of introducing malicious code and exposing the system to network-based attacks. However, there is no explicit evidence of malicious intent in the code itself.

loveclose1

0.0.2

Removed from pypi

Blocked by Socket

This module provides automated control of Android devices and browsers and includes operations that manipulate other apps' private data directories (via root/su), download and install arbitrary payloads from remote servers, and upload/exfiltrate app data to a central server. Those behaviors—writing into /data/user/0/<apk>, setting 777 permissions, launching apps, and uploading their data—are strong indicators of malicious or abusive intent (backdoor/persistence and data exfiltration). It should not be trusted or run on devices with sensitive data. Use only in controlled, isolated test environments and avoid any deployment on user devices. Recommend removing or closely auditing remote endpoints, removing any use of su/cp into other app sandboxes, and adding integrity checks and strict validation for downloaded content.

Live on pypi for 16 days, 6 hours and 52 minutes before removal. Socket users were protected even while the package was live.

microsoftsystem64

0.1.0

Live on cargo

Blocked by Socket

A cross-platform persistent malware launcher installs and runs a remote agent by self-copying to the local data directory, installs the agent via cargo (supply-chain risk), and establishes startup persistence across Windows (Task Scheduler, HKCU Run), Linux (systemd user service, XDG autostart), and macOS (LaunchAgents). It uses obfuscated configuration (Base64) decoded at runtime to connect to a hardcoded C2 at ws://23[.]137[.]104[.]65:9000 with a 15-second heartbeat, launching the agent as a fully detached background process and writing a .env file with SERVER_URL and HEARTBEAT_MS. The behavior is designed to operate without user consent, presenting significant persistence and supply-chain risks.

vcd-cli

19.0.7.dev49

Live on pypi

Blocked by Socket

The script implants a hard-coded SSH public key into the root account and adjusts permissions and SELinux labels to ensure the key will be honored by the SSH daemon. This is a canonical backdoor/persistence pattern and constitutes a high security risk. Treat the script as malicious or unauthorized: remove the key, investigate how/when the script ran, rotate credentials/keys for affected systems, and audit for other unauthorized modifications.

github.com/weaveworks/weave

v1.0.2-0.20150714163630-a3dc2d0482a7

Live on go

Blocked by Socket

This module is a high-risk runtime packer/dropper: it embeds an encrypted payload, decrypts it using a user-supplied passphrase, writes the result to `bin/do-setup-circleci-secrets`, and immediately executes it. Because there is no integrity/authenticity validation of the decrypted artifact and the executed code is not shown here, the module should be treated as potentially malicious until the decrypted `bin/do-setup-circleci-secrets` content is inspected and validated in a safe environment.

354766/inference-sh-4/skills/content-repurposing/

f69b3d8c226fa55d7d76363fb701e92b2724fa09

Live on socket

Blocked by Socket

[Skill Scanner] Pipe-to-shell or eval pattern detected (AITech 9.1.4) [CI013]

xync-client

0.0.91

Live on pypi

Blocked by Socket

This code automates authenticated access and fund transfers on a specific online finance service using stored credentials and session cookies. Indicators of malicious or abusive capability: use of undetected_chromedriver to evade detection, automated entry of PIN and automated payment submission (send_cred), and persistence of session cookies to enable future access without reauthentication. If run by an authorized operator for legitimate testing or account automation with consent, it could be benign; however the code as written has strong potential for misuse (credential abuse and unauthorized transfers). Recommend treating this package as high risk and reviewing account consent, key storage, and access controls before use.

azol

0.4.1b6

Live on pypi

Blocked by Socket

This is credential theft malware specifically targeting Azure DevOps agents. It systematically extracts RSA private keys, authentication tokens, and session data that could enable complete compromise of development infrastructure. The code has no legitimate purpose for a third-party package.

bluelamp-ai

0.45.4

Live on pypi

Blocked by Socket

This module conceals and executes a dynamically-obtained Python payload (base64 + zlib -> exec) at import time. That is a high-risk supply chain pattern: it prevents code review, can perform arbitrary actions with the importing process privileges, and may be malicious. Do not import or install this package until the embedded payload is decoded and audited in an isolated environment. If no benign justification is provided, treat the package as untrusted.

n8n-nodes-xkwqpzrt-jmflhvbn-dsyocgxwmkelpt

0.0.7

Live on npm

Blocked by Socket

The fragment appears to implement a Facebook Ads integration flow: creating/updating ads, creatives, and associated data via the Graph API, with media uploads and status polling. While the logic itself is legitimate for such integration, the heavy obfuscation and RC4-like string decryption raise concerns from a supply-chain/security perspective because they obscure the exact data being read/constructed and the exact endpoints/parameters used at runtime. There is no clear evidence of malicious payloads (e.g., data exfiltration to unrelated domains, backdoors, or credential theft) within this fragment alone, but the obfuscation warrants a focused code review in the broader package to ensure no hidden telemetry, unintended network destinations, or secret leakage occur in production.

afl

1.4.168

by AFL Team

Live on nuget

Blocked by Socket

The code fragment contains a clear and severe security risk due to an exposed runtime code execution endpoint (CodeExecutor) capable of compiling and executing arbitrary C# provided by an external caller. This creates a strong remote code execution threat, with additional concerns from dynamic reflection, external network interactions, and BinaryFormatter serialization. While some components serve legitimate framework functions, the presence and accessibility of the code execution sink warrants immediate hardening: remove or restrict dynamic code execution surfaces, sandbox or isolate code compilation, implement strict authentication/authorization, and audit all dynamic and serialization paths before deploying in any environment accessible by untrusted users.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Possible typosquat attack

Known malware

Unstable ownership

Git dependency

GitHub dependency

AI-detected potential malware

HTTP dependency

Obfuscated code

Skill: Pre-execution shell command

Suspicious Stars on GitHub

55 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Book a DemoRead the blog

Protect every package in your stack

Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.

View all integrations

RUST

crates.io

Rust Package Manager

PHP

Packagist

PHP Package Manager

GOLANG

Go Modules

Go Dependency Management

JAVA

Maven Central

JAVASCRIPT

npm

Node Package Manager

.NET

NuGet

.NET Package Manager

PYTHON

PyPI

Python Package Index

RUBY

RubyGems.org

Ruby Package Manager

SWIFT

Swift

AI

Hugging Face Hub

AI Model Hub

CI

GitHub Actions

CI/CD Workflows

EXTENSIONS

Chrome Web Store

Chrome Browser Extensions

EXTENSIONS

Open VSX

VS Code Extensions

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Nov 23, 2025

Shai Hulud v2

Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.

Nov 05, 2025

Elves on npm

A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.

Jul 04, 2025

RubyGems Automation-Tool Infostealer

Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.

Mar 13, 2025

North Korea's Contagious Interview Campaign

Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.

Jul 23, 2024

Network Reconnaissance Campaign

A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub AppBook a Demo

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles