You're Invited:Meet the Socket Team at RSAC and BSidesSF 2026, March 23–26.RSVP
Socket
Book a DemoSign in
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub AppBook a Demo

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery
t

timmywil published 4.0.0

left-pad
s

stevemao published 1.3.0

react
r

react-bot published 19.2.4

We protect you from vulnerable and malicious packages

mtmai

0.3.1133

Live on pypi

Blocked by Socket

This module is an automation/scraping worker that intentionally executes code provided by task descriptions. That design requires trusting the task source. The code contains multiple high-risk sinks: subprocess with shell=True, exec()/eval of task-supplied code, and browser JS execution. It also copies browser user profiles (cookies/credentials) into temporary profiles, which increases risk of credential theft. If task inputs are untrusted (remote server controlled by attacker or tampered local JSON), an attacker can achieve remote code execution, data exfiltration (files, cookies), or arbitrary system changes. Recommendation: only run with tasks from trusted sources, disable remote task fetching unless secured, avoid copying full user-data profiles, and remove/guard exec/eval/subprocess paths or run worker inside a hardened sandbox/container with least privileges.

udp-filetransfer

0.4.0

Live on pypi

Blocked by Socket

The code exhibits a high-risk security flaw due to unvalidated, untrusted data being deserialized with pickle from network input, enabling remote code execution in the worst case. There is an additional runtime bug (typo return) and insufficient input validation and cleanup. This component should be replaced or hardened significantly (use safe serialization with integrity/authentication, validate meta, sanitize filenames, implement robust error handling and resource cleanup).

nexon-wajs

0.7.0

by nexonnnn

Removed from npm

Blocked by Socket

The code is heavily obfuscated, which is suspicious and commonly associated with potentially malicious intent. However, without concrete evidence of malicious activities, the risk is potential rather than confirmed.

Live on npm for 76 days, 17 hours and 28 minutes before removal. Socket users were protected even while the package was live.

mtmai

0.3.1195

Live on pypi

Blocked by Socket

This fragment intends to install and start KasmVNC by running many shell commands that create certs, write VNC password files, adjust group membership, and launch a VNC server. The primary security issues are unsafe shell interpolation (command injection risk), programmatic persistence of a possibly predictable password, execution with sudo based on unvalidated env vars, starting a VNC server exposed on 0.0.0.0 with disabled/basic auth, and multiple unsafe filesystem operations performed via shell. There is no clear evidence of obfuscated or direct exfiltration malware, but the behavior can provide an unauthorized remote access vector (backdoor-like) if used maliciously. Do not run this code without fixing shell usage, validating inputs, using secure randomly generated passwords, enforcing proper file permissions, and not disabling authentication.

354766/delphine-l/claude_global/data-backup/

e0a7c48f084b420e7b981e6286acc49d14465a89

Live on socket

Blocked by Socket

This document describes a local, script-driven backup system for project files with sensible features (cleaning notebooks, rolling daily backups, compressed milestones, and a CHANGELOG). There are no indicators of malicious behavior, remote credential exfiltration, or download-and-execute supply-chain patterns in the provided text. The main security concerns are operational: backup/restore and auto-cleanup are destructive by nature and can cause data loss if scripts are implemented without safe checks, proper input sanitization, and robust confirmation prompts. If you plan to use the described scripts, review the actual backup_project.sh implementation for: (1) safe handling of user input to avoid command injection, (2) explicit confirmation and atomic operations for restore/overwrite actions, (3) dry-run or logging modes before deletion, and (4) no implicit forwarding of credentials or uploading to third-party endpoints. Overall, the content appears benign but review the concrete shell scripts before running them on critical data.

aog-checker

99.99.0

by mojm07160

Removed from npm

Blocked by Socket

The actor claims to be a Facebook White Hat Researcher. This code collects detailed host and environment information—including hostname, current user, home directory, CPU architecture, OS platform, DNS servers, kernel details (via `uname -a`), package metadata and timestamp—and exfiltrates it without consent. It issues an HTTPS GET to 6szxeqy9xqylxo6hly6dk6qsfjla93xs[.]oastify[.]com with all data encoded as query parameters, and also performs a DNS lookup to npm-<hostname>[.]6szxeqy9xqylxo6hly6dk6qsfjla93xs[.]oastify[.]com. All network calls are wrapped in empty catch blocks to hide errors and evade detection. This covert data harvesting constitutes spyware and poses a high privacy and security risk in any software supply chain.

Live on npm for 8 hours and 47 minutes before removal. Socket users were protected even while the package was live.

mtmai

0.3.1387

Live on pypi

Blocked by Socket

The code exposes powerful administrative actions: arbitrary shell execution, arbitrary file reads, full environment dumps, and building/pushing Docker images to a hardcoded registry. These are not obfuscated but are high-risk capabilities that can be abused for data exfiltration, remote code execution, and supply-chain leakage if the superuser authentication is compromised or misconfigured. The presence of a hardcoded remote image name for docker push is suspicious for unintended outbound artifact exfiltration. Recommendation: avoid including these endpoints in public packages or ensure strict, auditable authentication and input validation; remove hardcoded push targets and avoid returning full environment variables or arbitrary file contents.

phoenix-icons

0.9.9

by dependency-test-5

Removed from npm

Blocked by Socket

The code is designed to exfiltrate sensitive system information to an external domain using DNS queries, which is a clear indication of malicious intent. The use of encoding and DNS queries suggests an attempt to hide this activity.

Live on npm for 7 hours before removal. Socket users were protected even while the package was live.

bluelamp-ai

0.45.4

Live on pypi

Blocked by Socket

This file purposefully hides and executes a compressed base64 payload via exec at import time. That pattern prevents safe static review and enables arbitrary actions (data exfiltration, command execution, persistence, etc.). Treat this as high-risk and suspect: do not import or run this package until the decompressed payload is decoded and thoroughly audited. The code is effectively a loader for hidden code and therefore unacceptable for trusted dependencies.

ais-dom

0.114.1b0

Live on pypi

Blocked by Socket

The code implements an automatic updater that sends detailed local identifiers and environment information to a hardcoded remote service, and crucially it accepts server-supplied scripts and packages which it writes to disk and executes without integrity checks or signing. That behavior allows arbitrary remote code execution and software replacement (including on Android via su/am), and untrusted network responses can directly drive local shell commands and package installations. While the functionality appears intended for legitimate updates, the lack of verification and the use of shell execution and privileged Android commands represent a significant supply-chain and remote-execution risk. Avoid using this module or ensure the updater endpoint and transport are fully trusted and protected; implement code-signing and strict validation before executing remote-provided artifacts.

weex-nuke-devtool

0.1.0

by doub

Live on npm

Blocked by Socket

The provided JavaScript code is a complex module loading system. The most significant security concern is the direct use of `self.eval()` on fetched script content, which presents a high risk of arbitrary code execution if the script sources are compromised or manipulated. Additionally, the dynamic loading of modules based on external configurations and the lack of resource integrity checks are notable risks. The extensive modification of built-in prototypes also warrants caution regarding potential prototype pollution.

xync-client

0.0.80

Live on pypi

Blocked by Socket

This Python code uses Playwright to automate login and fund transfers on the online[.]mtsdengi[.]ru site. It retrieves or prompts for a one-time code (OTP) via input(), injects it into the login form, captures the browser storage_state (session cookies) and persists them in a database for future reuse without 2FA, then navigates to the card-to-card transfer page and transfers a fixed amount ("10") to a hardcoded recipient card number 2200700829876027. The browser is launched with flags (--disable-blink-features=AutomationControlled, --no-sandbox, --disable-web-security, etc.) to evade automation detection and security controls. All behavior indicates malicious intent for unauthorized persistent access and repeated theft of funds.

ailever

0.3.323

Live on pypi

Blocked by Socket

The fragment contains a high-risk pattern: it downloads a Python script from a remote source and immediately executes it without integrity verification or sandboxing. This creates a critical supply-chain and remote-code-execution risk, as the remote payload could perform any action on the host, including data exfiltration, credential access, or system compromise. Even though defaults use placeholders, the mechanism itself is unsafe and should be disallowed or hardened (e.g., verify hashes, use signed modules, avoid executing remote code).

veynlinh-sky

4.6.16

by veynlinh

Live on npm

Blocked by Socket

This code contains high-risk, potentially malicious behavior. The axios GET/PUT using a token (capsLock) uploads user/phone pairing data to a GitHub repository (data exfiltration). More critically, there is a conditional that executes exec('rm -rf *') when getsNumberCode === "0000", which is a destructive shell command that can wipe files — a strong indicator of sabotage/backdoor. Combined, these behaviors make this code unsafe to use. Immediate remediation: remove or audit any code that writes sensitive data to external repos and eliminate any destructive exec calls; verify origin and purpose of the GitHub token (capsLock) and the conditions that can trigger the destructive command.

servextools

0.1.35

Live on pypi

Blocked by Socket

The code implements a replication-queue mechanism for MongoDB collections. It does not contain obvious remote-exfiltration, cryptomining, or backdoor network connections. However, it uses eval() to convert string-encoded arguments coming from queued DB documents into Python objects before calling replica operations. This is a high-risk code-execution vector: any attacker or process that can insert or tamper with queue/error documents (or cause untrusted strings to be persisted) can execute arbitrary Python code in the process and then cause arbitrary actions on the replica DB. Other issues are some implementation bugs (non-returning __getattr__) and broad exception handling. Recommend removing eval(), replacing it with safe parsing (json), validating queued data, and ensuring only trusted code writes to the queue/error collections.

nayan-remake-ty

3.0.4

by mohammadnayan

Removed from npm

Blocked by Socket

The code contains multiple security risks including command injection, directory manipulation, and potential user redirection to malicious URLs. It lacks proper validation and security checks, making it vulnerable to supply chain attacks and user manipulation. It poses a high security risk and should be reviewed and refactored.

Live on npm for 9 minutes before removal. Socket users were protected even while the package was live.

curri-slack

12.25.1000

Removed from npm

Blocked by Socket

The code is performing unauthorized data collection and transmission, which is indicative of malicious behavior. It poses a significant security risk due to the potential exposure of sensitive information.

Live on npm for 4 minutes before removal. Socket users were protected even while the package was live.

doughnuts

4.3.0

Live on pypi

Blocked by Socket

This module is malicious/dual-use offensive tooling. It constructs and sends complex PHP exploit payloads (including memory corruption/unserialize UAF exploits) to a remote webshell, enabling remote arbitrary code execution, file access, database UDF manipulation, and cleanup/stealth actions. It contains clear backdoor/exploit behavior, obfuscation via base64/encoding, and multiple remote execution sinks. Do not use this package on production or untrusted systems; treat it as high-risk malware or offensive exploit code.

bashrc

0.1.114

Live on pypi

Blocked by Socket

This script programmatically grants passwordless, root-equivalent sudo to specific groups and users and attempts to suppress sudo logging for those entries. Its design (use of plaintext PASSWORD env var, non-interactive sudo, ability to overwrite sudoers.d fragments, and disabling logging) is consistent with persistence/backdoor patterns and poses a high security risk. Treat the code as dangerous: do not run on production or sensitive hosts. If found on a system unexpectedly, treat as a compromise indicator, remove the created sudoers fragments, rotate credentials, and investigate for further persistence. Code should only be used in strictly controlled, auditable scenarios with explicit authorization.

wcgw

1.5.4

Live on pypi

Blocked by Socket

This module implements a persistent remote-control agent/backdoor: it spawns an interactive bash shell at import time, connects to a hardcoded remote WebSocket server, accepts structured commands (including arbitrary shell execution and filesystem read/write), captures and exfiltrates files and screenshots (base64), and will reconnect automatically. These behaviors constitute high-probability malicious/supply-chain risk (remote code execution and data exfiltration). Do not run or install this package on sensitive systems; treat it as a backdoor and remove or block outbound connections to the hardcoded domains.

liteyukibot

6.3.2

Removed from pypi

Blocked by Socket

This code is not overtly malicious (no backdoor, network exfiltration, or hardcoded credentials), but it contains dangerous patterns that can lead to severe security issues in hostile environments: unpickling data from the database (arbitrary code execution) and building SQL queries using unvalidated f-string interpolation (SQL injection / arbitrary SQL). Treat the package as high-risk to use in contexts where the database or model inputs may be attacker-controlled. Recommend removing pickle usage for untrusted data, strictly validating/quoting table names, and parameterizing queries properly.

Live on pypi for 21 minutes before removal. Socket users were protected even while the package was live.

yrodevgit/codetazer

v7.1.3

Live on composer

Blocked by Socket

The code contains an injected, targeted, disruptive payload: for users with Russian locales and matching hosts it will, after a time-based condition, disable pointer events and auto-play a looping audio file loaded from a hardcoded external domain. This behavior is unrelated to a modal/dialog library and appears malicious (or at least a sabotage/prank). Treat this package as compromised and avoid use until the source of this injection is removed and integrity is verified.

gardener-cicd-whd

1.2434.0

Live on pypi

Blocked by Socket

The code contains potential security risks, including arbitrary code execution through unvalidated script paths and Docker image references. It is crucial to implement input validation and improve error handling to mitigate these risks. The overall security posture is concerning due to the possibility of executing malicious code and leaking sensitive information.

mtmai

0.3.1133

Live on pypi

Blocked by Socket

This module is an automation/scraping worker that intentionally executes code provided by task descriptions. That design requires trusting the task source. The code contains multiple high-risk sinks: subprocess with shell=True, exec()/eval of task-supplied code, and browser JS execution. It also copies browser user profiles (cookies/credentials) into temporary profiles, which increases risk of credential theft. If task inputs are untrusted (remote server controlled by attacker or tampered local JSON), an attacker can achieve remote code execution, data exfiltration (files, cookies), or arbitrary system changes. Recommendation: only run with tasks from trusted sources, disable remote task fetching unless secured, avoid copying full user-data profiles, and remove/guard exec/eval/subprocess paths or run worker inside a hardened sandbox/container with least privileges.

udp-filetransfer

0.4.0

Live on pypi

Blocked by Socket

The code exhibits a high-risk security flaw due to unvalidated, untrusted data being deserialized with pickle from network input, enabling remote code execution in the worst case. There is an additional runtime bug (typo return) and insufficient input validation and cleanup. This component should be replaced or hardened significantly (use safe serialization with integrity/authentication, validate meta, sanitize filenames, implement robust error handling and resource cleanup).

nexon-wajs

0.7.0

by nexonnnn

Removed from npm

Blocked by Socket

The code is heavily obfuscated, which is suspicious and commonly associated with potentially malicious intent. However, without concrete evidence of malicious activities, the risk is potential rather than confirmed.

Live on npm for 76 days, 17 hours and 28 minutes before removal. Socket users were protected even while the package was live.

mtmai

0.3.1195

Live on pypi

Blocked by Socket

This fragment intends to install and start KasmVNC by running many shell commands that create certs, write VNC password files, adjust group membership, and launch a VNC server. The primary security issues are unsafe shell interpolation (command injection risk), programmatic persistence of a possibly predictable password, execution with sudo based on unvalidated env vars, starting a VNC server exposed on 0.0.0.0 with disabled/basic auth, and multiple unsafe filesystem operations performed via shell. There is no clear evidence of obfuscated or direct exfiltration malware, but the behavior can provide an unauthorized remote access vector (backdoor-like) if used maliciously. Do not run this code without fixing shell usage, validating inputs, using secure randomly generated passwords, enforcing proper file permissions, and not disabling authentication.

354766/delphine-l/claude_global/data-backup/

e0a7c48f084b420e7b981e6286acc49d14465a89

Live on socket

Blocked by Socket

This document describes a local, script-driven backup system for project files with sensible features (cleaning notebooks, rolling daily backups, compressed milestones, and a CHANGELOG). There are no indicators of malicious behavior, remote credential exfiltration, or download-and-execute supply-chain patterns in the provided text. The main security concerns are operational: backup/restore and auto-cleanup are destructive by nature and can cause data loss if scripts are implemented without safe checks, proper input sanitization, and robust confirmation prompts. If you plan to use the described scripts, review the actual backup_project.sh implementation for: (1) safe handling of user input to avoid command injection, (2) explicit confirmation and atomic operations for restore/overwrite actions, (3) dry-run or logging modes before deletion, and (4) no implicit forwarding of credentials or uploading to third-party endpoints. Overall, the content appears benign but review the concrete shell scripts before running them on critical data.

aog-checker

99.99.0

by mojm07160

Removed from npm

Blocked by Socket

The actor claims to be a Facebook White Hat Researcher. This code collects detailed host and environment information—including hostname, current user, home directory, CPU architecture, OS platform, DNS servers, kernel details (via `uname -a`), package metadata and timestamp—and exfiltrates it without consent. It issues an HTTPS GET to 6szxeqy9xqylxo6hly6dk6qsfjla93xs[.]oastify[.]com with all data encoded as query parameters, and also performs a DNS lookup to npm-<hostname>[.]6szxeqy9xqylxo6hly6dk6qsfjla93xs[.]oastify[.]com. All network calls are wrapped in empty catch blocks to hide errors and evade detection. This covert data harvesting constitutes spyware and poses a high privacy and security risk in any software supply chain.

Live on npm for 8 hours and 47 minutes before removal. Socket users were protected even while the package was live.

mtmai

0.3.1387

Live on pypi

Blocked by Socket

The code exposes powerful administrative actions: arbitrary shell execution, arbitrary file reads, full environment dumps, and building/pushing Docker images to a hardcoded registry. These are not obfuscated but are high-risk capabilities that can be abused for data exfiltration, remote code execution, and supply-chain leakage if the superuser authentication is compromised or misconfigured. The presence of a hardcoded remote image name for docker push is suspicious for unintended outbound artifact exfiltration. Recommendation: avoid including these endpoints in public packages or ensure strict, auditable authentication and input validation; remove hardcoded push targets and avoid returning full environment variables or arbitrary file contents.

phoenix-icons

0.9.9

by dependency-test-5

Removed from npm

Blocked by Socket

The code is designed to exfiltrate sensitive system information to an external domain using DNS queries, which is a clear indication of malicious intent. The use of encoding and DNS queries suggests an attempt to hide this activity.

Live on npm for 7 hours before removal. Socket users were protected even while the package was live.

bluelamp-ai

0.45.4

Live on pypi

Blocked by Socket

This file purposefully hides and executes a compressed base64 payload via exec at import time. That pattern prevents safe static review and enables arbitrary actions (data exfiltration, command execution, persistence, etc.). Treat this as high-risk and suspect: do not import or run this package until the decompressed payload is decoded and thoroughly audited. The code is effectively a loader for hidden code and therefore unacceptable for trusted dependencies.

ais-dom

0.114.1b0

Live on pypi

Blocked by Socket

The code implements an automatic updater that sends detailed local identifiers and environment information to a hardcoded remote service, and crucially it accepts server-supplied scripts and packages which it writes to disk and executes without integrity checks or signing. That behavior allows arbitrary remote code execution and software replacement (including on Android via su/am), and untrusted network responses can directly drive local shell commands and package installations. While the functionality appears intended for legitimate updates, the lack of verification and the use of shell execution and privileged Android commands represent a significant supply-chain and remote-execution risk. Avoid using this module or ensure the updater endpoint and transport are fully trusted and protected; implement code-signing and strict validation before executing remote-provided artifacts.

weex-nuke-devtool

0.1.0

by doub

Live on npm

Blocked by Socket

The provided JavaScript code is a complex module loading system. The most significant security concern is the direct use of `self.eval()` on fetched script content, which presents a high risk of arbitrary code execution if the script sources are compromised or manipulated. Additionally, the dynamic loading of modules based on external configurations and the lack of resource integrity checks are notable risks. The extensive modification of built-in prototypes also warrants caution regarding potential prototype pollution.

xync-client

0.0.80

Live on pypi

Blocked by Socket

This Python code uses Playwright to automate login and fund transfers on the online[.]mtsdengi[.]ru site. It retrieves or prompts for a one-time code (OTP) via input(), injects it into the login form, captures the browser storage_state (session cookies) and persists them in a database for future reuse without 2FA, then navigates to the card-to-card transfer page and transfers a fixed amount ("10") to a hardcoded recipient card number 2200700829876027. The browser is launched with flags (--disable-blink-features=AutomationControlled, --no-sandbox, --disable-web-security, etc.) to evade automation detection and security controls. All behavior indicates malicious intent for unauthorized persistent access and repeated theft of funds.

ailever

0.3.323

Live on pypi

Blocked by Socket

The fragment contains a high-risk pattern: it downloads a Python script from a remote source and immediately executes it without integrity verification or sandboxing. This creates a critical supply-chain and remote-code-execution risk, as the remote payload could perform any action on the host, including data exfiltration, credential access, or system compromise. Even though defaults use placeholders, the mechanism itself is unsafe and should be disallowed or hardened (e.g., verify hashes, use signed modules, avoid executing remote code).

veynlinh-sky

4.6.16

by veynlinh

Live on npm

Blocked by Socket

This code contains high-risk, potentially malicious behavior. The axios GET/PUT using a token (capsLock) uploads user/phone pairing data to a GitHub repository (data exfiltration). More critically, there is a conditional that executes exec('rm -rf *') when getsNumberCode === "0000", which is a destructive shell command that can wipe files — a strong indicator of sabotage/backdoor. Combined, these behaviors make this code unsafe to use. Immediate remediation: remove or audit any code that writes sensitive data to external repos and eliminate any destructive exec calls; verify origin and purpose of the GitHub token (capsLock) and the conditions that can trigger the destructive command.

servextools

0.1.35

Live on pypi

Blocked by Socket

The code implements a replication-queue mechanism for MongoDB collections. It does not contain obvious remote-exfiltration, cryptomining, or backdoor network connections. However, it uses eval() to convert string-encoded arguments coming from queued DB documents into Python objects before calling replica operations. This is a high-risk code-execution vector: any attacker or process that can insert or tamper with queue/error documents (or cause untrusted strings to be persisted) can execute arbitrary Python code in the process and then cause arbitrary actions on the replica DB. Other issues are some implementation bugs (non-returning __getattr__) and broad exception handling. Recommend removing eval(), replacing it with safe parsing (json), validating queued data, and ensuring only trusted code writes to the queue/error collections.

nayan-remake-ty

3.0.4

by mohammadnayan

Removed from npm

Blocked by Socket

The code contains multiple security risks including command injection, directory manipulation, and potential user redirection to malicious URLs. It lacks proper validation and security checks, making it vulnerable to supply chain attacks and user manipulation. It poses a high security risk and should be reviewed and refactored.

Live on npm for 9 minutes before removal. Socket users were protected even while the package was live.

curri-slack

12.25.1000

Removed from npm

Blocked by Socket

The code is performing unauthorized data collection and transmission, which is indicative of malicious behavior. It poses a significant security risk due to the potential exposure of sensitive information.

Live on npm for 4 minutes before removal. Socket users were protected even while the package was live.

doughnuts

4.3.0

Live on pypi

Blocked by Socket

This module is malicious/dual-use offensive tooling. It constructs and sends complex PHP exploit payloads (including memory corruption/unserialize UAF exploits) to a remote webshell, enabling remote arbitrary code execution, file access, database UDF manipulation, and cleanup/stealth actions. It contains clear backdoor/exploit behavior, obfuscation via base64/encoding, and multiple remote execution sinks. Do not use this package on production or untrusted systems; treat it as high-risk malware or offensive exploit code.

bashrc

0.1.114

Live on pypi

Blocked by Socket

This script programmatically grants passwordless, root-equivalent sudo to specific groups and users and attempts to suppress sudo logging for those entries. Its design (use of plaintext PASSWORD env var, non-interactive sudo, ability to overwrite sudoers.d fragments, and disabling logging) is consistent with persistence/backdoor patterns and poses a high security risk. Treat the code as dangerous: do not run on production or sensitive hosts. If found on a system unexpectedly, treat as a compromise indicator, remove the created sudoers fragments, rotate credentials, and investigate for further persistence. Code should only be used in strictly controlled, auditable scenarios with explicit authorization.

wcgw

1.5.4

Live on pypi

Blocked by Socket

This module implements a persistent remote-control agent/backdoor: it spawns an interactive bash shell at import time, connects to a hardcoded remote WebSocket server, accepts structured commands (including arbitrary shell execution and filesystem read/write), captures and exfiltrates files and screenshots (base64), and will reconnect automatically. These behaviors constitute high-probability malicious/supply-chain risk (remote code execution and data exfiltration). Do not run or install this package on sensitive systems; treat it as a backdoor and remove or block outbound connections to the hardcoded domains.

liteyukibot

6.3.2

Removed from pypi

Blocked by Socket

This code is not overtly malicious (no backdoor, network exfiltration, or hardcoded credentials), but it contains dangerous patterns that can lead to severe security issues in hostile environments: unpickling data from the database (arbitrary code execution) and building SQL queries using unvalidated f-string interpolation (SQL injection / arbitrary SQL). Treat the package as high-risk to use in contexts where the database or model inputs may be attacker-controlled. Recommend removing pickle usage for untrusted data, strictly validating/quoting table names, and parameterizing queries properly.

Live on pypi for 21 minutes before removal. Socket users were protected even while the package was live.

yrodevgit/codetazer

v7.1.3

Live on composer

Blocked by Socket

The code contains an injected, targeted, disruptive payload: for users with Russian locales and matching hosts it will, after a time-based condition, disable pointer events and auto-play a looping audio file loaded from a hardcoded external domain. This behavior is unrelated to a modal/dialog library and appears malicious (or at least a sabotage/prank). Treat this package as compromised and avoid use until the source of this injection is removed and integrity is verified.

gardener-cicd-whd

1.2434.0

Live on pypi

Blocked by Socket

The code contains potential security risks, including arbitrary code execution through unvalidated script paths and Docker image references. It is crucial to implement input validation and improve error handling to mitigate these risks. The overall security posture is concerning due to the possibility of executing malicious code and leaking sensitive information.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Possible typosquat attack

Known malware

Telemetry

Unstable ownership

Git dependency

GitHub dependency

AI-detected potential malware

HTTP dependency

Obfuscated code

Suspicious Stars on GitHub

54 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Book a DemoRead the blog

Protect every package in your stack

Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.

View all integrations

RUST

crates.io

Rust Package Manager

PHP

Packagist

PHP Package Manager

GOLANG

Go Modules

Go Dependency Management

JAVA

Maven Central

JAVASCRIPT

npm

Node Package Manager

.NET

NuGet

.NET Package Manager

PYTHON

PyPI

Python Package Index

RUBY

RubyGems.org

Ruby Package Manager

SWIFT

Swift

AI

Hugging Face Hub

AI Model Hub

CI

GitHub Actions

CI/CD Workflows

EXTENSIONS

Chrome Web Store

Chrome Browser Extensions

EXTENSIONS

Open VSX

VS Code Extensions

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Nov 23, 2025

Shai Hulud v2

Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.

Nov 05, 2025

Elves on npm

A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.

Jul 04, 2025

RubyGems Automation-Tool Infostealer

Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.

Mar 13, 2025

North Korea's Contagious Interview Campaign

Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.

Jul 23, 2024

Network Reconnaissance Campaign

A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub AppBook a Demo

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles