New Research: Supply Chain Attack on Axios Pulls Malicious Dependency from npm.Details →
Socket
Book a DemoSign in
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub AppBook a Demo

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery
t

timmywil published 4.0.0

left-pad
s

stevemao published 1.3.0

react
r

react-bot published 19.2.4

We protect you from vulnerable and malicious packages

unipin_the_leading_digital_entertainment_enabler561

1.0.2

by khadijaakter86628

Removed from npm

Blocked by Socket

The code poses a high security risk due to hardcoded credentials and automated publishing, which could be exploited for spamming or malicious distribution. The intent and use of the code are questionable.

Live on npm for 1 minute before removal. Socket users were protected even while the package was live.

mtmai

0.3.763

Live on pypi

Blocked by Socket

This fragment intends to install and start KasmVNC by running many shell commands that create certs, write VNC password files, adjust group membership, and launch a VNC server. The primary security issues are unsafe shell interpolation (command injection risk), programmatic persistence of a possibly predictable password, execution with sudo based on unvalidated env vars, starting a VNC server exposed on 0.0.0.0 with disabled/basic auth, and multiple unsafe filesystem operations performed via shell. There is no clear evidence of obfuscated or direct exfiltration malware, but the behavior can provide an unauthorized remote access vector (backdoor-like) if used maliciously. Do not run this code without fixing shell usage, validating inputs, using secure randomly generated passwords, enforcing proper file permissions, and not disabling authentication.

pymediawikidocker

0.20.5

Live on pypi

Blocked by Socket

This script is intentionally destructive: it removes a sudoers fragment and uninstalls the sudo package (on Debian/Ubuntu systems) and thus can lock out administrators and impede recovery. It is high-risk sabotage rather than covert data-exfiltration malware. Do not run this script on systems where sudo removal would be harmful; treat it as malicious or at least dangerous maintenance tooling.

luksdk-web

1.1.15

by luksdk

Live on npm

Blocked by Socket

The analyzed code implements a sophisticated, runtime interception framework injected into an iframe to hijack resource loading (scripts, images, network requests) and to reroute cocos engine asset resolution through blob-backed resources. Although it could serve legitimate offline or sandbox purposes, its broad API monkey-patching, persistence mechanisms, and extensive resource remapping constitute a high-risk pattern typical of backdoors or supply-chain tampering. It should be considered suspicious for public deployment and requires strict review, provenance verification, and removal or secure hardening before use in open-source packages.

argutrackdnn.edison.annotation

2.0.250901

by ArgutrackDNN.Edison.Annotation

Live on nuget

Blocked by Socket

This module contains highly suspicious and potentially malicious functionality. It implements an obfuscated runtime loader/unpacker: it reads embedded resources, performs cryptographic transforms, allocates and writes to native executable memory, changes memory protections and invokes code via delegated/native entry points. It also dynamically generates delegates and patches static fields using resolved metadata tokens and low-level reflection, and uses platform-specific P/Invoke to alter process memory and runtime JIT behavior. These are strong indicators of in-memory code injection/loader or backdoor/supply-chain behavior. Treat this package as high-risk: do not use without further code provenance, a full audit of embedded resources, and dynamic analysis in a safe sandbox.

airbnb-env

99.99.99

by bate5a511

Removed from npm

Blocked by Socket

The analyzed source code contains a malicious backdoor that stealthily collects and exfiltrates sensitive system and package information to a suspicious external server. This is a high-risk security incident indicative of spyware or supply chain compromise. The code is not obfuscated but is clearly designed for data theft. Immediate action is recommended to block and remove this package from any environment.

Live on npm for 2 hours and 5 minutes before removal. Socket users were protected even while the package was live.

metro-evaluator

1.0.0

by yub02

Removed from npm

Blocked by Socket

This code performs unsafe dynamic execution of externally fetched content. It constitutes a severe supply-chain and RCE risk: an attacker who can modify the remote file or intercept/forge the response can execute arbitrary code in the host process. Even if the current URL returns non-JS (HTML), making eval likely to throw, the pattern remains dangerous if the remote content is changed. Replace this pattern: do not eval network data. If dynamic behavior is required, use signed artifacts, verify integrity (cryptographic signature or pinned hash), fetch raw content endpoints, restrict capabilities (run in isolated process or Node VM with limited context), and enforce size/time limits and content-type checks.

Live on npm for 5 days, 4 hours and 23 minutes before removal. Socket users were protected even while the package was live.

@claudeink/mcp-server

2.2.9

by weekdmond

Live on npm

Blocked by Socket

High-risk behavior exists in this dependency bundle: gray-matter includes a `javascript` engine that directly executes attacker-controlled input using `eval`, and js-yaml full schema supports constructing executable functions via `new Function` from YAML tags. This combination enables RCE/prototype-pollution-style impacts if untrusted content reaches these parsing paths and the consumer uses the unsafe/full options.

aydee

2.1.0

Live on cargo

Blocked by Socket

This module is high-risk supply-chain content because it provides automated SMB password-spraying capability: it reads attacker-controlled user lists/passwords, repeatedly attempts SMB authentication by executing external offensive tools with credentials in arguments, and uses untrusted stdout/stderr parsing to classify outcomes. Critically, it prints and persists any discovered valid credentials in plaintext within findings/evidence, creating severe confidentiality and misuse risk. While it may be intended for authorized testing, its behavior is clearly attack-oriented and could enable unauthorized access if shipped or misused.

portal_box

1.0.2

by changgc

Live on npm

Blocked by Socket

The fragment exhibits a high-risk remote code loading and evaluation pattern with dynamic component instantiation. Without robust integrity verification, isolation (sandboxing or dynamic imports with CSP), and authenticated/plugin vetting, this flow enables potential backdoors, code tampering, or data leakage via remote payloads. Recommend removing or hardening the remote eval path (e.g., using signed, vetted plugins loaded via a secure module system with strict CSP/Subresource Integrity) and replacing synchronous XHR with asynchronous, controlled loading and isolated execution contexts.

telia-eventapi-client

8.9.9

Live on npm

Blocked by Socket

The provided code contains a covert data-exfiltration routine: it collects local identifiers and the machine's public IP, encodes them into a subdomain and performs a DNS resolution to an externally controlled domain (gfde.site). The exfiltration logic is obfuscated (hex-encoded strings/modules), runs automatically, and is unrelated to the exported utility functions. This behavior is malicious in a software supply-chain context. Remove or isolate this code and consider the package compromised.

busybox

2018.12.30

by kaizhu

Live on npm

Blocked by Socket

This package will run a local shell script (./npm_scripts.sh) during install (postinstall), which gives it the ability to execute arbitrary commands on the system — a notable risk and warrants manual inspection of npm_scripts.sh and any shipped bin scripts before installing. Additionally, the devDependency is a git URL reference (kaizhu256/node-electron-lite#alpha), which is resolved outside the npm registry and is considered at least medium risk. Together these factors make this package moderately to highly risky to install without code review.

@kui-shell/plugin-bash-like

13.1.2

by starpit

Live on npm

Blocked by Socket

This code contains malware due to its ability to execute arbitrary shell commands via WebSocket messages, insecure use of cookies for session verification, and insecure setup of an HTTPS server. These security vulnerabilities are exploited for malicious purposes.

mtmai

0.3.1138

Live on pypi

Blocked by Socket

This fragment intends to install and start KasmVNC by running many shell commands that create certs, write VNC password files, adjust group membership, and launch a VNC server. The primary security issues are unsafe shell interpolation (command injection risk), programmatic persistence of a possibly predictable password, execution with sudo based on unvalidated env vars, starting a VNC server exposed on 0.0.0.0 with disabled/basic auth, and multiple unsafe filesystem operations performed via shell. There is no clear evidence of obfuscated or direct exfiltration malware, but the behavior can provide an unauthorized remote access vector (backdoor-like) if used maliciously. Do not run this code without fixing shell usage, validating inputs, using secure randomly generated passwords, enforcing proper file permissions, and not disabling authentication.

instant-python

0.9.1

Live on pypi

Blocked by Socket

This module contains a high-severity command injection vulnerability: untrusted input is concatenated into a shell command and executed with shell=True. While the code shows no signs of intentional malware or obfuscation, the construction allows arbitrary commands to run with the privileges of the user executing the script. Remediation: stop using shell=True with untrusted data — use subprocess.run with an argument list (shell=False), validate/whitelist package and group names, or safely quote inputs (e.g., shlex.quote) if shell usage is unavoidable. Fix the apparent syntax error in the __main__ invocation.

praetorian-cli

1.3.4

Removed from pypi

Blocked by Socket

This code is not itself obfuscated or containing clear hardcoded backdoors, but it intentionally executes arbitrary Python scripts from directories specified by an environment variable. That design enables arbitrary code execution if an attacker can place files in those directories or control the environment variable. There is a programming bug (returns 'modul') and noisy exception swallowing which reduce reliability and auditability. Treat the dynamic loading feature as high risk in untrusted environments; ensure PRAETORIAN_SCRIPTS_PATH is restricted to trusted, read-only locations and consider replacing exec with a safer plugin import mechanism or sandboxing.

Live on pypi for 1 hour and 49 minutes before removal. Socket users were protected even while the package was live.

http-master

1.1.7

by rush

Live on npm

Blocked by Socket

The `http-master` script exhibits significant security risks primarily due to its dynamic loading capabilities. The ability to specify a custom `--configloader` script allows for arbitrary code execution if an attacker can control the path. Additionally, the direct use of `--config` without apparent sanitization opens the door for path traversal attacks. The reload mechanisms (`node-watch` and `SIGUSR1`) also present opportunities for attackers to inject malicious configurations. While the privilege dropping mechanism is intended for security, its effectiveness depends on proper implementation and error handling not fully visible here. The use of `js-yaml` also introduces a dependency risk if the library itself has vulnerabilities.

cl-lite

1.0.960

by michael_tian

Live on npm

Blocked by Socket

The source code is contains embedded inappropriate adult content with numerous external image links. It is not valid or functional software code. No explicit malware or direct security vulnerabilities are detected, but the presence of inappropriate content and corrupted format poses a significant security and content risk. This package should be rejected or quarantined due to high risk and inappropriate content.

mtmai

0.4.159

Live on pypi

Blocked by Socket

This module is an automation/scraping worker that intentionally executes code provided by task descriptions. That design requires trusting the task source. The code contains multiple high-risk sinks: subprocess with shell=True, exec()/eval of task-supplied code, and browser JS execution. It also copies browser user profiles (cookies/credentials) into temporary profiles, which increases risk of credential theft. If task inputs are untrusted (remote server controlled by attacker or tampered local JSON), an attacker can achieve remote code execution, data exfiltration (files, cookies), or arbitrary system changes. Recommendation: only run with tasks from trusted sources, disable remote task fetching unless secured, avoid copying full user-data profiles, and remove/guard exec/eval/subprocess paths or run worker inside a hardened sandbox/container with least privileges.

github.com/milvus-io/milvus

v0.10.3-0.20220129143944-b4bfe58fd993

Live on go

Blocked by Socket

This code implements an insecure, unauthenticated RPC mechanism that allows remote clients to cause arbitrary code execution and exfiltrate files/system information. Using pickle over an untrusted network and invoking methods by client-supplied names are severe supply-chain/backdoor risks. Do not deploy or reuse this code in production; it should be treated as a backdoor/untrusted remote-execution component unless wrapped with strong authentication, authorization, sandboxing, and safe serialization.

carbonorm/carbonphp

13.7.6

Live on composer

Blocked by Socket

The codebase combines a functional migration workflow with a dangerous hidden payload mechanism. The selfHidingFile function introduces a backdoor-like capability that could serve arbitrary files contingent on a license check and POST parameters. While not inherently malicious in every execution path, the embedded HALT payload creates a severe supply-chain and runtime risk if exposed in production or misconfigured. Immediate actions: remove or restrict the HALT-based payload, harden license handling, implement strict input validation for all remote interactions, and audit remote manifest handling for data leakage risks.

ailever

0.2.546

Live on pypi

Blocked by Socket

The code presents a strong supply-chain and remote-execution risk by automatically downloading and executing remote Python payloads without integrity checks or sandboxing. It also creates and runs external services (Jupyter, Visdom, RStudio) based on user inputs, which can amplify impact if the remote payload is malicious. Mitigations include removing remote code execution paths, adding cryptographic verification (signatures or hash checks), isolating execution (sandboxes or containerization), validating inputs, and avoiding untrusted downloads or executions.

@budibase/string-templates

3.35.1

by christos-budibase

Live on npm

Blocked by Socket

High-risk behavior is present: the module provides an arbitrary JavaScript execution engine (`processJS` -> `runJS`) and additionally evaluates user-provided snippet code via `eval(...)` through a Proxy (`snippets`). This strongly elevates the likelihood of supply-chain sabotage or malicious runtime behavior. The same bundle also includes a server-side file read helper (`fs.readFileSync`) in `code.embed`, which could enable local file disclosure if its arguments are attacker-influenced. Overall, the fragment is not merely a utility library; it contains explicit code-execution capabilities consistent with a backdoor/weaponizable feature.

johnsnowlabs-by-ckl

5.1.8rc20

Live on pypi

Blocked by Socket

This module is a high-risk utility because it fetches Python code from remote URLs and local markdown files and executes that code directly via execute_py_script_string_as_new_proc without validation or sandboxing. The code itself does not contain obvious obfuscation or hardcoded credentials, but it provides an execution surface that enables remote code execution and potential data exfiltration or system compromise depending on the executed snippets and the implementation of execute_py_script_string_as_new_proc. Treat calls that use remote URLs or untrusted markdown as dangerous. Use only with trusted content or add validation/sandboxing (e.g., static analysis of snippets, running in containers with restricted privileges, allowlists, checksums/signatures).

unipin_the_leading_digital_entertainment_enabler561

1.0.2

by khadijaakter86628

Removed from npm

Blocked by Socket

The code poses a high security risk due to hardcoded credentials and automated publishing, which could be exploited for spamming or malicious distribution. The intent and use of the code are questionable.

Live on npm for 1 minute before removal. Socket users were protected even while the package was live.

mtmai

0.3.763

Live on pypi

Blocked by Socket

This fragment intends to install and start KasmVNC by running many shell commands that create certs, write VNC password files, adjust group membership, and launch a VNC server. The primary security issues are unsafe shell interpolation (command injection risk), programmatic persistence of a possibly predictable password, execution with sudo based on unvalidated env vars, starting a VNC server exposed on 0.0.0.0 with disabled/basic auth, and multiple unsafe filesystem operations performed via shell. There is no clear evidence of obfuscated or direct exfiltration malware, but the behavior can provide an unauthorized remote access vector (backdoor-like) if used maliciously. Do not run this code without fixing shell usage, validating inputs, using secure randomly generated passwords, enforcing proper file permissions, and not disabling authentication.

pymediawikidocker

0.20.5

Live on pypi

Blocked by Socket

This script is intentionally destructive: it removes a sudoers fragment and uninstalls the sudo package (on Debian/Ubuntu systems) and thus can lock out administrators and impede recovery. It is high-risk sabotage rather than covert data-exfiltration malware. Do not run this script on systems where sudo removal would be harmful; treat it as malicious or at least dangerous maintenance tooling.

luksdk-web

1.1.15

by luksdk

Live on npm

Blocked by Socket

The analyzed code implements a sophisticated, runtime interception framework injected into an iframe to hijack resource loading (scripts, images, network requests) and to reroute cocos engine asset resolution through blob-backed resources. Although it could serve legitimate offline or sandbox purposes, its broad API monkey-patching, persistence mechanisms, and extensive resource remapping constitute a high-risk pattern typical of backdoors or supply-chain tampering. It should be considered suspicious for public deployment and requires strict review, provenance verification, and removal or secure hardening before use in open-source packages.

argutrackdnn.edison.annotation

2.0.250901

by ArgutrackDNN.Edison.Annotation

Live on nuget

Blocked by Socket

This module contains highly suspicious and potentially malicious functionality. It implements an obfuscated runtime loader/unpacker: it reads embedded resources, performs cryptographic transforms, allocates and writes to native executable memory, changes memory protections and invokes code via delegated/native entry points. It also dynamically generates delegates and patches static fields using resolved metadata tokens and low-level reflection, and uses platform-specific P/Invoke to alter process memory and runtime JIT behavior. These are strong indicators of in-memory code injection/loader or backdoor/supply-chain behavior. Treat this package as high-risk: do not use without further code provenance, a full audit of embedded resources, and dynamic analysis in a safe sandbox.

airbnb-env

99.99.99

by bate5a511

Removed from npm

Blocked by Socket

The analyzed source code contains a malicious backdoor that stealthily collects and exfiltrates sensitive system and package information to a suspicious external server. This is a high-risk security incident indicative of spyware or supply chain compromise. The code is not obfuscated but is clearly designed for data theft. Immediate action is recommended to block and remove this package from any environment.

Live on npm for 2 hours and 5 minutes before removal. Socket users were protected even while the package was live.

metro-evaluator

1.0.0

by yub02

Removed from npm

Blocked by Socket

This code performs unsafe dynamic execution of externally fetched content. It constitutes a severe supply-chain and RCE risk: an attacker who can modify the remote file or intercept/forge the response can execute arbitrary code in the host process. Even if the current URL returns non-JS (HTML), making eval likely to throw, the pattern remains dangerous if the remote content is changed. Replace this pattern: do not eval network data. If dynamic behavior is required, use signed artifacts, verify integrity (cryptographic signature or pinned hash), fetch raw content endpoints, restrict capabilities (run in isolated process or Node VM with limited context), and enforce size/time limits and content-type checks.

Live on npm for 5 days, 4 hours and 23 minutes before removal. Socket users were protected even while the package was live.

@claudeink/mcp-server

2.2.9

by weekdmond

Live on npm

Blocked by Socket

High-risk behavior exists in this dependency bundle: gray-matter includes a `javascript` engine that directly executes attacker-controlled input using `eval`, and js-yaml full schema supports constructing executable functions via `new Function` from YAML tags. This combination enables RCE/prototype-pollution-style impacts if untrusted content reaches these parsing paths and the consumer uses the unsafe/full options.

aydee

2.1.0

Live on cargo

Blocked by Socket

This module is high-risk supply-chain content because it provides automated SMB password-spraying capability: it reads attacker-controlled user lists/passwords, repeatedly attempts SMB authentication by executing external offensive tools with credentials in arguments, and uses untrusted stdout/stderr parsing to classify outcomes. Critically, it prints and persists any discovered valid credentials in plaintext within findings/evidence, creating severe confidentiality and misuse risk. While it may be intended for authorized testing, its behavior is clearly attack-oriented and could enable unauthorized access if shipped or misused.

portal_box

1.0.2

by changgc

Live on npm

Blocked by Socket

The fragment exhibits a high-risk remote code loading and evaluation pattern with dynamic component instantiation. Without robust integrity verification, isolation (sandboxing or dynamic imports with CSP), and authenticated/plugin vetting, this flow enables potential backdoors, code tampering, or data leakage via remote payloads. Recommend removing or hardening the remote eval path (e.g., using signed, vetted plugins loaded via a secure module system with strict CSP/Subresource Integrity) and replacing synchronous XHR with asynchronous, controlled loading and isolated execution contexts.

telia-eventapi-client

8.9.9

Live on npm

Blocked by Socket

The provided code contains a covert data-exfiltration routine: it collects local identifiers and the machine's public IP, encodes them into a subdomain and performs a DNS resolution to an externally controlled domain (gfde.site). The exfiltration logic is obfuscated (hex-encoded strings/modules), runs automatically, and is unrelated to the exported utility functions. This behavior is malicious in a software supply-chain context. Remove or isolate this code and consider the package compromised.

busybox

2018.12.30

by kaizhu

Live on npm

Blocked by Socket

This package will run a local shell script (./npm_scripts.sh) during install (postinstall), which gives it the ability to execute arbitrary commands on the system — a notable risk and warrants manual inspection of npm_scripts.sh and any shipped bin scripts before installing. Additionally, the devDependency is a git URL reference (kaizhu256/node-electron-lite#alpha), which is resolved outside the npm registry and is considered at least medium risk. Together these factors make this package moderately to highly risky to install without code review.

@kui-shell/plugin-bash-like

13.1.2

by starpit

Live on npm

Blocked by Socket

This code contains malware due to its ability to execute arbitrary shell commands via WebSocket messages, insecure use of cookies for session verification, and insecure setup of an HTTPS server. These security vulnerabilities are exploited for malicious purposes.

mtmai

0.3.1138

Live on pypi

Blocked by Socket

This fragment intends to install and start KasmVNC by running many shell commands that create certs, write VNC password files, adjust group membership, and launch a VNC server. The primary security issues are unsafe shell interpolation (command injection risk), programmatic persistence of a possibly predictable password, execution with sudo based on unvalidated env vars, starting a VNC server exposed on 0.0.0.0 with disabled/basic auth, and multiple unsafe filesystem operations performed via shell. There is no clear evidence of obfuscated or direct exfiltration malware, but the behavior can provide an unauthorized remote access vector (backdoor-like) if used maliciously. Do not run this code without fixing shell usage, validating inputs, using secure randomly generated passwords, enforcing proper file permissions, and not disabling authentication.

instant-python

0.9.1

Live on pypi

Blocked by Socket

This module contains a high-severity command injection vulnerability: untrusted input is concatenated into a shell command and executed with shell=True. While the code shows no signs of intentional malware or obfuscation, the construction allows arbitrary commands to run with the privileges of the user executing the script. Remediation: stop using shell=True with untrusted data — use subprocess.run with an argument list (shell=False), validate/whitelist package and group names, or safely quote inputs (e.g., shlex.quote) if shell usage is unavoidable. Fix the apparent syntax error in the __main__ invocation.

praetorian-cli

1.3.4

Removed from pypi

Blocked by Socket

This code is not itself obfuscated or containing clear hardcoded backdoors, but it intentionally executes arbitrary Python scripts from directories specified by an environment variable. That design enables arbitrary code execution if an attacker can place files in those directories or control the environment variable. There is a programming bug (returns 'modul') and noisy exception swallowing which reduce reliability and auditability. Treat the dynamic loading feature as high risk in untrusted environments; ensure PRAETORIAN_SCRIPTS_PATH is restricted to trusted, read-only locations and consider replacing exec with a safer plugin import mechanism or sandboxing.

Live on pypi for 1 hour and 49 minutes before removal. Socket users were protected even while the package was live.

http-master

1.1.7

by rush

Live on npm

Blocked by Socket

The `http-master` script exhibits significant security risks primarily due to its dynamic loading capabilities. The ability to specify a custom `--configloader` script allows for arbitrary code execution if an attacker can control the path. Additionally, the direct use of `--config` without apparent sanitization opens the door for path traversal attacks. The reload mechanisms (`node-watch` and `SIGUSR1`) also present opportunities for attackers to inject malicious configurations. While the privilege dropping mechanism is intended for security, its effectiveness depends on proper implementation and error handling not fully visible here. The use of `js-yaml` also introduces a dependency risk if the library itself has vulnerabilities.

cl-lite

1.0.960

by michael_tian

Live on npm

Blocked by Socket

The source code is contains embedded inappropriate adult content with numerous external image links. It is not valid or functional software code. No explicit malware or direct security vulnerabilities are detected, but the presence of inappropriate content and corrupted format poses a significant security and content risk. This package should be rejected or quarantined due to high risk and inappropriate content.

mtmai

0.4.159

Live on pypi

Blocked by Socket

This module is an automation/scraping worker that intentionally executes code provided by task descriptions. That design requires trusting the task source. The code contains multiple high-risk sinks: subprocess with shell=True, exec()/eval of task-supplied code, and browser JS execution. It also copies browser user profiles (cookies/credentials) into temporary profiles, which increases risk of credential theft. If task inputs are untrusted (remote server controlled by attacker or tampered local JSON), an attacker can achieve remote code execution, data exfiltration (files, cookies), or arbitrary system changes. Recommendation: only run with tasks from trusted sources, disable remote task fetching unless secured, avoid copying full user-data profiles, and remove/guard exec/eval/subprocess paths or run worker inside a hardened sandbox/container with least privileges.

