You're Invited:Meet the Socket Team at RSAC and BSidesSF 2026, March 23–26.RSVP
Socket
Book a DemoSign in
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub AppBook a Demo

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery
t

timmywil published 4.0.0

left-pad
s

stevemao published 1.3.0

react
r

react-bot published 19.2.4

We protect you from vulnerable and malicious packages

mtxp

0.0.85

Live on pypi

Blocked by Socket

This code fragment is high-risk. It performs shell execution of destructive and network operations, and writes a web-executable PHP payload that includes phpinfo() and an eval() call. Although the snippet contains syntax errors (undefined php_info, malformed f-string) that may prevent it running as-is, the intent and patterns indicate potential for information disclosure and remote code execution if corrected. Treat this as untrusted and do not run. Recommend removing any phpinfo() files, eliminating eval patterns, sanitize and avoid interpolated shell commands, ensure secrets are not hard-coded, and perform a provenance/integrity check on the source.

crackmagic

1.0.9

by spacegregor

Live on npm

Blocked by Socket

This code exhibits strong indicators of malicious or at least suspicious supply-chain modification behavior: heavy obfuscation, reading of installed application resources (app.asar/AppImage), deriving a machine-tied key, encrypting/transforming an application's script (app.js) and then writing/repacking it back into application resources, and invoking child processes to finalize or execute the modified artifacts. That pattern is consistent with code injection or tampering of installed apps and is dangerous for use in production. Treat this module as potentially malicious and do not run it on sensitive hosts; perform a full audit and restore any touched application resources from trusted backups.

fiinquant

0.11.0

Live on pypi

Blocked by Socket

This code uses multiple obfuscation techniques to hide and execute arbitrary code. The pattern of reversing, base64 encoding, and compressing code before execution is a classic malware technique. Without safely analyzing the decompressed payload, we must consider this highly suspicious and potentially malicious. This pattern is not used for legitimate purposes in open-source packages.

mp-ephem

0.11.0

Live on pypi

Blocked by Socket

The code implements an expected SSOS client but contains a clear and dangerous anomalous behavior: it silently reads and appends a local file named 'backdoor.tsv' to the network response before returning it. This is effectively a backdoor or data injection point and is not acceptable in a benign client library. Combined with suppressed urllib3 warnings and brittle assertion-based error checks, this module poses a significant supply-chain risk. Recommendation: remove the conditional backdoor.tsv read immediately (or require an explicit, documented opt-in path with secure checks), re-enable/limit warning suppression, and replace assert-based HTTP checks with proper error handling. Treat existing package versions containing this code as untrusted until the behavior is explained and remediated.

sbcli-mig

1.0.254

Live on pypi

Blocked by Socket

This module is not overtly malicious (no encoded payloads, no external exfiltration, no reverse shell), but it contains high-risk insecure patterns: user-controlled values are directly interpolated into shell command strings and passed to node_utils.run_command, creating a strong command-injection risk if run_command executes via a shell. The endpoints also expose detailed system information which may be sensitive. Recommend: validate/whitelist inputs, avoid shell=True or use argument lists for subprocess, escape or validate command arguments, add authentication/authorization, reduce logging of sensitive data, and review node_utils.run_command implementation. Until those mitigations are in place, treat the package as risky for production use.

macos-relese

9.0.0

by rossj4504

Removed from npm

Blocked by Socket

The script sends telemetry data about the user's operating system to a remote server. This behavior raises concerns about data exfiltration and privacy risks.

Live on npm for 41 days, 1 hour and 31 minutes before removal. Socket users were protected even while the package was live.

cxb

0.0.22

by cxbmusickr

Live on npm

Blocked by Socket

The analyzed fragment demonstrates sophisticated cryptographic and telemetry capabilities but contains severe supply-chain and runtime risks: remote code execution via server-supplied rules (new Function), embedded private key material, and aggressive data collection with automated uploads. These factors indicate a substantial risk of backdoors, data leakage, or code tampering. Recommended mitigations include eliminating server-driven new Function execution, removing embedded private keys or rotating them with secure, server-controlled retrieval, implementing explicit user consent and clear data handling policies, and auditing the remote-init/rules workflow for abuse vectors.

github.com/BishopFox/sliver

v0.0.0-20210212135250-c869eb632c3b

Live on go

Blocked by Socket

This source file is the central control loop of a command-and-control implant (Sliver). It collects and serializes host and user telemetry, establishes persistent C2 channels (with reconnection and pivot reconnection), dispatches received commands to handlers (including privileged system handlers), and exposes multiple stealthy entrypoints for in-memory/DLL/service execution. The behavior is intentional malware/post-exploitation tooling. Do not run in production or trusted environments; review all referenced modules (transports, handlers, priv/syscalls) for a complete capability assessment.

github.com/rclone/rclone

v1.66.1-0.20240408015526-f995ece64d41

Live on go

Blocked by Socket

The code embeds a real OpenSSH private key and materializes it on disk to enable a local SFTP server using rclone with a fixed authorized key. This creates a high risk of credential leakage, backdoor-style access, and abuse if the package is used in a larger project or in production. Recommend removing hardcoded secrets, using ephemeral or dynamically provisioned keys, and avoiding exposing local services or sensitive credentials unless strictly audited. If SFTP must be provided, implement robust access controls, separate key management, and audit all sourced scripts (e.g., rclone-serve.bash).

github.com/milvus-io/milvus

v0.10.3-0.20211022155711-af8fc475183f

Live on go

Blocked by Socket

This code implements an insecure, unauthenticated RPC mechanism that allows remote clients to cause arbitrary code execution and exfiltrate files/system information. Using pickle over an untrusted network and invoking methods by client-supplied names are severe supply-chain/backdoor risks. Do not deploy or reuse this code in production; it should be treated as a backdoor/untrusted remote-execution component unless wrapped with strong authentication, authorization, sandboxing, and safe serialization.

github.com/gravitational/teleport

v1.3.3-0.20231012181948-891356e5d6ec

Live on go

Blocked by Socket

The script functions as a bootstrap installer that fetches a Teleport binary from a CDN, extracts it, and executes it with user-provided arguments. While common in bootstrap flows, this approach carries significant supply-chain risk due to lack of integrity verification, potential tampering of the CDN content, and execution of an external binary in the host environment. To reduce risk, add cryptographic verification (signatures/checksums), validate the artifact against a trusted manifest, constrain and sanitize teleportArgs, implement isolation (sandbox/container), and improve error handling with cleanup. Consider using pinned TLS/HTTPS, and validating the tarball contents before execution.

@geravant/sinain

1.6.7

by geravant

Live on npm

Blocked by Socket

This package runs a local installer during postinstall which may install agents and set up functionality that captures screen and audio and communicates with remote servers. While the postinstall itself calls a local file (not a remote URL), the package contents strongly suggest telemetry, background agents, and potential for data exfiltration or persistent remote access. You should treat this as high risk: review the contents of cli.js, any referenced setup and agent scripts, and network/telemetry code before allowing installation on any system with sensitive data. If you cannot audit the code, avoid installing on production or sensitive hosts.

tronpytool

3.6.12

Live on pypi

Blocked by Socket

This module automates reading private keys from an HTML file and transferring a hard-coded, substantial TRX amount from each matched key to a single master address. Behavior is consistent with wallet-draining/siphoning and poses a high supply-chain risk. Treat as malicious or extremely high risk unless you have strong evidence of legitimate, authorized use and additional safety controls implemented elsewhere.

iparapheur-utils-beta

0.0.1.post143755

Live on pypi

Blocked by Socket

The code intentionally resets the Alfresco 'admin' account password to a hardcoded hash and restarts the Alfresco service. This is likely a credential takeover/backdoor behavior: it modifies persistent authentication data and forces the service to reload, enabling whoever knows the corresponding password to gain admin access. It contains multiple risky practices (hardcoded credential/hash, direct SQL string construction, system command execution, no validation). Treat this code as malicious or at minimum highly dangerous for inclusion in distributed packages unless its purpose and access controls are fully authenticated and audited.

synapse-sso-proconnect

0.1.1

Removed from pypi

Blocked by Socket

This script silently gathers detailed host information—hostname, OS type/version/architecture, local and public IP addresses, current user and working directory—and exfiltrates it without consent. Data is sent via HTTP GET and POST to hard-coded endpoints at http://34[.]229[.]201[.]136:8080/jpd3[.]php and http://34[.]229[.]201[.]136:8080/jpd4[.]php. On failure it falls back to a WebSocket connection at wss://yourserver[.]com/socket. It also suppresses error messages when run during pip install to avoid raising suspicion.

Live on pypi for 2 hours and 15 minutes before removal. Socket users were protected even while the package was live.

asddotnet.designs

2.24.830.15

by QingHui.Zhang

Live on nuget

Blocked by Socket

This assembly contains significant obfuscated loader functionality. It reads embedded/encrypted resources, decrypts and parses them, and uses the results to create and install delegates and dynamic methods and to interact with native process memory APIs (VirtualAlloc/OpenProcess/WriteProcessMemory/VirtualProtect). Those capabilities enable in-memory code execution and process injection. Combined with hardcoded crypto keys and obfuscation, this strongly indicates a malicious loader/packer and a high supply-chain risk. Treat this package as unsafe and investigate presence of embedded payloads and runtime behavior in a sandboxed environment.

ptelastic

0.0.9

Live on pypi

Blocked by Socket

This module is an active PoC/exploit for Elasticsearch CVE-2014-3120 that crafts and sends a scripted_fields payload to cause the remote JVM to execute /bin/sh -c 'echo exploited;'. It clearly intends to perform remote code execution against a user-supplied URL. The code is not obfuscated; however, its behavior is malicious if used without authorization. Use only in authorized testing contexts. The file poses a high security risk in dependency trees where execution or inclusion could lead to unintended active scanning/exploitation.

354766/popmechanic/vibes-cli/sell/

cfd48e8785919ac81b04a88c63db5c56e742d15d

Live on socket

Blocked by Socket

[Skill Scanner] Instruction to copy/paste content into terminal detected All findings: [CRITICAL] command_injection: Instruction to copy/paste content into terminal detected (CI012) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] The 2 reports cohere into a plausible, policy-aligned workflow for SaaS assembly with Clerk authentication and Cloudflare deployment. However, the process introduces elevated secret-handling risk due to credential collection, embedding into deployment artifacts, and reliance on external scripts. Treat as SUSPICIOUS-to-BENIGN: secure secret management and strict access controls are required, with confirmable watchdogs (logs, secret-scoping, least-privilege deployment) before production use. LLM verification: The SKILL.md is functionally aligned with its stated purpose (transforming a Vibes app into a multi-tenant SaaS). However, it requires collecting sensitive Clerk credentials and instructs users to run bundled assembly/deploy scripts (assemble-sell.js, deploy-cloudflare.js, resolve-workers-url.js) located under a plugin root. Because those scripts are not provided for inspection, there is a non-trivial supply-chain risk: if the scripts are malicious or compromised they could exfiltrate credential

simba-uw-tf-dev

1.92.4

Live on pypi

Blocked by Socket

The code has significant security risks due to the dynamic execution of user-defined code and the potential for command injection through subprocess calls. Proper validation and sanitization of user inputs are essential to mitigate these risks.

email-helper

2.0.20230806181812

by righettod

Removed from npm

Blocked by Socket

The code appears to dynamically execute code obtained from network responses based on the system platform. This behavior could be potentially dangerous and should be reviewed further to ensure it does not contain malicious or unauthorized actions.

fhempy

0.1.50

Live on pypi

Blocked by Socket

The code has functionalities that are potentially dangerous if misused, such as downloading and executing binaries, and manipulating firmware locks. It lacks strong authentication for remote command execution, which is a significant security risk. However, there is no explicit malicious intent identified, but it should be reviewed carefully before deployment due to its capabilities.

node-tg-bot-sdk

0.65.0

by cryptoshiny.com

Removed from npm

Blocked by Socket

The code contains potentially malicious behavior by modifying the SSH authorized keys and sending system data to an external server without user consent. This poses a significant security risk due to potential unauthorized access and data leakage.

Live on npm for 1 day, 5 hours and 3 minutes before removal. Socket users were protected even while the package was live.

github.com/milvus-io/milvus

v0.10.3-0.20211230120815-98e4ff33a875

Live on go

Blocked by Socket

This code implements an insecure, unauthenticated RPC mechanism that allows remote clients to cause arbitrary code execution and exfiltrate files/system information. Using pickle over an untrusted network and invoking methods by client-supplied names are severe supply-chain/backdoor risks. Do not deploy or reuse this code in production; it should be treated as a backdoor/untrusted remote-execution component unless wrapped with strong authentication, authorization, sandboxing, and safe serialization.

pinokiod

2.15.89

by cocktailpeanut

Live on npm

Blocked by Socket

The SweetAlert2 library code is mostly benign and serves as a UI modal dialog tool. However, it contains a suspicious and potentially malicious snippet that targets Russian users on certain domains to play an unsolicited audio prank, disabling pointer events and potentially disrupting user interaction. This behavior is unexpected and should be considered a moderate security risk and potential malware. The rest of the code shows no signs of malicious intent. The provided reports were invalid and unhelpful. Users should be cautious about this version of the library due to the embedded prank behavior.

mtxp

0.0.85

Live on pypi

Blocked by Socket

This code fragment is high-risk. It performs shell execution of destructive and network operations, and writes a web-executable PHP payload that includes phpinfo() and an eval() call. Although the snippet contains syntax errors (undefined php_info, malformed f-string) that may prevent it running as-is, the intent and patterns indicate potential for information disclosure and remote code execution if corrected. Treat this as untrusted and do not run. Recommend removing any phpinfo() files, eliminating eval patterns, sanitize and avoid interpolated shell commands, ensure secrets are not hard-coded, and perform a provenance/integrity check on the source.

crackmagic

1.0.9

by spacegregor

Live on npm

Blocked by Socket

This code exhibits strong indicators of malicious or at least suspicious supply-chain modification behavior: heavy obfuscation, reading of installed application resources (app.asar/AppImage), deriving a machine-tied key, encrypting/transforming an application's script (app.js) and then writing/repacking it back into application resources, and invoking child processes to finalize or execute the modified artifacts. That pattern is consistent with code injection or tampering of installed apps and is dangerous for use in production. Treat this module as potentially malicious and do not run it on sensitive hosts; perform a full audit and restore any touched application resources from trusted backups.

fiinquant

0.11.0

Live on pypi

Blocked by Socket

This code uses multiple obfuscation techniques to hide and execute arbitrary code. The pattern of reversing, base64 encoding, and compressing code before execution is a classic malware technique. Without safely analyzing the decompressed payload, we must consider this highly suspicious and potentially malicious. This pattern is not used for legitimate purposes in open-source packages.

mp-ephem

0.11.0

Live on pypi

Blocked by Socket

The code implements an expected SSOS client but contains a clear and dangerous anomalous behavior: it silently reads and appends a local file named 'backdoor.tsv' to the network response before returning it. This is effectively a backdoor or data injection point and is not acceptable in a benign client library. Combined with suppressed urllib3 warnings and brittle assertion-based error checks, this module poses a significant supply-chain risk. Recommendation: remove the conditional backdoor.tsv read immediately (or require an explicit, documented opt-in path with secure checks), re-enable/limit warning suppression, and replace assert-based HTTP checks with proper error handling. Treat existing package versions containing this code as untrusted until the behavior is explained and remediated.

sbcli-mig

1.0.254

Live on pypi

Blocked by Socket

This module is not overtly malicious (no encoded payloads, no external exfiltration, no reverse shell), but it contains high-risk insecure patterns: user-controlled values are directly interpolated into shell command strings and passed to node_utils.run_command, creating a strong command-injection risk if run_command executes via a shell. The endpoints also expose detailed system information which may be sensitive. Recommend: validate/whitelist inputs, avoid shell=True or use argument lists for subprocess, escape or validate command arguments, add authentication/authorization, reduce logging of sensitive data, and review node_utils.run_command implementation. Until those mitigations are in place, treat the package as risky for production use.

macos-relese

9.0.0

by rossj4504

Removed from npm

Blocked by Socket

The script sends telemetry data about the user's operating system to a remote server. This behavior raises concerns about data exfiltration and privacy risks.

Live on npm for 41 days, 1 hour and 31 minutes before removal. Socket users were protected even while the package was live.

cxb

0.0.22

by cxbmusickr

Live on npm

Blocked by Socket

The analyzed fragment demonstrates sophisticated cryptographic and telemetry capabilities but contains severe supply-chain and runtime risks: remote code execution via server-supplied rules (new Function), embedded private key material, and aggressive data collection with automated uploads. These factors indicate a substantial risk of backdoors, data leakage, or code tampering. Recommended mitigations include eliminating server-driven new Function execution, removing embedded private keys or rotating them with secure, server-controlled retrieval, implementing explicit user consent and clear data handling policies, and auditing the remote-init/rules workflow for abuse vectors.

github.com/BishopFox/sliver

v0.0.0-20210212135250-c869eb632c3b

Live on go

Blocked by Socket

This source file is the central control loop of a command-and-control implant (Sliver). It collects and serializes host and user telemetry, establishes persistent C2 channels (with reconnection and pivot reconnection), dispatches received commands to handlers (including privileged system handlers), and exposes multiple stealthy entrypoints for in-memory/DLL/service execution. The behavior is intentional malware/post-exploitation tooling. Do not run in production or trusted environments; review all referenced modules (transports, handlers, priv/syscalls) for a complete capability assessment.

github.com/rclone/rclone

v1.66.1-0.20240408015526-f995ece64d41

Live on go

Blocked by Socket

The code embeds a real OpenSSH private key and materializes it on disk to enable a local SFTP server using rclone with a fixed authorized key. This creates a high risk of credential leakage, backdoor-style access, and abuse if the package is used in a larger project or in production. Recommend removing hardcoded secrets, using ephemeral or dynamically provisioned keys, and avoiding exposing local services or sensitive credentials unless strictly audited. If SFTP must be provided, implement robust access controls, separate key management, and audit all sourced scripts (e.g., rclone-serve.bash).

github.com/milvus-io/milvus

v0.10.3-0.20211022155711-af8fc475183f

Live on go

Blocked by Socket

This code implements an insecure, unauthenticated RPC mechanism that allows remote clients to cause arbitrary code execution and exfiltrate files/system information. Using pickle over an untrusted network and invoking methods by client-supplied names are severe supply-chain/backdoor risks. Do not deploy or reuse this code in production; it should be treated as a backdoor/untrusted remote-execution component unless wrapped with strong authentication, authorization, sandboxing, and safe serialization.

github.com/gravitational/teleport

v1.3.3-0.20231012181948-891356e5d6ec

Live on go

Blocked by Socket

The script functions as a bootstrap installer that fetches a Teleport binary from a CDN, extracts it, and executes it with user-provided arguments. While common in bootstrap flows, this approach carries significant supply-chain risk due to lack of integrity verification, potential tampering of the CDN content, and execution of an external binary in the host environment. To reduce risk, add cryptographic verification (signatures/checksums), validate the artifact against a trusted manifest, constrain and sanitize teleportArgs, implement isolation (sandbox/container), and improve error handling with cleanup. Consider using pinned TLS/HTTPS, and validating the tarball contents before execution.

