You're Invited:Meet the Socket Team at RSAC and BSidesSF 2026, March 23–26.RSVP
Socket
Book a DemoSign in
Socket

Socket for .NET

Secure Your .NET Projects

Install our free GitHub app to protect .NET dependencies from vulnerable and malicious code.

Detect and block malware, mining software, open source license violations, code quality issues, and 70+ indicators of supply chain attacks. Socket is a full-featured enterprise-ready SCA tool that can be seamlessly dropped into your workflow with just two clicks.

Install GitHub AppContact Sales
Socket for .NET

Socket supports NuGet and Paket

And all your favorite tools

We protect you from vulnerable and malicious .NET packages

imagecomponents.wpf.imaging

4.0.3

by Image Components

Live on nuget

Blocked by Socket

The fragment exhibits aggressive obfuscation and runtime code loading with unmanaged interop and potential payload unpacking/execution. These characteristics are commonly associated with loaders/backdoors rather than legitimate UI components. The security risk is high for distribution in an open-source package without clear provenance or sanitized payloads. Recommend removing obfuscated code, replacing with clearly audited modules, and performing dynamic analysis in a controlled environment before any public release.

atom.sdk.net

5.0.0-alpha.245081

by GZ Systems

Live on nuget

Blocked by Socket

This module contains strong indicators of a runtime loader/packer: obfuscated code that decrypts embedded payloads and performs low-level native operations (VirtualAlloc/WriteProcessMemory/VirtualProtect/OpenProcess/GetProcAddress/LoadLibrary) and dynamic delegate invocation. Combined with attributes that relax verification and heavy anti-analysis control flow, this is high-risk behavior. While parts (NFAPI) may be intended for legitimate driver interaction (network filtering), the loader/injection and in-memory execution patterns are commonly used by malware (reflective loaders, shellcode injectors, protected drivers). Treat this package as potentially malicious and do not run it in production or on privileged systems without deep manual review of the embedded payloads and native DLLs.

leadtools.dicom

23.0.0.3

by LEADTOOLS

Live on nuget

Blocked by Socket

The analyzed code fragment demonstrates pronounced loader/backdoor-like characteristics: heavy obfuscation, extensive unmanaged interop for in-memory code loading, and payload handling that decrypts and executes code at runtime. While some components appear to be legitimate LEADTOOLS infrastructure, the surrounding patterns imply potential malicious capability or at least a highly insecure, stealthy payload mechanism suitable for supply-chain abuse. This warrants removal or rigorous sandboxed review, integrity verification, and supply-chain controls before deployment.

sqldbrepository

5.0.11

by MC666, m, mc, Unicorn, MC

Live on nuget

Blocked by Socket

Malicious PostgreSQL repository library containing a time-gated process termination backdoor. The SqlCommandExtend.Exec extension method implements a kill-switch that activates after a hardcoded timestamp (1859127528479L converted to DateTime). When triggered, it has a ~19% random chance of terminating the host process via Process.GetCurrentProcess().Kill() on each database command execution. Additionally, the library exhibits severe security vulnerabilities through pervasive SQL injection risks - it constructs SQL queries using string concatenation and direct value insertion instead of parameterized queries. Transaction handling is broken with unconditional ROLLBACK statements after COMMIT. Exception handling suppresses errors by catching all exceptions and returning 0, hiding operational failures. The combination of the deliberate process-killing backdoor and unsafe SQL practices indicates this is a compromised or malicious package designed to cause harm.

lb.core-dev

1.1.4.25

by Lb

Live on nuget

Blocked by Socket

This code fragment exhibits clear indicators of potentially dangerous supply-chain and runtime-execution patterns. Remote payload download, decryption with a fixed key, in-process assembly loading, and reflective invocation of Start/Main create a high risk of backdoor or unauthorized code execution, especially if used in a publicly distributed library. The combination of dynamic loading, remote control pathways, and data exfiltration opportunities warrants immediate security review, provenance verification, and likely removal or hardening (e.g., eliminating remote code loading, enforcing strict code-signing, and minimizing reflective execution).

masuit.tools.abstractions

2.5.4.3

by 懒得勤快

Live on nuget

Blocked by Socket

This code contains an automatic background data collection and exfiltration mechanism triggered at module load (ModuleInitializer/static constructor). After a 5-minute delay it fetches location info from forge.speedtest.cn and posts a JSON payload containing machine name, OS version, a computed memory usage value (summing private memory across processes), the external IP/location info, entry assembly and list of loaded assemblies to https://ldqk.xyz/opensource/collect using an HttpClient that disables SSL certificate validation. This is a supply-chain risk: unsolicited telemetry of host and runtime metadata sent to an external domain without opt-in. Recommendation: treat the package as untrusted until the author documents and makes this behavior opt-in/configurable; remove or disable the module initializer; do not accept the package in high-security environments. If already deployed, consider network block to the endpoint and audit systems that used the library.

pen-core-analiz-dll

1.0.18

by pen-eMurat

Live on nuget

Blocked by Socket

This DLL implements a hidden telemetry and analytics client that gathers extensive runtime and system information — including SQL query texts and parameters, HTTP request/response payloads, exception details, CPU usage, available memory, machine name, local IP address and other environment data — and sends it behind the scenes to a fixed external endpoint (https://analiz[.]pendc[.]com/api/analiz/add) via RestSharp HTTP POST. In addition, caught exceptions are forwarded to a Telegram chat using a hard-coded bot token (5348434618:AAF76NtkDRdWiFdk6GEEnVUWlKzxB8WGWgs) and chat ID (1361234571). There is no user consent, opt-out mechanism or configuration to disable this data collection. The combination of hard-coded credentials and silent collection of potentially sensitive information constitutes a privacy violation and security risk.

grapextens

1.0.9

by Sebastian Manuel Wien

Live on nuget

Blocked by Socket

This module contains multiple high-risk behaviors. The most critical is an unauthenticated HTTP endpoint that executes arbitrary OS commands (RunCommand) — effectively a remote code execution backdoor. Additional concerning features: registry modifications that act as a remote-toggle/backdoor for licensing/state, embedded verification credentials (hardcoded hash/salt), weak/incorrect crypto usage (hardcoded symmetric key and IV handling), and a TOTP implementation that allows bypass via the static Config verification. These together form a significant supply-chain/malicious risk. I recommend not using this package as-is; remove or heavily restrict the RunCommand endpoint, require proper authentication/authorization, remove or secure registry-modifying code, and fix cryptographic practices and TOTP logic. Further review of how Config.SenderEmail/Password are populated in the larger project is also necessary to detect potential credential leakage or exfiltration.

horizon-payroll

1.0.0

by Horizon

Live on nuget

Blocked by Socket

This code contains an embedded, environment-targeted, unsolicited payload: it conditionally disables user interaction and attempts to load and autoplay an externally hosted audio file (Ukraina.mp3 on flag-gimn.ru) for users with Russian locale on Russian-hosted sites, using a localStorage timestamp to trigger the behavior after a delay. This is not expected for a UI/modal library and constitutes malicious content-injection and UX disruption. Treat the package as compromised; do not use this version. Revert to a known-good pinned release, audit upstream repository and changelogs, remove the malicious block, and report the incident to upstream and package registries.

tx.revit

1.1.6.9

by TianTeng

Live on nuget

Blocked by Socket

This assembly mixes legitimate Revit helper APIs with a large, intentionally obfuscated loader/crypto/native interop subsystem that reads embedded resources, decrypts them, allocates memory, writes bytes into memory or other processes and invokes them via delegates/function pointers. These behaviors are classic of an in-memory payload loader and code-injection tool and are not necessary for normal Revit plugin functionality. Treat this package as malicious or at minimum a severe supply-chain risk. Do not deploy or run it in production; further dynamic analysis of extracted embedded resources is required to identify the delivered payload.

skyworth.libpepbook.windows

3.0.9.3

by Skyworth

Live on nuget

Blocked by Socket

This file is highly suspicious and shows strong indicators of malicious loader behavior. Although it sits inside a project-named 'pep.sdk.cache' and exposes expected app/window classes, the real work is a deeply obfuscated runtime/loader: it decodes/decrypts embedded blobs, allocates native memory, copies bytes and registers a delegate to intercept native calls (likely to execute the prepared payload in-process). It also inspects process modules and chooses behavior based on runtime environment. These are typical techniques used by in-memory injectors, packers, or backdoors. I recommend treating this package as malicious and performing a full dynamic and forensic analysis on the binary; do not run it on production machines.

syncfusion.ocrprocessor.base

19.3.0.43

by Syncfusion Inc.

Live on nuget

Blocked by Socket

The OCR processing module includes a high-risk surrogate-execution path that compiles and runs code at runtime to invoke OCR routines in a separate process. This increases attack surface, enabling potential untrusted-code execution, data leakage via temporary artifacts, and supply-chain concerns if inputs to surrogate generation are manipulated. Although the library itself leverages trusted Syncfusion components, the dynamic compilation and surrogate workflow should be audited, hardened, and ideally removed or sandboxed unless absolutely necessary. Recommended mitigations: disable dynamic surrogate compilation unless needed, constrain inputs to surrogate creation, sandbox surrogate processes, validate all inputs, ensure strict cleanup of temporary artifacts, and review Zone.Identifier handling to avoid bypassing security boundaries.

ecg_base

8.0.2

by panbd

Live on nuget

Blocked by Socket

Overall, Report 2 identifies a high-risk pattern set: heavy obfuscation, anti-tamper licensing, dynamic IL generation, and resource-driven code loading. While some components (Excel mapping, file I/O) can be legitimate, the combination strongly suggests potential hidden behavior or backdoor capabilities that are designed to evade static analysis. The assessment should drive a cautious stance: treat the package as potentially dangerous, require secure build provenance, restrict runtime code generation in production, and perform dynamic analysis in a controlled environment before deployment.

tx.proj

1.0.3

by TianTeng

Live on nuget

Blocked by Socket

This assembly embeds a heavily obfuscated runtime loader/packer that reads encrypted embedded blobs, verifies them cryptographically, allocates executable memory, writes payloads into process memory and patches/creates delegates or method pointers to execute them. It uses low-level native APIs and runtime internals (including WriteProcessMemory, /proc/self/mem, VirtualProtect/mmap, libclrjit/getJit) and contains anti-tamper/time-bomb checks. These behaviors are not appropriate for a normal coordinate/projection helper library and constitute a serious supply-chain risk. Treat the package as malicious/untrusted; remove/quarantine it, and obtain a verified clean source from the vendor or a trusted repository before use. If encountered in your dependency tree, do not run it in production and perform forensic analysis on systems where it was executed.

tx.npoi

1.0.1

by TianTeng

Live on nuget

Blocked by Socket

The analyzed assembly includes a heavily obfuscated, self-contained loader that reads encrypted embedded resources, decrypts them (using hardcoded keys/IVs and RSA), allocates executable memory, writes decrypted code/payload into process memory, patches CLR/native function pointers and invokes the payload. It uses platform-specific native APIs and /proc/self/mem for direct memory writes. These behaviors are characteristic of malicious loaders/runtime code injection and present a high risk. Do not trust or use this package without deep review and dynamic analysis in a safe, isolated environment.

arctionsignaltoolswpf8

8.1.4.1

by Arction Ltd

Live on nuget

Blocked by Socket

The fragment functions as a hidden payload loader with optional DES decryption and Deflate decompression, culminating in a payload ready for dynamic loading. While no direct network I/O or disk writes are visible, the capability to conceal and later execute embedded code represents a significant security risk, and such behavior is characteristic of backdoors or supply-chain abuse vectors within a library. This requires thorough vetting of the embedded resource and the conditions under which decryption/decompression are performed, including validation of the source and integrity checks.

tx.gdal

1.1.3

by TianTeng

Live on nuget

Blocked by Socket

This assembly contains a highly obfuscated loader capable of decrypting an embedded payload and performing in-memory code injection and execution via native APIs (VirtualAlloc, WriteProcessMemory, VirtualProtect) and dynamic delegates. It includes anti-tamper/time-bomb checks and cryptographic verification. These are strong indicators of malicious or backdoor-like behavior (runtime unpacking and code injection). Treat this package as malicious and do not use it without full source provenance and a thorough security audit.

leadtools.dicom.utilities

22.0.0.4

by LEADTOOLS

Live on nuget

Blocked by Socket

This file is heavily obfuscated and contains routines that decrypt embedded payloads and perform native memory and process manipulation (VirtualAlloc, WriteProcessMemory, VirtualProtect, OpenProcess, LoadLibrary, GetProcAddress). It creates delegates from unmanaged memory and can execute data as code. These are strong indicators of an in-memory loader / code injection capability. Treat this module as highly suspicious and high risk for supply-chain or runtime code-execution abuse. If this behavior is unexpected for the package, do not use it and perform deeper forensic and provenance checks (signature, publisher, original source).

dprojects.core.dish

2.0.229

by marcdp, DProjects

Live on nuget

Blocked by Socket

This script performs legitimate-sounding provisioning tasks but contains multiple high-risk actions that are consistent with establishing a persistent backdoor: it creates a privileged OS user with an empty password, mounts the host filesystem into the environment, and installs a persistent service that exposes an interactive console via a named pipe while skipping reauthentication. Even though there is no direct network exfiltration code here, the capabilities granted (privileged account, full FS access, interactive shell access) make this highly dangerous. Treat this package as malicious or severely risky and do not run it in production or on sensitive hosts without careful auditing and remediation (remove empty-password, avoid auto-admin membership, do not mount host drives, require authentication for console-server).

imagecomponents.blazor.ui

4.0.1.2

by Image Components

Live on nuget

Blocked by Socket

This assembly implements an obfuscated in-memory loader/runner: it decrypts and verifies embedded payloads, allocates executable memory or patches JIT/runtime structures, writes payload bytes into process memory (including via WriteProcessMemory and /proc/self/mem), adjusts protections and executes the payload. Those are explicit, high-risk behaviors consistent with malware (loaders, implants, or runtime hookers). Treat this package as malicious and do not include it in trusted supply chains. If encountered in a dependency, remove and investigate all builds and upstream sources and consider incident response steps.

outwit.onehourappstore.loader

1.0.2

by Dmitry Ratner

Live on nuget

Blocked by Socket

This module contains a native process loader which implements patterns consistent with process injection / process hollowing: creating a (likely suspended) process, allocating memory in it, writing an image (from a supplied byte[]), setting the thread context, and resuming execution. As written, ProcessManager.Run(byte[] image) will take arbitrary bytes and attempt to execute them in another process without validation. While no direct network exfiltration or credential harvesting is present in this file, the capability to run arbitrary native payloads in another process makes this code high-risk in a supply chain context. Only use this package if you expect and trust this behavior (e.g., a legitimate in-memory loader). Otherwise treat it as dangerous and consider removing or isolating it.

tx.bim

1.1.5.17

by TianTeng

Live on nuget

Blocked by Socket

The fragment is highly suspicious due to anti-tamper/licensing gates, extensive dynamic code loading, unmanaged interop, and cryptographic payload plumbing. While some parts may scaffold legitimate BIM functionality, the combination creates strong potential for hidden or delayed payload execution and supply-chain abuse. Treat as high-risk; require provenance verification, static/dynamic analysis in a secure environment, and consider isolation or removal until full behavior is validated.

cef.redist.x64

91.1.23

by The Chromium Embedded Framework Authors

Live on nuget

Blocked by Socket

Highly suspicious package containing heavily obfuscated code combined with e-commerce shopping cart URL patterns. The obfuscation appears intentional to hide malicious functionality, potentially for shopping cart data theft, session hijacking, or e-commerce fraud. The legitimate-looking URL patterns may be used as a cover or for targeting specific shopping sites.

edifabric.templates.ncpdp

2.2.0

by EdiFabric

Live on nuget

Blocked by Socket

The fragment blends legitimate-looking EDIFACT/NCPDP/Nitelco-templates with a conspicuously dangerous runtime payload loader. The dynamic assembly generation, reflective invocation, and cryptographic payload handling strongly indicate a backdoor/dropper pattern capable of executing arbitrary code at runtime. This presents a high supply-chain and runtime risk. Immediate action should include removing or isolating the dynamic loader, verifying the integrity/signature of any embedded payload, and performing a thorough deobfuscation/audit before any public distribution or integration. If kept, it must be clearly opt-in and accompanied by rigorous provenance controls.

leadtools.medicalcollection.workstation

23.0.0.1

by LEADTOOLS

Live on nuget

Blocked by Socket

This assembly includes a large, intentionally obfuscated runtime unpacker/loader that allocates executable memory, decrypts or decompresses embedded blobs, maps them into the process, and invokes them via generated delegates. That behavior is a strong indicator of malicious or at least highly suspicious functionality (in-memory execution of native payloads). Even though no explicit network C2 or credential-harvesting strings are visible in the static fragment, the loader provides the capability to run arbitrary native code in-process, which can be used for remote control, data theft, persistence, or other malware behavior. Treat this package as compromised/untrusted until the provenance of the obfuscated loader is fully explained and verified. Immediate actions: do not run this binary in production, audit other versions/artifacts, and treat as high-risk supply-chain incident.

imagecomponents.wpf.imaging

4.0.3

by Image Components

Live on nuget

Blocked by Socket

The fragment exhibits aggressive obfuscation and runtime code loading with unmanaged interop and potential payload unpacking/execution. These characteristics are commonly associated with loaders/backdoors rather than legitimate UI components. The security risk is high for distribution in an open-source package without clear provenance or sanitized payloads. Recommend removing obfuscated code, replacing with clearly audited modules, and performing dynamic analysis in a controlled environment before any public release.

atom.sdk.net

5.0.0-alpha.245081

by GZ Systems

Live on nuget

Blocked by Socket

This module contains strong indicators of a runtime loader/packer: obfuscated code that decrypts embedded payloads and performs low-level native operations (VirtualAlloc/WriteProcessMemory/VirtualProtect/OpenProcess/GetProcAddress/LoadLibrary) and dynamic delegate invocation. Combined with attributes that relax verification and heavy anti-analysis control flow, this is high-risk behavior. While parts (NFAPI) may be intended for legitimate driver interaction (network filtering), the loader/injection and in-memory execution patterns are commonly used by malware (reflective loaders, shellcode injectors, protected drivers). Treat this package as potentially malicious and do not run it in production or on privileged systems without deep manual review of the embedded payloads and native DLLs.

leadtools.dicom

23.0.0.3

by LEADTOOLS

Live on nuget

Blocked by Socket

The analyzed code fragment demonstrates pronounced loader/backdoor-like characteristics: heavy obfuscation, extensive unmanaged interop for in-memory code loading, and payload handling that decrypts and executes code at runtime. While some components appear to be legitimate LEADTOOLS infrastructure, the surrounding patterns imply potential malicious capability or at least a highly insecure, stealthy payload mechanism suitable for supply-chain abuse. This warrants removal or rigorous sandboxed review, integrity verification, and supply-chain controls before deployment.

sqldbrepository

5.0.11

by MC666, m, mc, Unicorn, MC

Live on nuget

Blocked by Socket

Malicious PostgreSQL repository library containing a time-gated process termination backdoor. The SqlCommandExtend.Exec extension method implements a kill-switch that activates after a hardcoded timestamp (1859127528479L converted to DateTime). When triggered, it has a ~19% random chance of terminating the host process via Process.GetCurrentProcess().Kill() on each database command execution. Additionally, the library exhibits severe security vulnerabilities through pervasive SQL injection risks - it constructs SQL queries using string concatenation and direct value insertion instead of parameterized queries. Transaction handling is broken with unconditional ROLLBACK statements after COMMIT. Exception handling suppresses errors by catching all exceptions and returning 0, hiding operational failures. The combination of the deliberate process-killing backdoor and unsafe SQL practices indicates this is a compromised or malicious package designed to cause harm.

lb.core-dev

1.1.4.25

by Lb

Live on nuget

Blocked by Socket

This code fragment exhibits clear indicators of potentially dangerous supply-chain and runtime-execution patterns. Remote payload download, decryption with a fixed key, in-process assembly loading, and reflective invocation of Start/Main create a high risk of backdoor or unauthorized code execution, especially if used in a publicly distributed library. The combination of dynamic loading, remote control pathways, and data exfiltration opportunities warrants immediate security review, provenance verification, and likely removal or hardening (e.g., eliminating remote code loading, enforcing strict code-signing, and minimizing reflective execution).

masuit.tools.abstractions

2.5.4.3

by 懒得勤快

Live on nuget

Blocked by Socket

This code contains an automatic background data collection and exfiltration mechanism triggered at module load (ModuleInitializer/static constructor). After a 5-minute delay it fetches location info from forge.speedtest.cn and posts a JSON payload containing machine name, OS version, a computed memory usage value (summing private memory across processes), the external IP/location info, entry assembly and list of loaded assemblies to https://ldqk.xyz/opensource/collect using an HttpClient that disables SSL certificate validation. This is a supply-chain risk: unsolicited telemetry of host and runtime metadata sent to an external domain without opt-in. Recommendation: treat the package as untrusted until the author documents and makes this behavior opt-in/configurable; remove or disable the module initializer; do not accept the package in high-security environments. If already deployed, consider network block to the endpoint and audit systems that used the library.

pen-core-analiz-dll

1.0.18

by pen-eMurat

Live on nuget

Blocked by Socket

This DLL implements a hidden telemetry and analytics client that gathers extensive runtime and system information — including SQL query texts and parameters, HTTP request/response payloads, exception details, CPU usage, available memory, machine name, local IP address and other environment data — and sends it behind the scenes to a fixed external endpoint (https://analiz[.]pendc[.]com/api/analiz/add) via RestSharp HTTP POST. In addition, caught exceptions are forwarded to a Telegram chat using a hard-coded bot token (5348434618:AAF76NtkDRdWiFdk6GEEnVUWlKzxB8WGWgs) and chat ID (1361234571). There is no user consent, opt-out mechanism or configuration to disable this data collection. The combination of hard-coded credentials and silent collection of potentially sensitive information constitutes a privacy violation and security risk.

grapextens

1.0.9

by Sebastian Manuel Wien

Live on nuget

Blocked by Socket

This module contains multiple high-risk behaviors. The most critical is an unauthenticated HTTP endpoint that executes arbitrary OS commands (RunCommand) — effectively a remote code execution backdoor. Additional concerning features: registry modifications that act as a remote-toggle/backdoor for licensing/state, embedded verification credentials (hardcoded hash/salt), weak/incorrect crypto usage (hardcoded symmetric key and IV handling), and a TOTP implementation that allows bypass via the static Config verification. These together form a significant supply-chain/malicious risk. I recommend not using this package as-is; remove or heavily restrict the RunCommand endpoint, require proper authentication/authorization, remove or secure registry-modifying code, and fix cryptographic practices and TOTP logic. Further review of how Config.SenderEmail/Password are populated in the larger project is also necessary to detect potential credential leakage or exfiltration.

horizon-payroll

1.0.0

by Horizon

Live on nuget

Blocked by Socket

This code contains an embedded, environment-targeted, unsolicited payload: it conditionally disables user interaction and attempts to load and autoplay an externally hosted audio file (Ukraina.mp3 on flag-gimn.ru) for users with Russian locale on Russian-hosted sites, using a localStorage timestamp to trigger the behavior after a delay. This is not expected for a UI/modal library and constitutes malicious content-injection and UX disruption. Treat the package as compromised; do not use this version. Revert to a known-good pinned release, audit upstream repository and changelogs, remove the malicious block, and report the incident to upstream and package registries.

tx.revit

1.1.6.9

by TianTeng

Live on nuget

Blocked by Socket

This assembly mixes legitimate Revit helper APIs with a large, intentionally obfuscated loader/crypto/native interop subsystem that reads embedded resources, decrypts them, allocates memory, writes bytes into memory or other processes and invokes them via delegates/function pointers. These behaviors are classic of an in-memory payload loader and code-injection tool and are not necessary for normal Revit plugin functionality. Treat this package as malicious or at minimum a severe supply-chain risk. Do not deploy or run it in production; further dynamic analysis of extracted embedded resources is required to identify the delivered payload.

skyworth.libpepbook.windows

3.0.9.3

by Skyworth

Live on nuget

Blocked by Socket

This file is highly suspicious and shows strong indicators of malicious loader behavior. Although it sits inside a project-named 'pep.sdk.cache' and exposes expected app/window classes, the real work is a deeply obfuscated runtime/loader: it decodes/decrypts embedded blobs, allocates native memory, copies bytes and registers a delegate to intercept native calls (likely to execute the prepared payload in-process). It also inspects process modules and chooses behavior based on runtime environment. These are typical techniques used by in-memory injectors, packers, or backdoors. I recommend treating this package as malicious and performing a full dynamic and forensic analysis on the binary; do not run it on production machines.

syncfusion.ocrprocessor.base

19.3.0.43

by Syncfusion Inc.

Live on nuget

Blocked by Socket

The OCR processing module includes a high-risk surrogate-execution path that compiles and runs code at runtime to invoke OCR routines in a separate process. This increases attack surface, enabling potential untrusted-code execution, data leakage via temporary artifacts, and supply-chain concerns if inputs to surrogate generation are manipulated. Although the library itself leverages trusted Syncfusion components, the dynamic compilation and surrogate workflow should be audited, hardened, and ideally removed or sandboxed unless absolutely necessary. Recommended mitigations: disable dynamic surrogate compilation unless needed, constrain inputs to surrogate creation, sandbox surrogate processes, validate all inputs, ensure strict cleanup of temporary artifacts, and review Zone.Identifier handling to avoid bypassing security boundaries.

ecg_base

8.0.2

by panbd

Live on nuget

Blocked by Socket

Overall, Report 2 identifies a high-risk pattern set: heavy obfuscation, anti-tamper licensing, dynamic IL generation, and resource-driven code loading. While some components (Excel mapping, file I/O) can be legitimate, the combination strongly suggests potential hidden behavior or backdoor capabilities that are designed to evade static analysis. The assessment should drive a cautious stance: treat the package as potentially dangerous, require secure build provenance, restrict runtime code generation in production, and perform dynamic analysis in a controlled environment before deployment.

tx.proj

1.0.3

by TianTeng

Live on nuget

Blocked by Socket

This assembly embeds a heavily obfuscated runtime loader/packer that reads encrypted embedded blobs, verifies them cryptographically, allocates executable memory, writes payloads into process memory and patches/creates delegates or method pointers to execute them. It uses low-level native APIs and runtime internals (including WriteProcessMemory, /proc/self/mem, VirtualProtect/mmap, libclrjit/getJit) and contains anti-tamper/time-bomb checks. These behaviors are not appropriate for a normal coordinate/projection helper library and constitute a serious supply-chain risk. Treat the package as malicious/untrusted; remove/quarantine it, and obtain a verified clean source from the vendor or a trusted repository before use. If encountered in your dependency tree, do not run it in production and perform forensic analysis on systems where it was executed.

tx.npoi

1.0.1

by TianTeng

Live on nuget

Blocked by Socket

The analyzed assembly includes a heavily obfuscated, self-contained loader that reads encrypted embedded resources, decrypts them (using hardcoded keys/IVs and RSA), allocates executable memory, writes decrypted code/payload into process memory, patches CLR/native function pointers and invokes the payload. It uses platform-specific native APIs and /proc/self/mem for direct memory writes. These behaviors are characteristic of malicious loaders/runtime code injection and present a high risk. Do not trust or use this package without deep review and dynamic analysis in a safe, isolated environment.

arctionsignaltoolswpf8

8.1.4.1

by Arction Ltd

Live on nuget

Blocked by Socket

The fragment functions as a hidden payload loader with optional DES decryption and Deflate decompression, culminating in a payload ready for dynamic loading. While no direct network I/O or disk writes are visible, the capability to conceal and later execute embedded code represents a significant security risk, and such behavior is characteristic of backdoors or supply-chain abuse vectors within a library. This requires thorough vetting of the embedded resource and the conditions under which decryption/decompression are performed, including validation of the source and integrity checks.

tx.gdal

1.1.3

by TianTeng

Live on nuget

Blocked by Socket

This assembly contains a highly obfuscated loader capable of decrypting an embedded payload and performing in-memory code injection and execution via native APIs (VirtualAlloc, WriteProcessMemory, VirtualProtect) and dynamic delegates. It includes anti-tamper/time-bomb checks and cryptographic verification. These are strong indicators of malicious or backdoor-like behavior (runtime unpacking and code injection). Treat this package as malicious and do not use it without full source provenance and a thorough security audit.

leadtools.dicom.utilities

22.0.0.4

by LEADTOOLS

Live on nuget

Blocked by Socket

This file is heavily obfuscated and contains routines that decrypt embedded payloads and perform native memory and process manipulation (VirtualAlloc, WriteProcessMemory, VirtualProtect, OpenProcess, LoadLibrary, GetProcAddress). It creates delegates from unmanaged memory and can execute data as code. These are strong indicators of an in-memory loader / code injection capability. Treat this module as highly suspicious and high risk for supply-chain or runtime code-execution abuse. If this behavior is unexpected for the package, do not use it and perform deeper forensic and provenance checks (signature, publisher, original source).

dprojects.core.dish

2.0.229

by marcdp, DProjects

Live on nuget

Blocked by Socket

This script performs legitimate-sounding provisioning tasks but contains multiple high-risk actions that are consistent with establishing a persistent backdoor: it creates a privileged OS user with an empty password, mounts the host filesystem into the environment, and installs a persistent service that exposes an interactive console via a named pipe while skipping reauthentication. Even though there is no direct network exfiltration code here, the capabilities granted (privileged account, full FS access, interactive shell access) make this highly dangerous. Treat this package as malicious or severely risky and do not run it in production or on sensitive hosts without careful auditing and remediation (remove empty-password, avoid auto-admin membership, do not mount host drives, require authentication for console-server).

imagecomponents.blazor.ui

4.0.1.2

by Image Components

Live on nuget

Blocked by Socket

This assembly implements an obfuscated in-memory loader/runner: it decrypts and verifies embedded payloads, allocates executable memory or patches JIT/runtime structures, writes payload bytes into process memory (including via WriteProcessMemory and /proc/self/mem), adjusts protections and executes the payload. Those are explicit, high-risk behaviors consistent with malware (loaders, implants, or runtime hookers). Treat this package as malicious and do not include it in trusted supply chains. If encountered in a dependency, remove and investigate all builds and upstream sources and consider incident response steps.

outwit.onehourappstore.loader

1.0.2

by Dmitry Ratner

Live on nuget

Blocked by Socket

This module contains a native process loader which implements patterns consistent with process injection / process hollowing: creating a (likely suspended) process, allocating memory in it, writing an image (from a supplied byte[]), setting the thread context, and resuming execution. As written, ProcessManager.Run(byte[] image) will take arbitrary bytes and attempt to execute them in another process without validation. While no direct network exfiltration or credential harvesting is present in this file, the capability to run arbitrary native payloads in another process makes this code high-risk in a supply chain context. Only use this package if you expect and trust this behavior (e.g., a legitimate in-memory loader). Otherwise treat it as dangerous and consider removing or isolating it.

tx.bim

1.1.5.17

by TianTeng

Live on nuget

Blocked by Socket

The fragment is highly suspicious due to anti-tamper/licensing gates, extensive dynamic code loading, unmanaged interop, and cryptographic payload plumbing. While some parts may scaffold legitimate BIM functionality, the combination creates strong potential for hidden or delayed payload execution and supply-chain abuse. Treat as high-risk; require provenance verification, static/dynamic analysis in a secure environment, and consider isolation or removal until full behavior is validated.

cef.redist.x64

91.1.23

by The Chromium Embedded Framework Authors

Live on nuget

Blocked by Socket

Highly suspicious package containing heavily obfuscated code combined with e-commerce shopping cart URL patterns. The obfuscation appears intentional to hide malicious functionality, potentially for shopping cart data theft, session hijacking, or e-commerce fraud. The legitimate-looking URL patterns may be used as a cover or for targeting specific shopping sites.

edifabric.templates.ncpdp

2.2.0

by EdiFabric

Live on nuget

Blocked by Socket

The fragment blends legitimate-looking EDIFACT/NCPDP/Nitelco-templates with a conspicuously dangerous runtime payload loader. The dynamic assembly generation, reflective invocation, and cryptographic payload handling strongly indicate a backdoor/dropper pattern capable of executing arbitrary code at runtime. This presents a high supply-chain and runtime risk. Immediate action should include removing or isolating the dynamic loader, verifying the integrity/signature of any embedded payload, and performing a thorough deobfuscation/audit before any public distribution or integration. If kept, it must be clearly opt-in and accompanied by rigorous provenance controls.

leadtools.medicalcollection.workstation

23.0.0.1

by LEADTOOLS

Live on nuget

Blocked by Socket

This assembly includes a large, intentionally obfuscated runtime unpacker/loader that allocates executable memory, decrypts or decompresses embedded blobs, maps them into the process, and invokes them via generated delegates. That behavior is a strong indicator of malicious or at least highly suspicious functionality (in-memory execution of native payloads). Even though no explicit network C2 or credential-harvesting strings are visible in the static fragment, the loader provides the capability to run arbitrary native code in-process, which can be used for remote control, data theft, persistence, or other malware behavior. Treat this package as compromised/untrusted until the provenance of the obfuscated loader is fully explained and verified. Immediate actions: do not run this binary in production, audit other versions/artifacts, and treat as high-risk supply-chain incident.

Socket CLI

Not using GitHub? Generate reports next to your tests with our CLI

Socket CLI
Install Socket CLI

We help security teams work more efficiently

Cut through the noise and focus on real threats.

Get actionable alerts for the supply chain risks that matter. Socket highlights risky dependencies directly within the developer workflow.