github.com/milvus-io/milvus

v0.10.3-0.20220129143944-b4bfe58fd993

Live on go

Blocked by Socket

This code implements an insecure, unauthenticated RPC mechanism that allows remote clients to cause arbitrary code execution and exfiltrate files/system information. Using pickle over an untrusted network and invoking methods by client-supplied names are severe supply-chain/backdoor risks. Do not deploy or reuse this code in production; it should be treated as a backdoor/untrusted remote-execution component unless wrapped with strong authentication, authorization, sandboxing, and safe serialization.

carbonorm/carbonphp

13.7.6

Live on composer

Blocked by Socket

The codebase combines a functional migration workflow with a dangerous hidden payload mechanism. The selfHidingFile function introduces a backdoor-like capability that could serve arbitrary files contingent on a license check and POST parameters. While not inherently malicious in every execution path, the embedded HALT payload creates a severe supply-chain and runtime risk if exposed in production or misconfigured. Immediate actions: remove or restrict the HALT-based payload, harden license handling, implement strict input validation for all remote interactions, and audit remote manifest handling for data leakage risks.

ailever

0.2.546

Live on pypi

Blocked by Socket

The code presents a strong supply-chain and remote-execution risk by automatically downloading and executing remote Python payloads without integrity checks or sandboxing. It also creates and runs external services (Jupyter, Visdom, RStudio) based on user inputs, which can amplify impact if the remote payload is malicious. Mitigations include removing remote code execution paths, adding cryptographic verification (signatures or hash checks), isolating execution (sandboxes or containerization), validating inputs, and avoiding untrusted downloads or executions.

@budibase/string-templates

3.35.1

by christos-budibase

Live on npm

Blocked by Socket

High-risk behavior is present: the module provides an arbitrary JavaScript execution engine (`processJS` -> `runJS`) and additionally evaluates user-provided snippet code via `eval(...)` through a Proxy (`snippets`). This strongly elevates the likelihood of supply-chain sabotage or malicious runtime behavior. The same bundle also includes a server-side file read helper (`fs.readFileSync`) in `code.embed`, which could enable local file disclosure if its arguments are attacker-influenced. Overall, the fragment is not merely a utility library; it contains explicit code-execution capabilities consistent with a backdoor/weaponizable feature.

johnsnowlabs-by-ckl

5.1.8rc20

Live on pypi

Blocked by Socket

This module is a high-risk utility because it fetches Python code from remote URLs and local markdown files and executes that code directly via execute_py_script_string_as_new_proc without validation or sandboxing. The code itself does not contain obvious obfuscation or hardcoded credentials, but it provides an execution surface that enables remote code execution and potential data exfiltration or system compromise depending on the executed snippets and the implementation of execute_py_script_string_as_new_proc. Treat calls that use remote URLs or untrusted markdown as dangerous. Use only with trusted content or add validation/sandboxing (e.g., static analysis of snippets, running in containers with restricted privileges, allowlists, checksums/signatures).

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Possible typosquat attack

Known malware

Unstable ownership

Git dependency

GitHub dependency

AI-detected potential malware

HTTP dependency

Obfuscated code

Skill: Pre-execution shell command

Suspicious Stars on GitHub

55 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Book a DemoRead the blog

Protect every package in your stack

Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.

View all integrations

RUST

crates.io

Rust Package Manager

PHP

Packagist

PHP Package Manager

GOLANG

Go Modules

Go Dependency Management

JAVA

Maven Central

JAVASCRIPT

npm

Node Package Manager

.NET

NuGet

.NET Package Manager

PYTHON

PyPI

Python Package Index

RUBY

RubyGems.org

Ruby Package Manager

SWIFT

Swift

AI

Hugging Face Hub

AI Model Hub

CI

GitHub Actions

CI/CD Workflows

EXTENSIONS

Chrome Web Store

Chrome Browser Extensions

EXTENSIONS

Open VSX

VS Code Extensions

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Nov 23, 2025

Shai Hulud v2

Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.

Nov 05, 2025

Elves on npm

A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.

Jul 04, 2025

RubyGems Automation-Tool Infostealer

Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.

Mar 13, 2025

North Korea's Contagious Interview Campaign

Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.

Jul 23, 2024

Network Reconnaissance Campaign

A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub AppBook a Demo

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles