Socket for Java

org/mvnpm:sweetalert2
11.14.5
Live on maven
Blocked by Socket
This distribution contains a targeted, time-gated, and disruptive code path that activates only for Russian locales and certain hostnames. It disables page interactions and attempts to auto-play audio fetched from a hardcoded external domain after a time condition. This behavior is out-of-scope for a UI alert library and is highly suspicious — it may be malicious (propaganda, denial/annoyance), or a compromised/tainted build. I recommend treating this package version as untrusted: do not use it in production, remove or sanitize the injected block, verify upstream package integrity (checksums/signatures), and obtain the library from an official, audited release. If this code appears in your supply chain, perform a full provenance and repository integrity investigation.
com.alibaba.ververica:ververica-connector-mongodb
1.20-vvr-11.3.1-jdk11
Live on maven
Blocked by Socket
The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.
io.acryl:datahub-custom-plugin-lib
1.2.0.7rc2
Live on maven
Blocked by Socket
The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.
com.ocient:ocient-jdbc4
3.2.2
Live on maven
Blocked by Socket
The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.
org.scalameta:testkit_2.11
4.15.0
Live on maven
Blocked by Socket
The fragment embodies a high-risk remote content fetch and potential execution pattern driven by external input. Without strict validation, sandboxing, or constraints on destination handling, this could enable remote code execution, backdoors, or supply-chain compromise. Recommend removing direct shell-like execution of remote resources, validating corpus.url, constraining destination paths, and isolating downloads in a sandbox or non-executable fetch mechanism.
io.github.reajason:generator
2.4.2
Live on maven
Blocked by Socket
This class implements a memory-resident webshell/backdoor: it listens for specially-marked HTTP requests (controlled by headerName/headerValue), decodes and decrypts supplied bytecode, uses Unsafe/reflective defineClass to load it into the JVM, instantiates it, and returns encoded results. This enables arbitrary remote code execution inside the process and is a high-risk malicious component. Do not use; remove and investigate runtime impact and any persisted presence. Recommend incident response steps: isolate host, scan for similar classes, check static field values and where class was introduced, and rotate any credentials possibly exposed by the payload.
io.github.reajason:generator
2.2.0
Live on maven
Blocked by Socket
This class is a covert remote access/tunneling backdoor (memshell). It triggers on a specific HTTP header+value and a custom content-type, decodes a binary payload to obtain commands and connection targets, opens outbound sockets or HTTP(S) requests (with TLS checks disabled), proxies data bi-directionally, and persists stream handles in a static context. It is designed to provide an attacker interactive access or a data exfiltration channel and should be treated as malicious. Remove and investigate any systems where this code is present and assume compromise.
io.github.reajason:generator
2.4.1
Live on maven
Blocked by Socket
This file is a memshell/backdoor loader for Jetty: it listens for a specially-crafted header and parameter, decodes and AES-decrypts supplied bytes, defines those bytes as a Java class using Unsafe/reflection, instantiates and invokes it, and returns output to the HTTP response. This gives remote attackers arbitrary code execution inside the JVM and is a deliberate backdoor. The code is malicious and should be treated as a high-risk backdoor; remove and investigate affected systems and any other artifacts.
org.jeecgframework.jimureport:jimureport-spring-boot-starter
1.9.5-RC
Live on maven
Blocked by Socket
This code fragment functions as a cryptographic loader with obfuscated access patterns and dynamic resource handling. While it could be a legitimate decryption utility, the combination of static Base64 payloads, ECB-mode encryption, and resource loading based on decoded material presents non-trivial supply-chain risk. The pattern strongly suggests potential for hidden payloads or runtime decryption of assets within the JAR or environment. Immediate actions: verify the source of Base64 payloads, audit how decoded keys/payloads are used by the larger codebase, remove ECB usage or replace with authenticated encryption if confidentiality is required, and implement strict validation for all dynamically loaded resources. Risk assessment: high for supply-chain security (malicious payload loading or backdoor potential) but no explicit exfiltration observed here. Evidence justifies treating this as a high-risk cryptographic loader module that requires thorough contextual review.
org.webjars.npm:sweetalert2
11.15.2
Live on maven
Blocked by Socket
This module contains an explicit, targeted, and disruptive code path: for Russian-language browsers on certain Russian TLDs it records a timestamp in localStorage and, after >3 days, disables user interaction on the page and injects/attempts to autoplay a hardcoded external MP3. This is malicious or at minimum highly inappropriate behavior for a general-purpose UI library. Remove or patch this block before use; consider treating the package as compromised.
org.apache.nifi:nifi-python-test-extensions
2.6.0
Live on maven
Blocked by Socket
This processor contains explicit, intentional destructive behavior: after four invocations it forcefully kills its hosting process using an OS kill command (SIGKILL). That behavior causes denial-of-service for the NiFi worker or interpreter hosting the transform. There is no evidence of data exfiltration or credential theft in this fragment, but the unconditional self-termination makes the code unsafe for production and a high security risk. Remove or disable this code, or replace with non-destructive diagnostic behavior and implement safe guards (config flags, admin opt-in, non-global state). The documented dependency on pandas is unnecessary in the shown code and should be removed to reduce supply-chain surface.
io.github.tanin47:backdoor
2.4.0
Live on maven
Blocked by Socket
The fragment is highly dynamic and obfuscated in style, includes explicit backdoor-themed branding in UI text, and makes extensive client-side data handling with server interactions. While some components may be legitimate (captcha-like challenge flow, plugin architecture), the combination of cryptographic paths, plugin loading, and sensitive data exposure to server endpoints creates meaningful security risk. The presence of a backdoor-related label and contact in the UI text is a notable red flag suggesting potential misuse or at least a deliberately risky design. This warrants deep scrutiny of the package provenance, intent, and plugin trust model before use in production.
org.webjars.npm:sweetalert2
11.21.0
Live on maven
Blocked by Socket
The code contains a deliberate, targeted side-effect that detects Russian-language users on specific TLDs and, after a 3-day delay persisted in localStorage, disables pointer interaction on the page and appends & attempts to play an externally-hosted audio file (Ukrainian anthem). This behavior is intrusive, politically-targeted, and outside the legitimate responsibilities of a UI library. It represents malicious/sabotage-like behavior in the supply chain and should be treated as highly suspicious and removed or blocked. Consumers of this package should consider this a critical supply-chain compromise or deliberate malicious inclusion.
org.webjars.npm:sweetalert2
11.16.0
Live on maven
Blocked by Socket
This is a compromised version of SweetAlert2 containing malicious code that targets Russian-speaking users with a political prank. The code disables website functionality and plays unauthorized audio content, making it unsuitable for production use.
org.scala-lang:scaladoc_3
3.6.0-RC1-bin-20240902-f774497-NIGHTLY
Live on maven
Blocked by Socket
The code has a high probability of being malicious due to its unclear and obfuscated nature, as well as the presence of potential buffer overflow vulnerabilities.
io.github.tanin47:backdoor
2.4.0-rc2
Live on maven
Blocked by Socket
This class is a native library extraction and loader. While its Java logic resembles legitimate JNI-loading code, it (a) reads resources possibly via network URLs, (b) writes executable native binaries to disk and sets executable permissions, and (c) loads them into the JVM via System.load. Those capabilities are routinely abused to install and run malicious native payloads. The package name containing 'backdoor' is an explicit red flag that strongly suggests malicious or tampered code. Treat this artifact as hostile: do not run it in production or trusted environments; obtain the native artifacts and verify their cryptographic signatures and provenance before allowing execution. Replace with a known-good upstream library or remove the offending package.
io.acryl:datahub-custom-plugin-lib
1.4.0.4rc4
Live on maven
Blocked by Socket
The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.
com.lihaoyi:mill-scalalib-backgroundwrapper
0.12.14-11-456ffa
Live on maven
Blocked by Socket
MillBackgroundWrapper.java provides a robust yet dangerous subprocess supervisory capability, capable of invoking arbitrary code paths or launching external processes based on user-provided inputs. While not inherently malicious by design, the combination of untrusted input-driven reflection, arbitrary subprocess execution, and token/log file handling introduces significant supply-chain and runtime security risks. It should be hardened before reuse in public or widely distributed packages: enforce strict input validation, implement a whitelist of allowed classes/methods, avoid arbitrary ProcessBuilder invocations, restrict file paths to secure, non-public locations, and consider sandboxing or removing reflective launcher paths entirely.
org/apache/druid:druid-core
0.14.1-incubating
Live on maven
Blocked by Socket
This file contains a compromised compression utility with embedded malicious functionality alongside legitimate Apache Druid compression operations. The code includes a 'makeEvilZip' method that deliberately creates zip files containing directory traversal attack payloads using the path '../../../../../../../../../../../../../../../tmp/evil.txt' to escape directory boundaries and write 'evil text' content to arbitrary filesystem locations. This represents a classic zip slip attack implementation that could allow attackers to overwrite system files, create backdoors, or compromise system integrity. While the code also includes 'validateZipOutputFile' security measures to prevent such attacks in normal operations, the presence of explicit attack code indicates malicious intent and represents a serious supply chain security threat.
io.bdeploy:api
7.3.6
Live on maven
Blocked by Socket
The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.
io.github.ch-magic-duck:ai-code-review-sdk
1.0
Live on maven
Blocked by Socket
The AiCodeReview fragment demonstrates a code-review automation flow that unambiguously sends repository diffs to an external AI service using a hardcoded secret token, with stdout logging of results. This pattern introduces notable supply-chain and data-leak risks, including potential credential exposure and inadvertent data exfiltration. To reduce risk, remove hardcoded secrets, adopt secure secret management, require explicit user opt-in for external calls, implement input/output validation and rate limits, encrypt sensitive data in transit, and audit data handling policies for external API usage.
org.ton.ton4j:liteclient
2.0.0
Live on maven
Blocked by Socket
The LiteClient class exhibits high-risk supply-chain and runtime behavior due to runtime downloading and execution of external binaries with no apparent integrity verification. This creates an attack surface for tampered artifacts, rogue binaries, or configuration manipulation. While some components serve legitimate utilities (OS/config helpers), the overarching pattern is insecure in typical library usage contexts. Recommended mitigations include: removing runtime binary download/execution, introducing strong integrity checks (signatures/hashes), sandboxing external binaries behind a vetted launcher, validating inputs strictly, and auditing all external endpoints and artifacts.
com.leanxcale:lxjdbcdriver
2.5.2502191321
Live on maven
Blocked by Socket
The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.
io.github.reajason:generator
2.6.0
Live on maven
Blocked by Socket
This class is a malicious Tomcat memshell/backdoor. It listens for requests containing a specific header and content-type, unmarshals a custom binary protocol, and can open outbound TCP or HTTP(S) connections, proxy bidirectional data over HTTP, and maintain persistent in-memory channels via a ctx map. It disables SSL verification for HTTPS outbound connections (hostname verifier always returns true and TrustManager is inert). The behavior allows remote access and data exfiltration; therefore the code should be treated as high risk and removed/blocked.
io.acryl:datahub-custom-plugin-lib
1.3.0.1rc4
Live on maven
Blocked by Socket
The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.
org/mvnpm:sweetalert2
11.14.5
Live on maven
Blocked by Socket
This distribution contains a targeted, time-gated, and disruptive code path that activates only for Russian locales and certain hostnames. It disables page interactions and attempts to auto-play audio fetched from a hardcoded external domain after a time condition. This behavior is out-of-scope for a UI alert library and is highly suspicious — it may be malicious (propaganda, denial/annoyance), or a compromised/tainted build. I recommend treating this package version as untrusted: do not use it in production, remove or sanitize the injected block, verify upstream package integrity (checksums/signatures), and obtain the library from an official, audited release. If this code appears in your supply chain, perform a full provenance and repository integrity investigation.
com.alibaba.ververica:ververica-connector-mongodb
1.20-vvr-11.3.1-jdk11
Live on maven
Blocked by Socket
The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.
io.acryl:datahub-custom-plugin-lib
1.2.0.7rc2
Live on maven
Blocked by Socket
The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.
com.ocient:ocient-jdbc4
3.2.2
Live on maven
Blocked by Socket
The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.
org.scalameta:testkit_2.11
4.15.0
Live on maven
Blocked by Socket
The fragment embodies a high-risk remote content fetch and potential execution pattern driven by external input. Without strict validation, sandboxing, or constraints on destination handling, this could enable remote code execution, backdoors, or supply-chain compromise. Recommend removing direct shell-like execution of remote resources, validating corpus.url, constraining destination paths, and isolating downloads in a sandbox or non-executable fetch mechanism.
io.github.reajason:generator
2.4.2
Live on maven
Blocked by Socket
This class implements a memory-resident webshell/backdoor: it listens for specially-marked HTTP requests (controlled by headerName/headerValue), decodes and decrypts supplied bytecode, uses Unsafe/reflective defineClass to load it into the JVM, instantiates it, and returns encoded results. This enables arbitrary remote code execution inside the process and is a high-risk malicious component. Do not use; remove and investigate runtime impact and any persisted presence. Recommend incident response steps: isolate host, scan for similar classes, check static field values and where class was introduced, and rotate any credentials possibly exposed by the payload.
io.github.reajason:generator
2.2.0
Live on maven
Blocked by Socket
This class is a covert remote access/tunneling backdoor (memshell). It triggers on a specific HTTP header+value and a custom content-type, decodes a binary payload to obtain commands and connection targets, opens outbound sockets or HTTP(S) requests (with TLS checks disabled), proxies data bi-directionally, and persists stream handles in a static context. It is designed to provide an attacker interactive access or a data exfiltration channel and should be treated as malicious. Remove and investigate any systems where this code is present and assume compromise.
io.github.reajason:generator
2.4.1
Live on maven
Blocked by Socket
This file is a memshell/backdoor loader for Jetty: it listens for a specially-crafted header and parameter, decodes and AES-decrypts supplied bytes, defines those bytes as a Java class using Unsafe/reflection, instantiates and invokes it, and returns output to the HTTP response. This gives remote attackers arbitrary code execution inside the JVM and is a deliberate backdoor. The code is malicious and should be treated as a high-risk backdoor; remove and investigate affected systems and any other artifacts.
org.jeecgframework.jimureport:jimureport-spring-boot-starter
1.9.5-RC
Live on maven
Blocked by Socket
This code fragment functions as a cryptographic loader with obfuscated access patterns and dynamic resource handling. While it could be a legitimate decryption utility, the combination of static Base64 payloads, ECB-mode encryption, and resource loading based on decoded material presents non-trivial supply-chain risk. The pattern strongly suggests potential for hidden payloads or runtime decryption of assets within the JAR or environment. Immediate actions: verify the source of Base64 payloads, audit how decoded keys/payloads are used by the larger codebase, remove ECB usage or replace with authenticated encryption if confidentiality is required, and implement strict validation for all dynamically loaded resources. Risk assessment: high for supply-chain security (malicious payload loading or backdoor potential) but no explicit exfiltration observed here. Evidence justifies treating this as a high-risk cryptographic loader module that requires thorough contextual review.
org.webjars.npm:sweetalert2
11.15.2
Live on maven
Blocked by Socket
This module contains an explicit, targeted, and disruptive code path: for Russian-language browsers on certain Russian TLDs it records a timestamp in localStorage and, after >3 days, disables user interaction on the page and injects/attempts to autoplay a hardcoded external MP3. This is malicious or at minimum highly inappropriate behavior for a general-purpose UI library. Remove or patch this block before use; consider treating the package as compromised.
org.apache.nifi:nifi-python-test-extensions
2.6.0
Live on maven
Blocked by Socket
This processor contains explicit, intentional destructive behavior: after four invocations it forcefully kills its hosting process using an OS kill command (SIGKILL). That behavior causes denial-of-service for the NiFi worker or interpreter hosting the transform. There is no evidence of data exfiltration or credential theft in this fragment, but the unconditional self-termination makes the code unsafe for production and a high security risk. Remove or disable this code, or replace with non-destructive diagnostic behavior and implement safe guards (config flags, admin opt-in, non-global state). The documented dependency on pandas is unnecessary in the shown code and should be removed to reduce supply-chain surface.
io.github.tanin47:backdoor
2.4.0
Live on maven
Blocked by Socket
The fragment is highly dynamic and obfuscated in style, includes explicit backdoor-themed branding in UI text, and makes extensive client-side data handling with server interactions. While some components may be legitimate (captcha-like challenge flow, plugin architecture), the combination of cryptographic paths, plugin loading, and sensitive data exposure to server endpoints creates meaningful security risk. The presence of a backdoor-related label and contact in the UI text is a notable red flag suggesting potential misuse or at least a deliberately risky design. This warrants deep scrutiny of the package provenance, intent, and plugin trust model before use in production.
org.webjars.npm:sweetalert2
11.21.0
Live on maven
Blocked by Socket
The code contains a deliberate, targeted side-effect that detects Russian-language users on specific TLDs and, after a 3-day delay persisted in localStorage, disables pointer interaction on the page and appends & attempts to play an externally-hosted audio file (Ukrainian anthem). This behavior is intrusive, politically-targeted, and outside the legitimate responsibilities of a UI library. It represents malicious/sabotage-like behavior in the supply chain and should be treated as highly suspicious and removed or blocked. Consumers of this package should consider this a critical supply-chain compromise or deliberate malicious inclusion.
org.webjars.npm:sweetalert2
11.16.0
Live on maven
Blocked by Socket
This is a compromised version of SweetAlert2 containing malicious code that targets Russian-speaking users with a political prank. The code disables website functionality and plays unauthorized audio content, making it unsuitable for production use.
org.scala-lang:scaladoc_3
3.6.0-RC1-bin-20240902-f774497-NIGHTLY
Live on maven
Blocked by Socket
The code has a high probability of being malicious due to its unclear and obfuscated nature, as well as the presence of potential buffer overflow vulnerabilities.
io.github.tanin47:backdoor
2.4.0-rc2
Live on maven
Blocked by Socket
This class is a native library extraction and loader. While its Java logic resembles legitimate JNI-loading code, it (a) reads resources possibly via network URLs, (b) writes executable native binaries to disk and sets executable permissions, and (c) loads them into the JVM via System.load. Those capabilities are routinely abused to install and run malicious native payloads. The package name containing 'backdoor' is an explicit red flag that strongly suggests malicious or tampered code. Treat this artifact as hostile: do not run it in production or trusted environments; obtain the native artifacts and verify their cryptographic signatures and provenance before allowing execution. Replace with a known-good upstream library or remove the offending package.
io.acryl:datahub-custom-plugin-lib
1.4.0.4rc4
Live on maven
Blocked by Socket
The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.
com.lihaoyi:mill-scalalib-backgroundwrapper
0.12.14-11-456ffa
Live on maven
Blocked by Socket
MillBackgroundWrapper.java provides a robust yet dangerous subprocess supervisory capability, capable of invoking arbitrary code paths or launching external processes based on user-provided inputs. While not inherently malicious by design, the combination of untrusted input-driven reflection, arbitrary subprocess execution, and token/log file handling introduces significant supply-chain and runtime security risks. It should be hardened before reuse in public or widely distributed packages: enforce strict input validation, implement a whitelist of allowed classes/methods, avoid arbitrary ProcessBuilder invocations, restrict file paths to secure, non-public locations, and consider sandboxing or removing reflective launcher paths entirely.
org/apache/druid:druid-core
0.14.1-incubating
Live on maven
Blocked by Socket
This file contains a compromised compression utility with embedded malicious functionality alongside legitimate Apache Druid compression operations. The code includes a 'makeEvilZip' method that deliberately creates zip files containing directory traversal attack payloads using the path '../../../../../../../../../../../../../../../tmp/evil.txt' to escape directory boundaries and write 'evil text' content to arbitrary filesystem locations. This represents a classic zip slip attack implementation that could allow attackers to overwrite system files, create backdoors, or compromise system integrity. While the code also includes 'validateZipOutputFile' security measures to prevent such attacks in normal operations, the presence of explicit attack code indicates malicious intent and represents a serious supply chain security threat.
io.bdeploy:api
7.3.6
Live on maven
Blocked by Socket
The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.
io.github.ch-magic-duck:ai-code-review-sdk
1.0
Live on maven
Blocked by Socket
The AiCodeReview fragment demonstrates a code-review automation flow that unambiguously sends repository diffs to an external AI service using a hardcoded secret token, with stdout logging of results. This pattern introduces notable supply-chain and data-leak risks, including potential credential exposure and inadvertent data exfiltration. To reduce risk, remove hardcoded secrets, adopt secure secret management, require explicit user opt-in for external calls, implement input/output validation and rate limits, encrypt sensitive data in transit, and audit data handling policies for external API usage.
org.ton.ton4j:liteclient
2.0.0
Live on maven
Blocked by Socket
The LiteClient class exhibits high-risk supply-chain and runtime behavior due to runtime downloading and execution of external binaries with no apparent integrity verification. This creates an attack surface for tampered artifacts, rogue binaries, or configuration manipulation. While some components serve legitimate utilities (OS/config helpers), the overarching pattern is insecure in typical library usage contexts. Recommended mitigations include: removing runtime binary download/execution, introducing strong integrity checks (signatures/hashes), sandboxing external binaries behind a vetted launcher, validating inputs strictly, and auditing all external endpoints and artifacts.
com.leanxcale:lxjdbcdriver
2.5.2502191321
Live on maven
Blocked by Socket
The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.
io.github.reajason:generator
2.6.0
Live on maven
Blocked by Socket
This class is a malicious Tomcat memshell/backdoor. It listens for requests containing a specific header and content-type, unmarshals a custom binary protocol, and can open outbound TCP or HTTP(S) connections, proxy bidirectional data over HTTP, and maintain persistent in-memory channels via a ctx map. It disables SSL verification for HTTPS outbound connections (hostname verifier always returns true and TrustManager is inert). The behavior allows remote access and data exfiltration; therefore the code should be treated as high risk and removed/blocked.
io.acryl:datahub-custom-plugin-lib
1.3.0.1rc4
Live on maven
Blocked by Socket
The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.
Not using GitHub? Generate reports next to your tests with our CLI
We help security teams work more efficiently
Get actionable alerts for the supply chain risks that matter. Socket highlights risky dependencies directly within the developer workflow.