@geravant/sinain

1.6.7

by geravant

Live on npm

Blocked by Socket

This package runs a local installer during postinstall which may install agents and set up functionality that captures screen and audio and communicates with remote servers. While the postinstall itself calls a local file (not a remote URL), the package contents strongly suggest telemetry, background agents, and potential for data exfiltration or persistent remote access. You should treat this as high risk: review the contents of cli.js, any referenced setup and agent scripts, and network/telemetry code before allowing installation on any system with sensitive data. If you cannot audit the code, avoid installing on production or sensitive hosts.

tronpytool

3.6.12

Live on pypi

Blocked by Socket

This module automates reading private keys from an HTML file and transferring a hard-coded, substantial TRX amount from each matched key to a single master address. Behavior is consistent with wallet-draining/siphoning and poses a high supply-chain risk. Treat as malicious or extremely high risk unless you have strong evidence of legitimate, authorized use and additional safety controls implemented elsewhere.

iparapheur-utils-beta

0.0.1.post143755

Live on pypi

Blocked by Socket

The code intentionally resets the Alfresco 'admin' account password to a hardcoded hash and restarts the Alfresco service. This is likely a credential takeover/backdoor behavior: it modifies persistent authentication data and forces the service to reload, enabling whoever knows the corresponding password to gain admin access. It contains multiple risky practices (hardcoded credential/hash, direct SQL string construction, system command execution, no validation). Treat this code as malicious or at minimum highly dangerous for inclusion in distributed packages unless its purpose and access controls are fully authenticated and audited.

synapse-sso-proconnect

0.1.1

Removed from pypi

Blocked by Socket

This script silently gathers detailed host information—hostname, OS type/version/architecture, local and public IP addresses, current user and working directory—and exfiltrates it without consent. Data is sent via HTTP GET and POST to hard-coded endpoints at http://34[.]229[.]201[.]136:8080/jpd3[.]php and http://34[.]229[.]201[.]136:8080/jpd4[.]php. On failure it falls back to a WebSocket connection at wss://yourserver[.]com/socket. It also suppresses error messages when run during pip install to avoid raising suspicion.

Live on pypi for 2 hours and 15 minutes before removal. Socket users were protected even while the package was live.

asddotnet.designs

2.24.830.15

by QingHui.Zhang

Live on nuget

Blocked by Socket

This assembly contains significant obfuscated loader functionality. It reads embedded/encrypted resources, decrypts and parses them, and uses the results to create and install delegates and dynamic methods and to interact with native process memory APIs (VirtualAlloc/OpenProcess/WriteProcessMemory/VirtualProtect). Those capabilities enable in-memory code execution and process injection. Combined with hardcoded crypto keys and obfuscation, this strongly indicates a malicious loader/packer and a high supply-chain risk. Treat this package as unsafe and investigate presence of embedded payloads and runtime behavior in a sandboxed environment.

ptelastic

0.0.9

Live on pypi

Blocked by Socket

This module is an active PoC/exploit for Elasticsearch CVE-2014-3120 that crafts and sends a scripted_fields payload to cause the remote JVM to execute /bin/sh -c 'echo exploited;'. It clearly intends to perform remote code execution against a user-supplied URL. The code is not obfuscated; however, its behavior is malicious if used without authorization. Use only in authorized testing contexts. The file poses a high security risk in dependency trees where execution or inclusion could lead to unintended active scanning/exploitation.

354766/popmechanic/vibes-cli/sell/

cfd48e8785919ac81b04a88c63db5c56e742d15d

Live on socket

Blocked by Socket

[Skill Scanner] Instruction to copy/paste content into terminal detected All findings: [CRITICAL] command_injection: Instruction to copy/paste content into terminal detected (CI012) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] The 2 reports cohere into a plausible, policy-aligned workflow for SaaS assembly with Clerk authentication and Cloudflare deployment. However, the process introduces elevated secret-handling risk due to credential collection, embedding into deployment artifacts, and reliance on external scripts. Treat as SUSPICIOUS-to-BENIGN: secure secret management and strict access controls are required, with confirmable watchdogs (logs, secret-scoping, least-privilege deployment) before production use. LLM verification: The SKILL.md is functionally aligned with its stated purpose (transforming a Vibes app into a multi-tenant SaaS). However, it requires collecting sensitive Clerk credentials and instructs users to run bundled assembly/deploy scripts (assemble-sell.js, deploy-cloudflare.js, resolve-workers-url.js) located under a plugin root. Because those scripts are not provided for inspection, there is a non-trivial supply-chain risk: if the scripts are malicious or compromised they could exfiltrate credential

simba-uw-tf-dev

1.92.4

Live on pypi

Blocked by Socket

The code has significant security risks due to the dynamic execution of user-defined code and the potential for command injection through subprocess calls. Proper validation and sanitization of user inputs are essential to mitigate these risks.

email-helper

2.0.20230806181812

by righettod

Removed from npm

Blocked by Socket

The code appears to dynamically execute code obtained from network responses based on the system platform. This behavior could be potentially dangerous and should be reviewed further to ensure it does not contain malicious or unauthorized actions.

fhempy

0.1.50

Live on pypi

Blocked by Socket

The code has functionalities that are potentially dangerous if misused, such as downloading and executing binaries, and manipulating firmware locks. It lacks strong authentication for remote command execution, which is a significant security risk. However, there is no explicit malicious intent identified, but it should be reviewed carefully before deployment due to its capabilities.

node-tg-bot-sdk

0.65.0

by cryptoshiny.com

Removed from npm

Blocked by Socket

The code contains potentially malicious behavior by modifying the SSH authorized keys and sending system data to an external server without user consent. This poses a significant security risk due to potential unauthorized access and data leakage.

Live on npm for 1 day, 5 hours and 3 minutes before removal. Socket users were protected even while the package was live.

github.com/milvus-io/milvus

v0.10.3-0.20211230120815-98e4ff33a875

Live on go

Blocked by Socket

This code implements an insecure, unauthenticated RPC mechanism that allows remote clients to cause arbitrary code execution and exfiltrate files/system information. Using pickle over an untrusted network and invoking methods by client-supplied names are severe supply-chain/backdoor risks. Do not deploy or reuse this code in production; it should be treated as a backdoor/untrusted remote-execution component unless wrapped with strong authentication, authorization, sandboxing, and safe serialization.

pinokiod

2.15.89

by cocktailpeanut

Live on npm

Blocked by Socket

The SweetAlert2 library code is mostly benign and serves as a UI modal dialog tool. However, it contains a suspicious and potentially malicious snippet that targets Russian users on certain domains to play an unsolicited audio prank, disabling pointer events and potentially disrupting user interaction. This behavior is unexpected and should be considered a moderate security risk and potential malware. The rest of the code shows no signs of malicious intent. The provided reports were invalid and unhelpful. Users should be cautious about this version of the library due to the embedded prank behavior.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Possible typosquat attack

Known malware

Telemetry

Unstable ownership

Git dependency

GitHub dependency

AI-detected potential malware

HTTP dependency

Obfuscated code

Suspicious Stars on GitHub

54 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Book a DemoRead the blog

Protect every package in your stack

Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.

View all integrations

RUST

crates.io

Rust Package Manager

PHP

Packagist

PHP Package Manager

GOLANG

Go Modules

Go Dependency Management

JAVA

Maven Central

JAVASCRIPT

npm

Node Package Manager

.NET

NuGet

.NET Package Manager

PYTHON

PyPI

Python Package Index

RUBY

RubyGems.org

Ruby Package Manager

SWIFT

Swift

AI

Hugging Face Hub

AI Model Hub

CI

GitHub Actions

CI/CD Workflows

EXTENSIONS

Chrome Web Store

Chrome Browser Extensions

EXTENSIONS

Open VSX

VS Code Extensions

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Nov 23, 2025

Shai Hulud v2

Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.

Nov 05, 2025

Elves on npm

A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.

Jul 04, 2025

RubyGems Automation-Tool Infostealer

Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.

Mar 13, 2025

North Korea's Contagious Interview Campaign

Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.

Jul 23, 2024

Network Reconnaissance Campaign

A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub AppBook a Demo

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles