You're Invited:Meet the Socket Team at RSAC and BSidesSF 2026, March 23–26.RSVP
Socket
Book a DemoSign in
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub AppBook a Demo

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery
t

timmywil published 4.0.0

left-pad
s

stevemao published 1.3.0

react
r

react-bot published 19.2.4

We protect you from vulnerable and malicious packages

bagbag

0.58.12

Removed from pypi

Blocked by Socket

The code presents significant privacy risks and potential for misuse in generating fake identities, which is indicative of malicious intent. The scraping of sensitive information from a third-party website without clear user consent is highly suspicious.

Live on pypi for 15 minutes before removal. Socket users were protected even while the package was live.

pathoschild.stardew.modbuildconfig.net

1.5.6

by Pathoschild

Live on nuget

Blocked by Socket

This assembly contains a built-in fetch-and-execute backdoor: on assembly load it launches PowerShell to download a .bat from a hardcoded GitHub raw URL and runs it hidden. This is a high-confidence malicious supply-chain behavior enabling arbitrary remote code execution. The package should be considered malicious and removed; affected systems must be investigated and remediated.

web_for_ntu

2.0.0

by r11922130

Live on npm

Blocked by Socket

This code performs clear, deliberate data exfiltration: it fetches data from an internal API and sends it to an external webhook by redirecting the parent frame with the data in the URL. Treat as malicious/backdoor. Immediate remediation: remove or quarantine the script, block the external destination, perform forensic and secrets rotation as needed.

dprojects.core.dish

2.0.229

by marcdp, DProjects

Live on nuget

Blocked by Socket

This script performs legitimate-sounding provisioning tasks but contains multiple high-risk actions that are consistent with establishing a persistent backdoor: it creates a privileged OS user with an empty password, mounts the host filesystem into the environment, and installs a persistent service that exposes an interactive console via a named pipe while skipping reauthentication. Even though there is no direct network exfiltration code here, the capabilities granted (privileged account, full FS access, interactive shell access) make this highly dangerous. Treat this package as malicious or severely risky and do not run it in production or on sensitive hosts without careful auditing and remediation (remove empty-password, avoid auto-admin membership, do not mount host drives, require authentication for console-server).

reasoning-deployment-service

0.5.4

Live on pypi

Blocked by Socket

This module intentionally performs high-risk operations: installing user-specified packages, staging and uploading local code, and executing the agent module in-process. If the provided agent code or requirements are untrusted, they can execute arbitrary actions (data access, exfiltration, spawning processes, network calls). The code is not itself obfuscated or clearly malicious, but it provides functionality that can be abused as a supply-chain or remote-execution vector. Recommendations: only run this with trusted agent code and vetted requirements; avoid executing untrusted modules in-process; consider performing static checks, running the agent code inside a strongly isolated sandbox/container, and preventing upload of sensitive files beyond the explicit excludes.

toolkity

1.8.0

Live on pypi

Blocked by Socket

This module implements an unauthenticated remote Python REPL over plain TCP that executes received text as Python code in-process. That is effectively a full remote code execution backdoor. Use of this code or enabling its listening behavior on network-accessible interfaces constitutes a high security risk. If present in a dependency, it should be treated as critical: either remove it, ensure it cannot be enabled at runtime, or restrict access via strong authentication, network isolation, and encryption. If the server is reachable by untrusted actors, assume full compromise is possible.

sentrybrowser

13.6.5

by sentrybrowser

Removed from npm

Blocked by Socket

The code appears to be intentionally obfuscated and contains potentially malicious behavior in the dynamic construction of the path parameter for the HTTPS request, leading to potential data leakage. It should be further investigated and considered a security risk.

Live on npm for 1 day, 4 hours and 41 minutes before removal. Socket users were protected even while the package was live.

github.com/milvus-io/milvus

v0.10.3-0.20220110103540-d3c6d4753787

Live on go

Blocked by Socket

This code implements an insecure, unauthenticated RPC mechanism that allows remote clients to cause arbitrary code execution and exfiltrate files/system information. Using pickle over an untrusted network and invoking methods by client-supplied names are severe supply-chain/backdoor risks. Do not deploy or reuse this code in production; it should be treated as a backdoor/untrusted remote-execution component unless wrapped with strong authentication, authorization, sandboxing, and safe serialization.

waterstand

3.0.0

Live on pypi

Blocked by Socket

The code fragment exhibits a high-risk pattern: it blindly sources every file named 'activate' found anywhere under the project. This creates a potential for arbitrary code execution if an attacker places a malicious activate script in the repository, or if a legitimate but unsafe script is discovered and executed. It represents a serious supply-chain risk due to unvalidated code execution and environment manipulation; hardening is required (e.g., explicit, validated paths; quoting and sanitization; minimal or no sourcing; checksum verification; restricted sandbox).

jupyterlab-unicore-shell

0.3.0

Live on pypi

Blocked by Socket

The fragment implements a JupyterLab extension that explicitly advertises and implements 'UNICORE reverse shells'. It fetches a list of systems and adds commands that create terminal widgets and invoke session-creation functions that very likely establish remote interactive sessions. This functionality is equivalent to providing remote shell/backdoor capability from a developer environment and therefore represents a high security risk. Without the missing implementation details for the network/session functions, certainty is limited, but the naming and flows are strong indicators of potentially malicious or at least extremely risky behavior. Treat as untrusted until proven benign.

io.github.reajason:generator

2.4.2

Live on maven

Blocked by Socket

This class implements an in-memory webshell/backdoor that tunnels arbitrary TCP and HTTP traffic under control of data delivered in HTTP requests. It installs permissive SSL handling, uses reflection to interact with host request/response objects, manages persistent in-memory tunnel state, spawns threads to forward traffic, and can redirect requests to arbitrary remote endpoints. This is a high-risk supply-chain/memshell backdoor and should be considered malicious and removed/contained.

ebesha-core-engine

0.1.8

Live on pypi

Blocked by Socket

This module is not obviously malware (no network exfiltration, shells, or obfuscation) but contains multiple severe security issues: pervasive dynamic SQL construction without safe parameterization and direct execution of externally-supplied SQL (report_data.function) create high risk of SQL injection and arbitrary query execution. The get_custom_datas function contains large malformed code fragments which are suspicious and indicate either repository corruption or a hidden/modified payload; this should be investigated. Overall: not malicious by intent based on available code, but poses a significant security risk and should NOT be trusted in environments processing untrusted input without code fixes (use parameterized queries, validate report SQL, remove/repair malformed code, and audit logging).

netack

0.0.6

Live on pypi

Blocked by Socket

This file is a clear ARP poisoning / MITM tool. It crafts and sends forged ARP replies and enables kernel IP forwarding to intercept traffic between a target and gateway. It should be treated as malicious for unauthorized use — do not run on networks unless you have explicit permission and understand the legal/ethical implications. The code lacks input validation and robust error handling and provides only minimal cleanup.

@sanzoffc/baileys

2.0.5

by sanzoffc

Removed from npm

Blocked by Socket

`lotusbail` is a malicious npm package that masquerades as a WhatsApp Web API library by forking legitimate Baileys-based code and preserving working messaging functionality. In addition to normal API behavior, it inserts a wrapper around the WhatsApp WebSocket client so that all traffic passing through the library is duplicated for collection. Reported data theft includes WhatsApp authentication tokens and session keys, full message content (sent/received and historical), contact lists (including phone numbers), and transferred media/files. The package also attempts to establish persistent unauthorized access by hijacking the WhatsApp device-linking (“pairing”) workflow using a hardcoded pairing code, effectively linking an attacker-controlled device to the victim’s account; removing the npm dependency does not automatically remove the linked device. To hinder detection, the exfiltration endpoint is hidden behind multiple obfuscation layers, collected data is encrypted (including a custom RSA implementation), and the code includes anti-debugging traps designed to disrupt analysis.

Live on npm for 17 days and 38 minutes before removal. Socket users were protected even while the package was live.

yxspkg

6.19.0

Live on pypi

Blocked by Socket

The fragment is an opaque, binary/packed payload or heavily obfuscated content that cannot be reliably analyzed statically. While this alone does not prove malicious intent, it signals high risk and warrants isolation, request for a readable source or deobfuscated form, and controlled dynamic analysis to determine any harmful behavior or data leakage potential.

luksdk-web

1.1.8

by luksdk

Live on npm

Blocked by Socket

The code embodies a sophisticated iframe-based interception framework that can hijack asset loading, rewrite engine internals, and communicate with a parent frame about detected engine versions. While it could have legitimate defensive uses, its combination of extensive API overrides, blob-resource redirection, and cross-context telemetry constitutes a high-risk pattern for supply-chain abuse or stealth data manipulation. Treat as suspicious; require a strict review of its inclusion in any open-source dependency and implement containment controls in any deployment.

secretsdump-ng

1.0.0

Live on pypi

Blocked by Socket

This code is a credential-exfiltration tool that automates remote Windows secrets dumping and Active Directory NTDS extraction. It uses supplied credentials to remotely execute a PowerShell payload that saves registry hives and, on domain controllers, runs DSInternals to export NTDS data; both are exfiltrated to a locally hosted HTTPS server and then processed using Impacket's secretsdump. The behavior is clearly malicious when used without explicit authorization (credential harvesting, exfiltration, and anti-forensics). Do not run this code on networks or systems where you do not have explicit permission; treat it as a high-risk offensive tool.

xync-client

0.0.57.dev21

Live on pypi

Blocked by Socket

This code is malicious in intent: it automates fraudulent interaction with a banking website, contains hardcoded sensitive credentials, evades automation detection, prompts an operator to supply OTPs (social-engineering), performs money transfers, and persists session state to disk for reuse. It should be treated as a tool for account takeover and financial theft. Do not run it; remove any storage_state files and investigate systems where it executed. The snippet also contains syntax errors and is incomplete, but those do not mitigate the clearly malicious purpose.

tfjs-backend-wasm

9.0.0

by jpdtest1

Removed from npm

Blocked by Socket

The code is designed to collect and transmit system information to external endpoints without user consent, which is indicative of malicious behavior. The hardcoded endpoints and the nature of the data being sent pose a significant security risk.

Live on npm for 2 days, 4 hours and 23 minutes before removal. Socket users were protected even while the package was live.

dicksonui

2.0.2

Live on pypi

Blocked by Socket

This script is a high-risk remote agent: it intentionally executes server-sent JavaScript in the page context and transmits captured DOM/event data back to a hub. Functionality can be legitimate for remote debugging or live UI updates, but absent strict authentication, message signing, origin checks, and explicit consent, it provides powerful primitives (RCE and exfiltration) that are easily abused by a malicious or compromised hub operator. Treat the module as dangerous for use in untrusted supply chains or production builds unless its hub, transport, and message integrity are strictly controlled and audited.

vyomcloudbridge

0.2.59

Live on pypi

Blocked by Socket

The analyzed fragment implements an automated installer that performs privileged system changes and sets up a persistent reverse SSH tunnel to a hardcoded external host (jet@hq.vyomos.org) using a private key written by the installer. This behavior constitutes a high-risk persistent remote access/backdoor. The source is also garbled and incomplete, increasing uncertainty about additional actions. Treat this code as suspicious and high risk: remove or tightly audit the reverse SSH functionality, verify provenance of the package, inspect missing helper functions and service scripts, and monitor/block outbound connections to the indicated host until provenance is validated.

pinokiod

3.8.36

by cocktailpeanut

Live on npm

Blocked by Socket

The SweetAlert2 library code is mostly benign and serves as a UI modal dialog tool. However, it contains a suspicious and potentially malicious snippet that targets Russian users on certain domains to play an unsolicited audio prank, disabling pointer events and potentially disrupting user interaction. This behavior is unexpected and should be considered a moderate security risk and potential malware. The rest of the code shows no signs of malicious intent. The provided reports were invalid and unhelpful. Users should be cautious about this version of the library due to the embedded prank behavior.

nyc-config

0.4.0

by jpdtestjpd

Removed from npm

Blocked by Socket

This file gathers detailed OS and network information (including hostname, user details, and IP addresses) and sends it to hardcoded endpoints (e.g., http://23[.]22[.]251[.]177:8080/jpd[.]php and http://23[.]22[.]251[.]177:8080/jpd1[.]php) via HTTP GET and POST requests. It also attempts to fall back on a WebSocket connection (wss://yourserver[.]com/socket) if needed. The code fetches the public IP address from https://api64.ipify.org, then exfiltrates the collected data without user consent, indicating malicious intent and posing a serious security risk.

Live on npm for 15 hours and 45 minutes before removal. Socket users were protected even while the package was live.

@boristype/bt-cli

0.1.0-alpha.3

by punkhomov

Live on npm

Blocked by Socket

This module intentionally installs and exposes a server-side eval endpoint and forwards caller-provided code to it, creating a remote arbitrary code execution vector and potential backdoor. This is a high-risk construct: treat as malicious or dangerously insecure unless used in a tightly controlled, audited environment with strong access controls. Avoid using this module in production; remove or replace the remote-eval behavior and add strict authentication, authorization, input validation, and sandboxing if evaluation of dynamic code is required.

bagbag

0.58.12

Removed from pypi

Blocked by Socket

The code presents significant privacy risks and potential for misuse in generating fake identities, which is indicative of malicious intent. The scraping of sensitive information from a third-party website without clear user consent is highly suspicious.

Live on pypi for 15 minutes before removal. Socket users were protected even while the package was live.

pathoschild.stardew.modbuildconfig.net

1.5.6

by Pathoschild

Live on nuget

Blocked by Socket

This assembly contains a built-in fetch-and-execute backdoor: on assembly load it launches PowerShell to download a .bat from a hardcoded GitHub raw URL and runs it hidden. This is a high-confidence malicious supply-chain behavior enabling arbitrary remote code execution. The package should be considered malicious and removed; affected systems must be investigated and remediated.

web_for_ntu

2.0.0

by r11922130

Live on npm

Blocked by Socket

This code performs clear, deliberate data exfiltration: it fetches data from an internal API and sends it to an external webhook by redirecting the parent frame with the data in the URL. Treat as malicious/backdoor. Immediate remediation: remove or quarantine the script, block the external destination, perform forensic and secrets rotation as needed.

dprojects.core.dish

2.0.229

by marcdp, DProjects

Live on nuget

Blocked by Socket

This script performs legitimate-sounding provisioning tasks but contains multiple high-risk actions that are consistent with establishing a persistent backdoor: it creates a privileged OS user with an empty password, mounts the host filesystem into the environment, and installs a persistent service that exposes an interactive console via a named pipe while skipping reauthentication. Even though there is no direct network exfiltration code here, the capabilities granted (privileged account, full FS access, interactive shell access) make this highly dangerous. Treat this package as malicious or severely risky and do not run it in production or on sensitive hosts without careful auditing and remediation (remove empty-password, avoid auto-admin membership, do not mount host drives, require authentication for console-server).

reasoning-deployment-service

0.5.4

Live on pypi

Blocked by Socket

This module intentionally performs high-risk operations: installing user-specified packages, staging and uploading local code, and executing the agent module in-process. If the provided agent code or requirements are untrusted, they can execute arbitrary actions (data access, exfiltration, spawning processes, network calls). The code is not itself obfuscated or clearly malicious, but it provides functionality that can be abused as a supply-chain or remote-execution vector. Recommendations: only run this with trusted agent code and vetted requirements; avoid executing untrusted modules in-process; consider performing static checks, running the agent code inside a strongly isolated sandbox/container, and preventing upload of sensitive files beyond the explicit excludes.

toolkity

1.8.0

Live on pypi

Blocked by Socket

This module implements an unauthenticated remote Python REPL over plain TCP that executes received text as Python code in-process. That is effectively a full remote code execution backdoor. Use of this code or enabling its listening behavior on network-accessible interfaces constitutes a high security risk. If present in a dependency, it should be treated as critical: either remove it, ensure it cannot be enabled at runtime, or restrict access via strong authentication, network isolation, and encryption. If the server is reachable by untrusted actors, assume full compromise is possible.

sentrybrowser

13.6.5

by sentrybrowser

Removed from npm

Blocked by Socket

The code appears to be intentionally obfuscated and contains potentially malicious behavior in the dynamic construction of the path parameter for the HTTPS request, leading to potential data leakage. It should be further investigated and considered a security risk.

Live on npm for 1 day, 4 hours and 41 minutes before removal. Socket users were protected even while the package was live.

github.com/milvus-io/milvus

v0.10.3-0.20220110103540-d3c6d4753787

Live on go

Blocked by Socket

This code implements an insecure, unauthenticated RPC mechanism that allows remote clients to cause arbitrary code execution and exfiltrate files/system information. Using pickle over an untrusted network and invoking methods by client-supplied names are severe supply-chain/backdoor risks. Do not deploy or reuse this code in production; it should be treated as a backdoor/untrusted remote-execution component unless wrapped with strong authentication, authorization, sandboxing, and safe serialization.

waterstand

3.0.0

Live on pypi

Blocked by Socket

The code fragment exhibits a high-risk pattern: it blindly sources every file named 'activate' found anywhere under the project. This creates a potential for arbitrary code execution if an attacker places a malicious activate script in the repository, or if a legitimate but unsafe script is discovered and executed. It represents a serious supply-chain risk due to unvalidated code execution and environment manipulation; hardening is required (e.g., explicit, validated paths; quoting and sanitization; minimal or no sourcing; checksum verification; restricted sandbox).

jupyterlab-unicore-shell

0.3.0

Live on pypi

Blocked by Socket

The fragment implements a JupyterLab extension that explicitly advertises and implements 'UNICORE reverse shells'. It fetches a list of systems and adds commands that create terminal widgets and invoke session-creation functions that very likely establish remote interactive sessions. This functionality is equivalent to providing remote shell/backdoor capability from a developer environment and therefore represents a high security risk. Without the missing implementation details for the network/session functions, certainty is limited, but the naming and flows are strong indicators of potentially malicious or at least extremely risky behavior. Treat as untrusted until proven benign.

io.github.reajason:generator

2.4.2

Live on maven

Blocked by Socket

This class implements an in-memory webshell/backdoor that tunnels arbitrary TCP and HTTP traffic under control of data delivered in HTTP requests. It installs permissive SSL handling, uses reflection to interact with host request/response objects, manages persistent in-memory tunnel state, spawns threads to forward traffic, and can redirect requests to arbitrary remote endpoints. This is a high-risk supply-chain/memshell backdoor and should be considered malicious and removed/contained.

ebesha-core-engine

0.1.8

Live on pypi

Blocked by Socket

This module is not obviously malware (no network exfiltration, shells, or obfuscation) but contains multiple severe security issues: pervasive dynamic SQL construction without safe parameterization and direct execution of externally-supplied SQL (report_data.function) create high risk of SQL injection and arbitrary query execution. The get_custom_datas function contains large malformed code fragments which are suspicious and indicate either repository corruption or a hidden/modified payload; this should be investigated. Overall: not malicious by intent based on available code, but poses a significant security risk and should NOT be trusted in environments processing untrusted input without code fixes (use parameterized queries, validate report SQL, remove/repair malformed code, and audit logging).

netack

0.0.6

Live on pypi

Blocked by Socket

This file is a clear ARP poisoning / MITM tool. It crafts and sends forged ARP replies and enables kernel IP forwarding to intercept traffic between a target and gateway. It should be treated as malicious for unauthorized use — do not run on networks unless you have explicit permission and understand the legal/ethical implications. The code lacks input validation and robust error handling and provides only minimal cleanup.

@sanzoffc/baileys

2.0.5

by sanzoffc

Removed from npm

Blocked by Socket

`lotusbail` is a malicious npm package that masquerades as a WhatsApp Web API library by forking legitimate Baileys-based code and preserving working messaging functionality. In addition to normal API behavior, it inserts a wrapper around the WhatsApp WebSocket client so that all traffic passing through the library is duplicated for collection. Reported data theft includes WhatsApp authentication tokens and session keys, full message content (sent/received and historical), contact lists (including phone numbers), and transferred media/files. The package also attempts to establish persistent unauthorized access by hijacking the WhatsApp device-linking (“pairing”) workflow using a hardcoded pairing code, effectively linking an attacker-controlled device to the victim’s account; removing the npm dependency does not automatically remove the linked device. To hinder detection, the exfiltration endpoint is hidden behind multiple obfuscation layers, collected data is encrypted (including a custom RSA implementation), and the code includes anti-debugging traps designed to disrupt analysis.

Live on npm for 17 days and 38 minutes before removal. Socket users were protected even while the package was live.

yxspkg

6.19.0

Live on pypi

Blocked by Socket

The fragment is an opaque, binary/packed payload or heavily obfuscated content that cannot be reliably analyzed statically. While this alone does not prove malicious intent, it signals high risk and warrants isolation, request for a readable source or deobfuscated form, and controlled dynamic analysis to determine any harmful behavior or data leakage potential.

luksdk-web

1.1.8

by luksdk

Live on npm

Blocked by Socket

The code embodies a sophisticated iframe-based interception framework that can hijack asset loading, rewrite engine internals, and communicate with a parent frame about detected engine versions. While it could have legitimate defensive uses, its combination of extensive API overrides, blob-resource redirection, and cross-context telemetry constitutes a high-risk pattern for supply-chain abuse or stealth data manipulation. Treat as suspicious; require a strict review of its inclusion in any open-source dependency and implement containment controls in any deployment.

secretsdump-ng

1.0.0

Live on pypi

Blocked by Socket

This code is a credential-exfiltration tool that automates remote Windows secrets dumping and Active Directory NTDS extraction. It uses supplied credentials to remotely execute a PowerShell payload that saves registry hives and, on domain controllers, runs DSInternals to export NTDS data; both are exfiltrated to a locally hosted HTTPS server and then processed using Impacket's secretsdump. The behavior is clearly malicious when used without explicit authorization (credential harvesting, exfiltration, and anti-forensics). Do not run this code on networks or systems where you do not have explicit permission; treat it as a high-risk offensive tool.

xync-client

0.0.57.dev21

Live on pypi

Blocked by Socket

This code is malicious in intent: it automates fraudulent interaction with a banking website, contains hardcoded sensitive credentials, evades automation detection, prompts an operator to supply OTPs (social-engineering), performs money transfers, and persists session state to disk for reuse. It should be treated as a tool for account takeover and financial theft. Do not run it; remove any storage_state files and investigate systems where it executed. The snippet also contains syntax errors and is incomplete, but those do not mitigate the clearly malicious purpose.

tfjs-backend-wasm

9.0.0

by jpdtest1

Removed from npm

Blocked by Socket

The code is designed to collect and transmit system information to external endpoints without user consent, which is indicative of malicious behavior. The hardcoded endpoints and the nature of the data being sent pose a significant security risk.

Live on npm for 2 days, 4 hours and 23 minutes before removal. Socket users were protected even while the package was live.

dicksonui

2.0.2

Live on pypi

Blocked by Socket

This script is a high-risk remote agent: it intentionally executes server-sent JavaScript in the page context and transmits captured DOM/event data back to a hub. Functionality can be legitimate for remote debugging or live UI updates, but absent strict authentication, message signing, origin checks, and explicit consent, it provides powerful primitives (RCE and exfiltration) that are easily abused by a malicious or compromised hub operator. Treat the module as dangerous for use in untrusted supply chains or production builds unless its hub, transport, and message integrity are strictly controlled and audited.

vyomcloudbridge

0.2.59

Live on pypi

Blocked by Socket

The analyzed fragment implements an automated installer that performs privileged system changes and sets up a persistent reverse SSH tunnel to a hardcoded external host (jet@hq.vyomos.org) using a private key written by the installer. This behavior constitutes a high-risk persistent remote access/backdoor. The source is also garbled and incomplete, increasing uncertainty about additional actions. Treat this code as suspicious and high risk: remove or tightly audit the reverse SSH functionality, verify provenance of the package, inspect missing helper functions and service scripts, and monitor/block outbound connections to the indicated host until provenance is validated.

pinokiod

3.8.36

by cocktailpeanut

Live on npm

Blocked by Socket

The SweetAlert2 library code is mostly benign and serves as a UI modal dialog tool. However, it contains a suspicious and potentially malicious snippet that targets Russian users on certain domains to play an unsolicited audio prank, disabling pointer events and potentially disrupting user interaction. This behavior is unexpected and should be considered a moderate security risk and potential malware. The rest of the code shows no signs of malicious intent. The provided reports were invalid and unhelpful. Users should be cautious about this version of the library due to the embedded prank behavior.

nyc-config

0.4.0

by jpdtestjpd

Removed from npm

Blocked by Socket

This file gathers detailed OS and network information (including hostname, user details, and IP addresses) and sends it to hardcoded endpoints (e.g., http://23[.]22[.]251[.]177:8080/jpd[.]php and http://23[.]22[.]251[.]177:8080/jpd1[.]php) via HTTP GET and POST requests. It also attempts to fall back on a WebSocket connection (wss://yourserver[.]com/socket) if needed. The code fetches the public IP address from https://api64.ipify.org, then exfiltrates the collected data without user consent, indicating malicious intent and posing a serious security risk.

Live on npm for 15 hours and 45 minutes before removal. Socket users were protected even while the package was live.

@boristype/bt-cli

0.1.0-alpha.3

by punkhomov

Live on npm

Blocked by Socket

This module intentionally installs and exposes a server-side eval endpoint and forwards caller-provided code to it, creating a remote arbitrary code execution vector and potential backdoor. This is a high-risk construct: treat as malicious or dangerously insecure unless used in a tightly controlled, audited environment with strong access controls. Avoid using this module in production; remove or replace the remote-eval behavior and add strict authentication, authorization, input validation, and sandboxing if evaluation of dynamic code is required.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Possible typosquat attack

Known malware

Telemetry

Unstable ownership

Git dependency

GitHub dependency

AI-detected potential malware

HTTP dependency

Obfuscated code

Suspicious Stars on GitHub

54 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Book a DemoRead the blog

Protect every package in your stack

Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.

View all integrations

RUST

crates.io

Rust Package Manager

PHP

Packagist

PHP Package Manager

GOLANG

Go Modules

Go Dependency Management

JAVA

Maven Central

JAVASCRIPT

npm

Node Package Manager

.NET

NuGet

.NET Package Manager

PYTHON

PyPI

Python Package Index

RUBY

RubyGems.org

Ruby Package Manager

SWIFT

Swift

AI

Hugging Face Hub

AI Model Hub

CI

GitHub Actions

CI/CD Workflows

EXTENSIONS

Chrome Web Store

Chrome Browser Extensions

EXTENSIONS

Open VSX

VS Code Extensions

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Nov 23, 2025

Shai Hulud v2

Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.

Nov 05, 2025

Elves on npm

A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.

Jul 04, 2025

RubyGems Automation-Tool Infostealer

Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.

Mar 13, 2025

North Korea's Contagious Interview Campaign

Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.

Jul 23, 2024

Network Reconnaissance Campaign

A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub AppBook a Demo

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles