
Research
/Security News
CanisterWorm: npm Publisher Compromise Deploys Backdoor Across 29+ Packages
The worm-enabled campaign hit @emilgroup and @teale.io, then used an ICP canister to deliver follow-on payloads.
Quickly evaluate the security and health of any open source package.
voxelbotutils
0.8.3
Live on pypi
Blocked by Socket
The cog exhibits multiple high-risk execution pathways that enable arbitrary code execution, remote control, and dynamic code loading from external sources. The Redis RunRedisEval channel is a primary backdoor-like vector that can bypass owner checks if Redis is compromised. Combined with ev/eval, downloadfile, and shell, this code represents a severe supply-chain/runtime risk and should be removed or heavily sandboxed, with strict access controls and input validation. The syntax issue in export_guild further suggests maintenance fragility and potential exploitation paths. Overall, the package demonstrates malware-like behavior and warrants high security restrictions or complete replacement in any open-source distribution.
354766/openclaw/skills/productivity-helper/
cfc58490ae1ab5b6d90b5917f509cf3f8f233f37
Live on socket
Blocked by Socket
[Skill Scanner] URL pointing to executable file detected All findings: [CRITICAL] command_injection: URL pointing to executable file detected (CI010) [AITech 9.1.4] [CRITICAL] command_injection: URL pointing to executable file detected (CI010) [AITech 9.1.4] [HIGH] supply_chain: URL with free hosting platform or high-abuse TLD detected (SC007) [AITech 9.1.4] [HIGH] supply_chain: URL with free hosting platform or high-abuse TLD detected (SC007) [AITech 9.1.4] [HIGH] supply_chain: URL with free hosting platform or high-abuse TLD detected (SC007) [AITech 9.1.4] [HIGH] command_injection: Multi-step download-and-execute pattern detected (CI007) [AITech 9.1.4] [HIGH] supply_chain: URL with free hosting platform or high-abuse TLD detected (SC007) [AITech 9.1.4] This skill is malicious. It contains explicit credential harvesting, local secret-file reads (SSH private key and AWS credentials), multiple untrusted download-and-execute instructions, dynamic execution (eval), and exfiltration of sensitive data to several suspicious third-party domains using unencrypted channels. The requested capabilities are grossly disproportionate to the stated productivity purpose and match well-known supply-chain and credential-harvesting attack patterns. Do not run or install this skill; treat it as compromised/malicious. LLM verification: This skill is malicious. It contains explicit instructions and code to harvest credentials, read and exfiltrate private keys and cloud credentials, download and execute remote binaries, and send system information to attacker-controlled endpoints over unencrypted channels. It is not coherent with the stated productivity purpose and should be treated as a high-risk supply-chain malware artifact. Do not run or install; remove and block the listed domains and artifacts.
imagecomponents.webcore.ui
4.0.4
by Image Components
Live on nuget
Blocked by Socket
High risk: The code exhibits intentionally obfuscated, loader-like characteristics with capabilities for in-process dynamic code loading, native memory manipulation, and cross-platform (Linux/Windows) interop. While some elements could be legitimate security tooling, the prevailing patterns strongly align with malware-like behavior and supply-chain abuse risks. Recommend excluding or replacing with a transparent, auditable implementation, conducting a full dependency and payload verification, and enforcing strict build-time and run-time checks to prevent hidden code execution in downstream deployments.
steedos-server
2.6.4-beta.14
by steedos-baozhoutao
Live on npm
Blocked by Socket
There is a high-risk credential leakage pattern: client-side code reads authentication-related cookies and transmits them to an external domain via a URL query string during a redirect. This creates a credible risk of token exposure and session hijacking. Remediation should avoid sending tokens in URLs; adopt server-side token exchange, short-lived tokens, or authorization headers with strict origin controls, and remove or minimize sensitive data in client-side redirects. The presence of this pattern warrants a thorough security review of cross-domain integrations and potential refactoring to eliminate credential leakage paths.
sbcli-mig
1.0.424
Live on pypi
Blocked by Socket
The Python module itself is not directly implementing typical malware behaviors, but it creates a high-risk execution surface: it runs local shell scripts (some with sudo) with unvalidated inputs and passes secrets on the command line. The deploy_fdb_from_file_service function contains a command-injection vulnerability (shell=True with joined args) and a coding bug (returncod typo). Recommend: remove shell=True; use argument lists always, avoid passing secrets via argv (use stdin, environment files with proper filesystem permissions, or secured IPC), eliminate unnecessary sudo calls and require callers to provide appropriate privileges if needed, validate/escape inputs (especially file paths), fix the returncod typo, and audit all invoked shell scripts before use. Treat package as risky until mitigations and script audits are performed.
chameleon-system/chameleon-shop
dev-65287-add-Ecommerce-stats-bundle-to-core
Live on composer
Blocked by Socket
The script is a deliberate manipulation of PHP loading mechanics (autoloader removal and require_once stripping). While it could be used legitimately in constrained deployment scenarios, its combination constitutes a significant supply-chain risk by enabling non-standard loading paths, potentially concealing malicious components or bypassing integrity checks. Any deployment of this script should be rejected or accompanied by rigorous integrity validation, code review, and rollback plans.
github.com/cli/cli/v2
v2.0.1-0.20211005122053-50d8f1e09ab6
Live on go
Blocked by Socket
The primary security concern is the hardcoded OAuth client secret, which poses a risk of unauthorized access. The code otherwise follows a standard OAuth flow without any indication of malicious behavior.
mailchat-kit
1.2.4
by clout-team
Removed from npm
Blocked by Socket
This code contains explicit credential handling that extracts a 'token' from document.cookie and sends it to external endpoints (api.clout.one) both as a POST FormData field and as a query parameter on a WebSocket connection. It also uploads user-selected files (or pasted/dragged files) to files.clout.one. Those data-flows represent credential forwarding and potential data exfiltration. If api.clout.one/files.clout.one are not intentionally trusted backends for the host application, this module presents a serious supply-chain/privacy risk and should be treated as malicious or at least highly suspicious. If they are legitimate endpoints the behavior is still privacy-sensitive and should be audited (why token is pulled from cookie rather than using standard auth headers, why rejectUnauthorized is false, etc.).
Live on npm for 4 hours and 20 minutes before removal. Socket users were protected even while the package was live.
@mavogel/cdk-vscode-server
0.0.56
by mavogel
Live on npm
Blocked by Socket
The fragment demonstrates a high-risk pattern: legitimate-looking infrastructure automation interwoven with heavy obfuscation, remote payload fetches, and multiple persistent access surfaces (code-server, nginx). While some parts could be legitimate bootstrap logic, the combination of opaque payloads, diverse external downloads, and potential credential exposure warrants thorough provenance verification, strict control over dynamic code execution, and limited exposure of admin services in production. Treat as high risk until all remote content is verified and authenticated.
@neoxr/wb
6.0.0-rc.28
by neoxr
Live on npm
Blocked by Socket
This module is intentionally obfuscated and constructs code at runtime using an assembled string passed to Function(...). It also embeds names referencing filesystem and local modules and contains many awaited calls and identifiers that appear to be network wrappers. Those are high-risk signs: dynamic code execution + hidden payload + potential filesystem and network activity. Treat the package as malicious or at best extremely suspicious. If this appeared as a dependency in a project, do not run it in production — remove it, perform full deobfuscation in a safe sandbox, and investigate network/file changes. Immediate remediation: isolate any environment that ran this code, rotate secrets, and audit installs for related packages.
xbp
10.15.2
Live on cargo
Blocked by Socket
The download_and_run_binary path enables untrusted remote code execution by downloading and immediately executing binaries without validation or sandboxing. This poses a high risk for supply-chain attacks and host compromise. To reduce risk, constrain or remove this capability, or enforce strict authentication, authorization, integrity verification (hash/signature), content-type checks, sandboxing, and isolation (e.g., run in a restricted container) before any execution. Consider removing /tmp-based persistence for downloaded payloads and using signed, auditable workflows.
stableagents-ai
0.2.2
Live on pypi
Blocked by Socket
This module exposes multiple high-risk capabilities: arbitrary shell execution (subprocess.run with shell=True), process spawning from untrusted input, and unrestricted filesystem modification (create, move, copy, delete) based on user-provided parameters. There are no input validations, privilege checks or limits. I assess this as not clearly malicious by intent (it implements utility functions), but it is easily abuseable and dangerous in contexts where inputs are untrusted. Treat this code as high security risk if incorporated into environments that handle external input or run with elevated privileges.
onairos
4.3.2
Live on npm
Blocked by Socket
The code implements explicit client-side exfiltration of ChatGPT conversations and stored Onairos credentials to a third-party endpoint (https://api2.onairos.uk/chatgpt-sync) via a hidden-form POST in a popup created by a bookmarklet. This is high privacy risk: it transmits potentially sensitive conversation history and a locally-stored JWT to an external service. If the user trusts Onairos and explicitly consents, the behavior may be intended; otherwise treat this as malicious/unsafe. Immediate recommendations: remove hard-coded secrets from source, require clear explicit consent before reading session data or local tokens, and avoid bundling eval-enabled libraries with code that accesses sensitive session credentials. Audit the remote endpoint and operator before using.
robloxextra
0.1
Live on pypi
Blocked by Socket
This fragment implements immediate remote code execution by fetching text from a hardcoded external URL and passing it directly to exec(), creating a high-likelihood supply-chain/backdoor vector. Treat this code as malicious or extremely dangerous: do not import or run it in production. Replace with safe alternatives (no exec on remote content, use signed updates, sandboxing, or fetch only data). If encountered in a dependency, remove or quarantine the package and perform incident response to determine exposure.
@zohodesk/react-cli
0.0.1-beta.80
by vasikaran
Live on npm
Blocked by Socket
This code fragment performs immediate, automatic exfiltration of local repository commit hash and package metadata to a hardcoded external server over plaintext HTTP, triggered on module import. The combination of synchronous shell execution at load time, hardcoded external address, mild URL obfuscation, lack of opt-out/configuration, and throwing on missing changeset are strong indicators of malicious or unauthorized telemetry/backdoor behavior for an open-source dependency. Treat this as high-risk: remove or block the package until its provenance and intent are verified, and investigate any systems that have imported/installed it.
@tiledesk/tiledesk-multi-worker
0.1.20
by eljohnny
Live on npm
Blocked by Socket
The QueueManager contains a high-risk remote code execution sink via dynamic Function execution of untrusted message payloads. This represents a severe supply-chain/runtime security hazard. Additionally, there is a likely bug in listener dispatch and lack of input validation or sandboxing. Immediate mitigations include removing dynamic code execution, validating message schemas, implementing a strict allowlist of executed code paths, sandboxing or abandoning Function-based evaluation, and correcting listener logic. Upgrade plan should replace dynamic execution with predefined, safe handlers and add robust error handling and authentication checks.
bluelamp-ai
1.0.1
Removed from pypi
Blocked by Socket
This file is a loader that deliberately hides its payload using base64 + zlib compression and runs it immediately with exec(). That is an anti-analysis pattern and presents a high risk: the executed code could perform arbitrary and potentially malicious actions with the importing process privileges. Treat this module as untrusted until the embedded payload is decompressed and reviewed in a safe, sandboxed environment. Do not run in production or on systems holding sensitive data without prior inspection and verification.
Live on pypi for 4 days, 1 hour and 19 minutes before removal. Socket users were protected even while the package was live.
kaia-brainbox
0.0.4
Removed from pypi
Blocked by Socket
This code contains high-risk operations: unvalidated filesystem unpickling (pickle.load) and file upload into a path derived from URL components. If an attacker can control the file contents referenced by the self-test path or can exploit the upload path to place files, they can achieve remote code execution or arbitrary file write/read. Recommended actions: avoid pickle for untrusted data (use safe serialization), validate and canonicalize 'decider_name' and 'path' (reject path traversal and unexpected characters), enforce authentication/authorization on these endpoints, restrict upload locations and validate file types/sizes, and stop returning full tracebacks to clients. No obvious obfuscation or explicit hardcoded credentials found.
Live on pypi for 7 hours and 12 minutes before removal. Socket users were protected even while the package was live.
github.com/bishopfox/sliver
v1.4.9-0.20210406091252-1a5335ab9e57
Live on go
Blocked by Socket
This file implements Windows RPC handlers for a remote implant/agent (Sliver) that perform high-risk offensive operations: arbitrary remote command execution, privilege manipulation (impersonation/tokens), process migration and DLL injection, service and registry manipulation, and starting pivot/listener channels. These behaviors are characteristic of a post-exploitation implant and pose a severe supply-chain and operational security risk if included as a dependency. Unless used in an intentional controlled offensive security environment, this package should be considered malicious/risky and avoided.
custodes
0.0.12
Live on pypi
Blocked by Socket
The module implements a high-risk pattern: it auto-downloads a helper executable from an external host (base64-encoded URL), stores it under /tmp, makes it executable, and runs it with a JSON file containing local IP/geolocation and service status. Because the downloaded binary is not validated or sandboxed, this is effectively remote code execution controlled by the remote host and represents a serious supply-chain/backdoor risk. Treat as dangerous until the downloaded artifact and domain provenance are verified.
@usaa-grp-inf-presentation/usaa-tw-base
1.0.1
by rexnet
Live on npm
Blocked by Socket
The code is engaging in potentially malicious behavior by collecting and sending sensitive system information to an external server without user consent.
mtmai
0.3.1006
Live on pypi
Blocked by Socket
This fragment intends to install and start KasmVNC by running many shell commands that create certs, write VNC password files, adjust group membership, and launch a VNC server. The primary security issues are unsafe shell interpolation (command injection risk), programmatic persistence of a possibly predictable password, execution with sudo based on unvalidated env vars, starting a VNC server exposed on 0.0.0.0 with disabled/basic auth, and multiple unsafe filesystem operations performed via shell. There is no clear evidence of obfuscated or direct exfiltration malware, but the behavior can provide an unauthorized remote access vector (backdoor-like) if used maliciously. Do not run this code without fixing shell usage, validating inputs, using secure randomly generated passwords, enforcing proper file permissions, and not disabling authentication.
voxelbotutils
0.8.3
Live on pypi
Blocked by Socket
The cog exhibits multiple high-risk execution pathways that enable arbitrary code execution, remote control, and dynamic code loading from external sources. The Redis RunRedisEval channel is a primary backdoor-like vector that can bypass owner checks if Redis is compromised. Combined with ev/eval, downloadfile, and shell, this code represents a severe supply-chain/runtime risk and should be removed or heavily sandboxed, with strict access controls and input validation. The syntax issue in export_guild further suggests maintenance fragility and potential exploitation paths. Overall, the package demonstrates malware-like behavior and warrants high security restrictions or complete replacement in any open-source distribution.
354766/openclaw/skills/productivity-helper/
cfc58490ae1ab5b6d90b5917f509cf3f8f233f37
Live on socket
Blocked by Socket
[Skill Scanner] URL pointing to executable file detected All findings: [CRITICAL] command_injection: URL pointing to executable file detected (CI010) [AITech 9.1.4] [CRITICAL] command_injection: URL pointing to executable file detected (CI010) [AITech 9.1.4] [HIGH] supply_chain: URL with free hosting platform or high-abuse TLD detected (SC007) [AITech 9.1.4] [HIGH] supply_chain: URL with free hosting platform or high-abuse TLD detected (SC007) [AITech 9.1.4] [HIGH] supply_chain: URL with free hosting platform or high-abuse TLD detected (SC007) [AITech 9.1.4] [HIGH] command_injection: Multi-step download-and-execute pattern detected (CI007) [AITech 9.1.4] [HIGH] supply_chain: URL with free hosting platform or high-abuse TLD detected (SC007) [AITech 9.1.4] This skill is malicious. It contains explicit credential harvesting, local secret-file reads (SSH private key and AWS credentials), multiple untrusted download-and-execute instructions, dynamic execution (eval), and exfiltration of sensitive data to several suspicious third-party domains using unencrypted channels. The requested capabilities are grossly disproportionate to the stated productivity purpose and match well-known supply-chain and credential-harvesting attack patterns. Do not run or install this skill; treat it as compromised/malicious. LLM verification: This skill is malicious. It contains explicit instructions and code to harvest credentials, read and exfiltrate private keys and cloud credentials, download and execute remote binaries, and send system information to attacker-controlled endpoints over unencrypted channels. It is not coherent with the stated productivity purpose and should be treated as a high-risk supply-chain malware artifact. Do not run or install; remove and block the listed domains and artifacts.
imagecomponents.webcore.ui
4.0.4
by Image Components
Live on nuget
Blocked by Socket
High risk: The code exhibits intentionally obfuscated, loader-like characteristics with capabilities for in-process dynamic code loading, native memory manipulation, and cross-platform (Linux/Windows) interop. While some elements could be legitimate security tooling, the prevailing patterns strongly align with malware-like behavior and supply-chain abuse risks. Recommend excluding or replacing with a transparent, auditable implementation, conducting a full dependency and payload verification, and enforcing strict build-time and run-time checks to prevent hidden code execution in downstream deployments.
steedos-server
2.6.4-beta.14
by steedos-baozhoutao
Live on npm
Blocked by Socket
There is a high-risk credential leakage pattern: client-side code reads authentication-related cookies and transmits them to an external domain via a URL query string during a redirect. This creates a credible risk of token exposure and session hijacking. Remediation should avoid sending tokens in URLs; adopt server-side token exchange, short-lived tokens, or authorization headers with strict origin controls, and remove or minimize sensitive data in client-side redirects. The presence of this pattern warrants a thorough security review of cross-domain integrations and potential refactoring to eliminate credential leakage paths.
sbcli-mig
1.0.424
Live on pypi
Blocked by Socket
The Python module itself is not directly implementing typical malware behaviors, but it creates a high-risk execution surface: it runs local shell scripts (some with sudo) with unvalidated inputs and passes secrets on the command line. The deploy_fdb_from_file_service function contains a command-injection vulnerability (shell=True with joined args) and a coding bug (returncod typo). Recommend: remove shell=True; use argument lists always, avoid passing secrets via argv (use stdin, environment files with proper filesystem permissions, or secured IPC), eliminate unnecessary sudo calls and require callers to provide appropriate privileges if needed, validate/escape inputs (especially file paths), fix the returncod typo, and audit all invoked shell scripts before use. Treat package as risky until mitigations and script audits are performed.
chameleon-system/chameleon-shop
dev-65287-add-Ecommerce-stats-bundle-to-core
Live on composer
Blocked by Socket
The script is a deliberate manipulation of PHP loading mechanics (autoloader removal and require_once stripping). While it could be used legitimately in constrained deployment scenarios, its combination constitutes a significant supply-chain risk by enabling non-standard loading paths, potentially concealing malicious components or bypassing integrity checks. Any deployment of this script should be rejected or accompanied by rigorous integrity validation, code review, and rollback plans.
github.com/cli/cli/v2
v2.0.1-0.20211005122053-50d8f1e09ab6
Live on go
Blocked by Socket
The primary security concern is the hardcoded OAuth client secret, which poses a risk of unauthorized access. The code otherwise follows a standard OAuth flow without any indication of malicious behavior.
mailchat-kit
1.2.4
by clout-team
Removed from npm
Blocked by Socket
This code contains explicit credential handling that extracts a 'token' from document.cookie and sends it to external endpoints (api.clout.one) both as a POST FormData field and as a query parameter on a WebSocket connection. It also uploads user-selected files (or pasted/dragged files) to files.clout.one. Those data-flows represent credential forwarding and potential data exfiltration. If api.clout.one/files.clout.one are not intentionally trusted backends for the host application, this module presents a serious supply-chain/privacy risk and should be treated as malicious or at least highly suspicious. If they are legitimate endpoints the behavior is still privacy-sensitive and should be audited (why token is pulled from cookie rather than using standard auth headers, why rejectUnauthorized is false, etc.).
Live on npm for 4 hours and 20 minutes before removal. Socket users were protected even while the package was live.
@mavogel/cdk-vscode-server
0.0.56
by mavogel
Live on npm
Blocked by Socket
The fragment demonstrates a high-risk pattern: legitimate-looking infrastructure automation interwoven with heavy obfuscation, remote payload fetches, and multiple persistent access surfaces (code-server, nginx). While some parts could be legitimate bootstrap logic, the combination of opaque payloads, diverse external downloads, and potential credential exposure warrants thorough provenance verification, strict control over dynamic code execution, and limited exposure of admin services in production. Treat as high risk until all remote content is verified and authenticated.
@neoxr/wb
6.0.0-rc.28
by neoxr
Live on npm
Blocked by Socket
This module is intentionally obfuscated and constructs code at runtime using an assembled string passed to Function(...). It also embeds names referencing filesystem and local modules and contains many awaited calls and identifiers that appear to be network wrappers. Those are high-risk signs: dynamic code execution + hidden payload + potential filesystem and network activity. Treat the package as malicious or at best extremely suspicious. If this appeared as a dependency in a project, do not run it in production — remove it, perform full deobfuscation in a safe sandbox, and investigate network/file changes. Immediate remediation: isolate any environment that ran this code, rotate secrets, and audit installs for related packages.
xbp
10.15.2
Live on cargo
Blocked by Socket
The download_and_run_binary path enables untrusted remote code execution by downloading and immediately executing binaries without validation or sandboxing. This poses a high risk for supply-chain attacks and host compromise. To reduce risk, constrain or remove this capability, or enforce strict authentication, authorization, integrity verification (hash/signature), content-type checks, sandboxing, and isolation (e.g., run in a restricted container) before any execution. Consider removing /tmp-based persistence for downloaded payloads and using signed, auditable workflows.
stableagents-ai
0.2.2
Live on pypi
Blocked by Socket
This module exposes multiple high-risk capabilities: arbitrary shell execution (subprocess.run with shell=True), process spawning from untrusted input, and unrestricted filesystem modification (create, move, copy, delete) based on user-provided parameters. There are no input validations, privilege checks or limits. I assess this as not clearly malicious by intent (it implements utility functions), but it is easily abuseable and dangerous in contexts where inputs are untrusted. Treat this code as high security risk if incorporated into environments that handle external input or run with elevated privileges.
onairos
4.3.2
Live on npm
Blocked by Socket
The code implements explicit client-side exfiltration of ChatGPT conversations and stored Onairos credentials to a third-party endpoint (https://api2.onairos.uk/chatgpt-sync) via a hidden-form POST in a popup created by a bookmarklet. This is high privacy risk: it transmits potentially sensitive conversation history and a locally-stored JWT to an external service. If the user trusts Onairos and explicitly consents, the behavior may be intended; otherwise treat this as malicious/unsafe. Immediate recommendations: remove hard-coded secrets from source, require clear explicit consent before reading session data or local tokens, and avoid bundling eval-enabled libraries with code that accesses sensitive session credentials. Audit the remote endpoint and operator before using.
robloxextra
0.1
Live on pypi
Blocked by Socket
This fragment implements immediate remote code execution by fetching text from a hardcoded external URL and passing it directly to exec(), creating a high-likelihood supply-chain/backdoor vector. Treat this code as malicious or extremely dangerous: do not import or run it in production. Replace with safe alternatives (no exec on remote content, use signed updates, sandboxing, or fetch only data). If encountered in a dependency, remove or quarantine the package and perform incident response to determine exposure.
@zohodesk/react-cli
0.0.1-beta.80
by vasikaran
Live on npm
Blocked by Socket
This code fragment performs immediate, automatic exfiltration of local repository commit hash and package metadata to a hardcoded external server over plaintext HTTP, triggered on module import. The combination of synchronous shell execution at load time, hardcoded external address, mild URL obfuscation, lack of opt-out/configuration, and throwing on missing changeset are strong indicators of malicious or unauthorized telemetry/backdoor behavior for an open-source dependency. Treat this as high-risk: remove or block the package until its provenance and intent are verified, and investigate any systems that have imported/installed it.
@tiledesk/tiledesk-multi-worker
0.1.20
by eljohnny
Live on npm
Blocked by Socket
The QueueManager contains a high-risk remote code execution sink via dynamic Function execution of untrusted message payloads. This represents a severe supply-chain/runtime security hazard. Additionally, there is a likely bug in listener dispatch and lack of input validation or sandboxing. Immediate mitigations include removing dynamic code execution, validating message schemas, implementing a strict allowlist of executed code paths, sandboxing or abandoning Function-based evaluation, and correcting listener logic. Upgrade plan should replace dynamic execution with predefined, safe handlers and add robust error handling and authentication checks.
bluelamp-ai
1.0.1
Removed from pypi
Blocked by Socket
This file is a loader that deliberately hides its payload using base64 + zlib compression and runs it immediately with exec(). That is an anti-analysis pattern and presents a high risk: the executed code could perform arbitrary and potentially malicious actions with the importing process privileges. Treat this module as untrusted until the embedded payload is decompressed and reviewed in a safe, sandboxed environment. Do not run in production or on systems holding sensitive data without prior inspection and verification.
Live on pypi for 4 days, 1 hour and 19 minutes before removal. Socket users were protected even while the package was live.
kaia-brainbox
0.0.4
Removed from pypi
Blocked by Socket
This code contains high-risk operations: unvalidated filesystem unpickling (pickle.load) and file upload into a path derived from URL components. If an attacker can control the file contents referenced by the self-test path or can exploit the upload path to place files, they can achieve remote code execution or arbitrary file write/read. Recommended actions: avoid pickle for untrusted data (use safe serialization), validate and canonicalize 'decider_name' and 'path' (reject path traversal and unexpected characters), enforce authentication/authorization on these endpoints, restrict upload locations and validate file types/sizes, and stop returning full tracebacks to clients. No obvious obfuscation or explicit hardcoded credentials found.
Live on pypi for 7 hours and 12 minutes before removal. Socket users were protected even while the package was live.
github.com/bishopfox/sliver
v1.4.9-0.20210406091252-1a5335ab9e57
Live on go
Blocked by Socket
This file implements Windows RPC handlers for a remote implant/agent (Sliver) that perform high-risk offensive operations: arbitrary remote command execution, privilege manipulation (impersonation/tokens), process migration and DLL injection, service and registry manipulation, and starting pivot/listener channels. These behaviors are characteristic of a post-exploitation implant and pose a severe supply-chain and operational security risk if included as a dependency. Unless used in an intentional controlled offensive security environment, this package should be considered malicious/risky and avoided.
custodes
0.0.12
Live on pypi
Blocked by Socket
The module implements a high-risk pattern: it auto-downloads a helper executable from an external host (base64-encoded URL), stores it under /tmp, makes it executable, and runs it with a JSON file containing local IP/geolocation and service status. Because the downloaded binary is not validated or sandboxed, this is effectively remote code execution controlled by the remote host and represents a serious supply-chain/backdoor risk. Treat as dangerous until the downloaded artifact and domain provenance are verified.
@usaa-grp-inf-presentation/usaa-tw-base
1.0.1
by rexnet
Live on npm
Blocked by Socket
The code is engaging in potentially malicious behavior by collecting and sending sensitive system information to an external server without user consent.
mtmai
0.3.1006
Live on pypi
Blocked by Socket
This fragment intends to install and start KasmVNC by running many shell commands that create certs, write VNC password files, adjust group membership, and launch a VNC server. The primary security issues are unsafe shell interpolation (command injection risk), programmatic persistence of a possibly predictable password, execution with sudo based on unvalidated env vars, starting a VNC server exposed on 0.0.0.0 with disabled/basic auth, and multiple unsafe filesystem operations performed via shell. There is no clear evidence of obfuscated or direct exfiltration malware, but the behavior can provide an unauthorized remote access vector (backdoor-like) if used maliciously. Do not run this code without fixing shell usage, validating inputs, using secure randomly generated passwords, enforcing proper file permissions, and not disabling authentication.
Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.
Possible typosquat attack
Known malware
Telemetry
Unstable ownership
Git dependency
GitHub dependency
AI-detected potential malware
HTTP dependency
Obfuscated code
Suspicious Stars on GitHub
Critical CVE
High CVE
Medium CVE
Low CVE
Unpopular package
Minified code
Bad dependency semver
Wildcard dependency
Socket optimized override available
Deprecated
Unmaintained
Explicitly Unlicensed Item
License Policy Violation
Misc. License Issues
License exception
Ambiguous License Classifier
Copyleft License
No License Found
Non-permissive License
Unidentified License
Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.
Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Nat Friedman
CEO at GitHub

Suz Hinton
Senior Software Engineer at Stripe
heck yes this is awesome!!! Congrats team 🎉👏

Matteo Collina
Node.js maintainer, Fastify lead maintainer
So awesome to see @SocketSecurity launch with a fresh approach! Excited to have supported the team from the early days.

DC Posch
Director of Technology at AppFolio, CTO at Dynasty
This is going to be super important, especially for crypto projects where a compromised dependency results in stolen user assets.

Luis Naranjo
Software Engineer at Microsoft
If software supply chain attacks through npm don't scare the shit out of you, you're not paying close enough attention.
@SocketSecurity sounds like an awesome product. I'll be using socket.dev instead of npmjs.org to browse npm packages going forward

Elena Nadolinski
Founder and CEO at Iron Fish
Huge congrats to @SocketSecurity! 🙌
Literally the only product that proactively detects signs of JS compromised packages.

Joe Previte
Engineering Team Lead at Coder
Congrats to @feross and the @SocketSecurity team on their seed funding! 🚀 It's been a big help for us at @CoderHQ and we appreciate what y'all are doing!

Josh Goldberg
Staff Developer at Codecademy
This is such a great idea & looks fantastic, congrats & good luck @feross + team!
The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Scott Roberts
CISO at UiPath
As a happy Socket customer, I've been impressed with how quickly they are adding value to the product, this move is a great step!

Yan Zhu
Head of Security at Brave, DEFCON, EFF, W3C
glad to hear some of the smartest people i know are working on (npm, etc.) supply chain security finally :). @SocketSecurity

Andrew Peterson
CEO and Co-Founder at Signal Sciences (acq. Fastly)
How do you track the validity of open source software libraries as they get updated? You're prob not. Check out @SocketSecurity and the updated tooling they launched.
Supply chain is a cluster in security as we all know and the tools from Socket are "duh" type tools to be implementing. Check them out and follow Feross Aboukhadijeh to see more updates coming from them in the future.

Zbyszek Tenerowicz
Senior Security Engineer at ConsenSys
socket.dev is getting more appealing by the hour

Devdatta Akhawe
Head of Security at Figma
The @SocketSecurity team is on fire! Amazing progress and I am exciting to see where they go next.

Sebastian Bensusan
Engineer Manager at Stripe
I find it surprising that we don't have _more_ supply chain attacks in software:
Imagine your airplane (the code running) was assembled (deployed) daily, with parts (dependencies) from internet strangers. How long until you get a bad part?
Excited for Socket to prevent this

Adam Baldwin
VP of Security at npm, Red Team at Auth0/Okta
Congrats to everyone at @SocketSecurity ❤️🤘🏻

Nico Waisman
CISO at Lyft
This is an area that I have personally been very focused on. As Nat Friedman said in the 2019 GitHub Universe keynote, Open Source won, and every time you add a new open source project you rely on someone else code and you rely on the people that build it.
This is both exciting and problematic. You are bringing real risk into your organization, and I'm excited to see progress in the industry from OpenSSF scorecards and package analyzers to the company that Feross Aboukhadijeh is building!
Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.
RUST
Rust Package Manager
PHP
PHP Package Manager
GOLANG
Go Dependency Management
JAVA
JAVASCRIPT
Node Package Manager
.NET
.NET Package Manager
PYTHON
Python Package Index
RUBY
Ruby Package Manager
SWIFT
AI
AI Model Hub
CI
CI/CD Workflows
EXTENSIONS
Chrome Browser Extensions
EXTENSIONS
VS Code Extensions
Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.
Nov 23, 2025
Shai Hulud v2
Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.
Nov 05, 2025
Elves on npm
A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.
Jul 04, 2025
RubyGems Automation-Tool Infostealer
Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.
Mar 13, 2025
North Korea's Contagious Interview Campaign
Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.
Jul 23, 2024
Network Reconnaissance Campaign
A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.
Get our latest security research, open source insights, and product updates.

Research
/Security News
The worm-enabled campaign hit @emilgroup and @teale.io, then used an ICP canister to deliver follow-on payloads.

Research
/Security News
Attackers compromised Trivy GitHub Actions by force-updating tags to deliver malware, exposing CI/CD secrets across affected pipelines.

Security News
ENISA’s new package manager advisory outlines the dependency security practices companies will need to demonstrate as the EU’s Cyber Resilience Act begins enforcing software supply chain requirements.