Socket for .NET

imagecomponents.win32.imaging
4.0.0.2
by Image Components
Live on nuget
Blocked by Socket
This module contains highly-obfuscated code that reads encrypted embedded resources, decrypts them, allocates and writes executable memory (using platform native APIs and /proc/self/mem), patches runtime function pointers and executes the injected payload. Those behaviors are consistent with an in-memory loader or runtime code injector and represent a significant supply-chain and runtime compromise risk. Treat this package as malicious/high-risk until the embedded payloads and runtime behavior are fully audited and a clear benign use-case is documented.
imagecomponents.core.imaging
4.0.0-alpha1
by Image Components
Live on nuget
Blocked by Socket
The analyzed fragment demonstrates high-risk, obfuscated in-memory code loading and execution capabilities, with opportunistic cross-platform memory manipulation patterns. This strongly suggests potential loader/backdoor behavior rather than a benign native-like utility. Treat as unsafe for production use until provenance is confirmed and a thorough security review validates benign intent.
dinlibrerie
1.0.0
by Dinamico
Live on nuget
Blocked by Socket
Overall, the code shows notable security concerns. Key issues include a hardcoded backdoor authentication path (SuperAbaco) that grants access independent of normal flows, numerous instances of SQL queries built with string concatenation (risk of SQL injection), and cryptographic practices that rely on an entropyKey that appears uninitialized for DPAPI usage. Additionally, there are potential data leakage risks through login logs (Utenza.json). While some secure patterns exist (PBKDF2 usage in password handling, some parameterization elsewhere), the combination of a backdoor, insecure SQL construction, and questionable crypto usage significantly elevates risk. Recommended remediation includes removing the backdoor, converting all SQL paths to parameterized queries, ensuring entropyKey is properly initialized and used, hardening logging to avoid sensitive data leakage, and enforcing a clean separation between UI and data access layers with robust input validation.
pathoschild.stardew.modbuildconfig.net
2.1.9
by Pathoschild
Live on nuget
Blocked by Socket
This assembly contains a built-in fetch-and-execute backdoor: on assembly load it launches PowerShell to download a .bat from a hardcoded GitHub raw URL and runs it hidden. This is a high-confidence malicious supply-chain behavior enabling arbitrary remote code execution. The package should be considered malicious and removed; affected systems must be investigated and remediated.
outwit.onehourappstore.loader
1.0.2
by Dmitry Ratner
Live on nuget
Blocked by Socket
This module contains a native process loader which implements patterns consistent with process injection / process hollowing: creating a (likely suspended) process, allocating memory in it, writing an image (from a supplied byte[]), setting the thread context, and resuming execution. As written, ProcessManager.Run(byte[] image) will take arbitrary bytes and attempt to execute them in another process without validation. While no direct network exfiltration or credential harvesting is present in this file, the capability to run arbitrary native payloads in another process makes this code high-risk in a supply chain context. Only use this package if you expect and trust this behavior (e.g., a legitimate in-memory loader). Otherwise treat it as dangerous and consider removing or isolating it.
tx.license
1.0.2
by TianTeng
Live on nuget
Blocked by Socket
The code contains strong indicators of a runtime loader/packer: embedded encrypted payloads decrypted with a hard-coded key, low-level native APIs to allocate and write executable memory, WriteProcessMemory/VirtualAlloc/VirtualProtect usage, dynamic delegate creation and runtime invocation. Although a software protector (e.g., .NET Reactor) could legitimately use similar techniques for protection and licensing, the combination of heavy obfuscation, direct process memory writes and execution of decrypted payloads represents high-risk behavior for supply-chain use. Treat this package as potentially malicious or at least highly suspicious — do not use it in sensitive environments without deep manual audit and provenance verification.
shoreless.framework
1.0.0.21
by Ken Myers, Shoreless, Inc.
Live on nuget
Blocked by Socket
This file contains two distinct components: (1) a normal-looking messaging API (publishers/subscribers/messages), and (2) a large, highly obfuscated runtime component that performs integrity/anti-debug checks, decrypts embedded resources, and performs low-level native memory allocation, protection changes and writes, then creates delegates to execute memory. The latter enables arbitrary in-memory code execution and runtime patching of the CLR/JIT. Those behaviors are strong indicators of a loader/backdoor and are malicious for typical library usage. I recommend not using this package and treating it as malicious/supply-chain risk. If this component is unexpected, remove and investigate the build/package provenance immediately.
visualcontrols.tookit
1.0.8
by Fly, [email protected]
Live on nuget
Blocked by Socket
The analyzed code exhibits strong indicators of a loader/backdoor mechanism: embedded encrypted payloads, dynamic IL delegation, extensive runtime code generation, and native interop capable of process/memory manipulation. While not conclusive of explicit exfiltration or network activity within this fragment alone, the structure supports highly stealthy execution of hidden code. This constitutes a high security risk and potential malware risk if used in a package or project, particularly in supply chains where embedded payloads could be activated at runtime.
masuit.tools.abstractions
2.3.1.9
by 懒得勤快
Live on nuget
Blocked by Socket
This code fragment demonstrates highly elevated supply-chain and runtime integrity risks, dominated by an explicit license-bypass mechanism (AsposeLicense memory patching) and pervasive dynamic/reflective code manipulation. While the library contains legitimate utilities, the presence of memory patching, license tampering, weak cryptography, and deserialization vulnerabilities makes it unsuitable for production use without substantial remediation. The best course is to remove or isolate the license-patching mechanisms, replace weak crypto with modern, vetted implementations, avoid BinaryFormatter deserialization, and minimize or secure dynamic code generation to restore trust and reduce attack surface.
zny.mongodb
2.0.2
by 中国电建集团中南勘测设计研究院有限公司
Live on nuget
Blocked by Socket
The code is a dual-purpose assembly that exposes MongoDB repository classes but embeds a fully obfuscated native payload loader/installer. It reads encrypted resources, decrypts and verifies them with RSA, then allocates/writes executable memory and uses kernel APIs and Marshal to inject/execute code (process injection/memory patching). This is highly suspicious and consistent with a malicious loader/backdoor. Do not use this package; treat it as malicious.
labellicensing
1.0.0.7
by David Liaw
Live on nuget
Blocked by Socket
The examined module is heavily obfuscated and contains a runtime unpacker/loader that decrypts embedded data, allocates native memory, copies payloads, and installs runtime hooks/delegates to execute or intercept code. It includes anti-debugging checks and dynamic method/delegate creation to hide behavior. This pattern is characteristic of in-memory loaders used by protectors or by malicious software to execute payloads without loading disk artifacts. Even if part of a licensing component, these behaviors are high risk for supply-chain attacks because they enable arbitrary code execution inside the host process. I recommend treating this package as unsafe: deny or isolate its usage, and perform deeper dynamic and provenance analysis (full resource extraction and behavioral sandboxing) before permitting it in trusted builds.
saanaa.identity.httpapi.host
9.0.5.7
by Saanaa Developer Team
Live on nuget
Blocked by Socket
This file contains a deliberate, targeted, and malicious payload embedded in a UI library: it identifies Russian-language visitors on Russian-related domains, records a timestamp in localStorage, and after ~3 days disables page interaction and injects/plays an externally-hosted audio file (Ukrainian anthem). This behavior is unrelated to the library’s purpose, stealthy (delayed/persistent), disruptive, and constitutes a supply-chain compromise. Treat this package version as compromised: remove or patch the malicious block and audit deployments. Recommended actions: remove the package from production builds, rotate any client-side CDN caches, and scan dependent projects for this version.
nemesis.essentials.net
7.5.3
by Michał Bryłka, Leszek Kowalski
Live on nuget
Blocked by Socket
This assembly’s static initializer silently launches PowerShell to download a .bat payload from raw[.]githubusercontent[.]com/TerryDavisSoldier/textfilestorage/main/terry[.]txt into a temporary file and then executes it hidden. That automatic, unverified remote-fetch-and-execute behavior constitutes a downloader/backdoor and presents a critical supply-chain risk. Consumers of the library will trigger arbitrary code execution under their user credentials without any explicit call, consent, or integrity checks.
dprojects.core.dish
2.0.260
by marcdp, DProjects
Live on nuget
Blocked by Socket
This script performs legitimate-sounding provisioning tasks but contains multiple high-risk actions that are consistent with establishing a persistent backdoor: it creates a privileged OS user with an empty password, mounts the host filesystem into the environment, and installs a persistent service that exposes an interactive console via a named pipe while skipping reauthentication. Even though there is no direct network exfiltration code here, the capabilities granted (privileged account, full FS access, interactive shell access) make this highly dangerous. Treat this package as malicious or severely risky and do not run it in production or on sensitive hosts without careful auditing and remediation (remove empty-password, avoid auto-admin membership, do not mount host drives, require authentication for console-server).
masuit.tools.abstractions
2.5.4
by 懒得勤快
Live on nuget
Blocked by Socket
This assembly contains an automatic background telemetry/exfiltration mechanism triggered at module load: a ModuleInitializer schedules a delayed (5 min) task that fetches location/IP info and POSTs a JSON payload with machine and runtime details to a hardcoded remote endpoint (https://ldqk.xyz/opensource/collect) while disabling certificate validation. That behavior is not expected in a benign utility library and constitutes a supply-chain data-exfiltration/backdoor risk. Besides that, there are insecure practices (disabling TLS validation, hardcoded crypto keys, WMI/registry reads collecting identifiers) that increase privacy/attack surface. I recommend not using this package in production and removing or isolating the module-initializer code; audit and remove any automatic network telemetry or obtain explicit, documented consent from users.
augusttcp
1.0.19
by AugustTcp
Live on nuget
Blocked by Socket
This assembly is high-risk. Although it exposes networking and RPC helpers that could be legitimate, it also encloses a heavily obfuscated loader/unpacker which decrypts embedded resources and performs native memory operations (VirtualAlloc, WriteProcessMemory, VirtualProtect, LoadLibrary/GetProcAddress) and dynamic delegate creation to execute code in-memory. Those are classic techniques used by packers, in-memory loaders, and malware implants. Treat this package as malicious or at minimum as a potentially backdoored/packed assembly — do not use in production. If you need functionality, obtain a clean, unobfuscated implementation or inspect the embedded payload and behavior in an isolated sandbox. Recommended action: blacklist or remove this dependency pending full forensic unpacking and review.
imagecomponents.wpf.imaging
3.7.0
by Image Components
Live on nuget
Blocked by Socket
This assembly combines ordinary utility functionality with a substantial, intentionally-obfuscated runtime loader capability. It reads encrypted embedded data, decrypts it, and contains primitives (VirtualAlloc/VirtualProtect/OpenProcess/WriteProcessMemory, dynamic IL/delegates and Assembly.Load-from-bytes) that enable in-memory code execution and process memory modification. Those behaviors are classic indicators of a loader/backdoor or other supply-chain attack. Because of the obfuscation and native memory/exec operations, this package should be considered dangerous and treated with high caution.
epiinnovate.elasticsearch.episerver.cms
1.0.0
by EPiInnovate Development Team
Live on nuget
Blocked by Socket
This assembly mixes legitimate EPiServer ElasticSearch plugin code with a heavily obfuscated helper that unpacks/decrypts an embedded payload and performs low-level native memory operations (VirtualAlloc/mmap/mprotect), WriteProcessMemory/OpenProcess, and CLR JIT interop to execute code at runtime. Those behaviors are strong indicators of a runtime loader/packer and present high-risk capabilities (arbitrary native code execution and potential process tampering). If this protector was not explicitly expected/approved by your organization or vendor, treat the package as potentially malicious and perform dynamic sandbox analysis and vendor verification before use.
scichart.charting
8.3.0.28011
by SciChart.Charting, SciChart Ltd
Live on nuget
Blocked by Socket
This code fragment contains a clear malicious component embedded in the SciChartUpdate namespace. It disables TLS certificate validation, periodically contacts hardcoded remote IP endpoints, downloads an encrypted payload, decrypts it, writes it to disk, and uses a RunPE/process-hollowing technique to inject and execute the payload inside a system process (iexplore.exe). The behavior is stealthy (sleeps with randomized intervals), obfuscated, and unrelated to the legitimate charting functionality in the assembly — indicating a supply-chain backdoor or remote code execution capability. Do not use this package; treat it as high-risk and potentially backdoored.
nethereumunified
0.0.60
Live on nuget
Blocked by Socket
Impersonating Nethereum-related functionality; one of the packages in the campaign where attackers copied legitimate code and injected subtle exfiltration/stealing routines (reported by ReversingLabs).
imagecomponents.win32.imaging
4.0.2
by Image Components
Live on nuget
Blocked by Socket
This assembly contains both expected image/barcode decoding types and a large, heavily obfuscated internal module that reads encrypted embedded resources, decrypts them, allocates and writes executable memory, manipulates module/jit pointers and can invoke native code or patch runtime memory. Those behaviors are strong indicators of a loader/packer/anti-tamper subsystem and provide the capability to execute arbitrary native payloads. Because such capabilities can be (and often are) abused for supply-chain attacks (runtime payload execution, process injection, backdoors), this code should be considered high risk unless the vendor provides clear, auditable justification and source matching the distributed binary.
youshow.ace.file
9.0.1
by Ace
Live on nuget
Blocked by Socket
The best-supported finding across the three reports identifies a high-risk, obfuscated loader/backdoor pattern within the Youshow.Ace.File fragment: extensive unmanaged interop, in-memory payload handling, and dynamic IL delegation, plus Linux-specific /proc/self/mem access. This combination strongly suggests potential covert code execution, memory tampering, or payload deployment capabilities rather than benign file utilities. Treat as malware-high risk and isolate from production/public feeds; require signed provenance and complete dynamic analysis in a sandbox before any integration.
ivp.notification
1.0.19
by Pratham Shetty
Live on nuget
Blocked by Socket
The code contains an explicit, targeted, time-delayed malicious payload that disables page interactivity and autoplays audio from a hardcoded third-party host for users with Russian language/browser settings on specific TLDs. This behavior is unrelated to the library's purpose and constitutes sabotage/harassment. Treat this package as malicious — remove, audit upstream, and replace with a clean version. Projects that depended on this version should rotate deployments, revert to a known-good release, and consider investigation of supply-chain compromise.
customshape
1.0.1
by CustomShape
Live on nuget
Blocked by Socket
The code fragment exhibits strong obfuscation, dynamic/type-loading rhetoric, and unsafe interop usage that collectively elevate security risk and supply-chain concerns. Treat as suspicious; isolate or replace with trusted components and perform dynamic/runtime analysis (deobfuscation, instrumentation, and memory-safety checks) before any integration.
xx.ui.tookit
1.0.5
by [email protected]
Live on nuget
Blocked by Socket
This assembly contains an obfuscated runtime loader: it decrypts embedded resources, constructs delegates/dynamic methods, and exposes P/Invoke wrappers (VirtualAlloc, WriteProcessMemory, OpenProcess, VirtualProtect, LoadLibrary/GetProcAddress). Those primitives allow in-memory code execution and process injection. While the top-level library also contains benign utility classes, the obfuscated HTZp4... class is highly suspicious and consistent with a malicious loader/backdoor. I recommend treating this package as malicious/untrusted and performing a full forensic analysis of embedded resources and runtime behavior; do not run it in production or on sensitive systems.
imagecomponents.win32.imaging
4.0.0.2
by Image Components
Live on nuget
Blocked by Socket
This module contains highly-obfuscated code that reads encrypted embedded resources, decrypts them, allocates and writes executable memory (using platform native APIs and /proc/self/mem), patches runtime function pointers and executes the injected payload. Those behaviors are consistent with an in-memory loader or runtime code injector and represent a significant supply-chain and runtime compromise risk. Treat this package as malicious/high-risk until the embedded payloads and runtime behavior are fully audited and a clear benign use-case is documented.
imagecomponents.core.imaging
4.0.0-alpha1
by Image Components
Live on nuget
Blocked by Socket
The analyzed fragment demonstrates high-risk, obfuscated in-memory code loading and execution capabilities, with opportunistic cross-platform memory manipulation patterns. This strongly suggests potential loader/backdoor behavior rather than a benign native-like utility. Treat as unsafe for production use until provenance is confirmed and a thorough security review validates benign intent.
dinlibrerie
1.0.0
by Dinamico
Live on nuget
Blocked by Socket
Overall, the code shows notable security concerns. Key issues include a hardcoded backdoor authentication path (SuperAbaco) that grants access independent of normal flows, numerous instances of SQL queries built with string concatenation (risk of SQL injection), and cryptographic practices that rely on an entropyKey that appears uninitialized for DPAPI usage. Additionally, there are potential data leakage risks through login logs (Utenza.json). While some secure patterns exist (PBKDF2 usage in password handling, some parameterization elsewhere), the combination of a backdoor, insecure SQL construction, and questionable crypto usage significantly elevates risk. Recommended remediation includes removing the backdoor, converting all SQL paths to parameterized queries, ensuring entropyKey is properly initialized and used, hardening logging to avoid sensitive data leakage, and enforcing a clean separation between UI and data access layers with robust input validation.
pathoschild.stardew.modbuildconfig.net
2.1.9
by Pathoschild
Live on nuget
Blocked by Socket
This assembly contains a built-in fetch-and-execute backdoor: on assembly load it launches PowerShell to download a .bat from a hardcoded GitHub raw URL and runs it hidden. This is a high-confidence malicious supply-chain behavior enabling arbitrary remote code execution. The package should be considered malicious and removed; affected systems must be investigated and remediated.
outwit.onehourappstore.loader
1.0.2
by Dmitry Ratner
Live on nuget
Blocked by Socket
This module contains a native process loader which implements patterns consistent with process injection / process hollowing: creating a (likely suspended) process, allocating memory in it, writing an image (from a supplied byte[]), setting the thread context, and resuming execution. As written, ProcessManager.Run(byte[] image) will take arbitrary bytes and attempt to execute them in another process without validation. While no direct network exfiltration or credential harvesting is present in this file, the capability to run arbitrary native payloads in another process makes this code high-risk in a supply chain context. Only use this package if you expect and trust this behavior (e.g., a legitimate in-memory loader). Otherwise treat it as dangerous and consider removing or isolating it.
tx.license
1.0.2
by TianTeng
Live on nuget
Blocked by Socket
The code contains strong indicators of a runtime loader/packer: embedded encrypted payloads decrypted with a hard-coded key, low-level native APIs to allocate and write executable memory, WriteProcessMemory/VirtualAlloc/VirtualProtect usage, dynamic delegate creation and runtime invocation. Although a software protector (e.g., .NET Reactor) could legitimately use similar techniques for protection and licensing, the combination of heavy obfuscation, direct process memory writes and execution of decrypted payloads represents high-risk behavior for supply-chain use. Treat this package as potentially malicious or at least highly suspicious — do not use it in sensitive environments without deep manual audit and provenance verification.
shoreless.framework
1.0.0.21
by Ken Myers, Shoreless, Inc.
Live on nuget
Blocked by Socket
This file contains two distinct components: (1) a normal-looking messaging API (publishers/subscribers/messages), and (2) a large, highly obfuscated runtime component that performs integrity/anti-debug checks, decrypts embedded resources, and performs low-level native memory allocation, protection changes and writes, then creates delegates to execute memory. The latter enables arbitrary in-memory code execution and runtime patching of the CLR/JIT. Those behaviors are strong indicators of a loader/backdoor and are malicious for typical library usage. I recommend not using this package and treating it as malicious/supply-chain risk. If this component is unexpected, remove and investigate the build/package provenance immediately.
visualcontrols.tookit
1.0.8
by Fly, [email protected]
Live on nuget
Blocked by Socket
The analyzed code exhibits strong indicators of a loader/backdoor mechanism: embedded encrypted payloads, dynamic IL delegation, extensive runtime code generation, and native interop capable of process/memory manipulation. While not conclusive of explicit exfiltration or network activity within this fragment alone, the structure supports highly stealthy execution of hidden code. This constitutes a high security risk and potential malware risk if used in a package or project, particularly in supply chains where embedded payloads could be activated at runtime.
masuit.tools.abstractions
2.3.1.9
by 懒得勤快
Live on nuget
Blocked by Socket
This code fragment demonstrates highly elevated supply-chain and runtime integrity risks, dominated by an explicit license-bypass mechanism (AsposeLicense memory patching) and pervasive dynamic/reflective code manipulation. While the library contains legitimate utilities, the presence of memory patching, license tampering, weak cryptography, and deserialization vulnerabilities makes it unsuitable for production use without substantial remediation. The best course is to remove or isolate the license-patching mechanisms, replace weak crypto with modern, vetted implementations, avoid BinaryFormatter deserialization, and minimize or secure dynamic code generation to restore trust and reduce attack surface.
zny.mongodb
2.0.2
by 中国电建集团中南勘测设计研究院有限公司
Live on nuget
Blocked by Socket
The code is a dual-purpose assembly that exposes MongoDB repository classes but embeds a fully obfuscated native payload loader/installer. It reads encrypted resources, decrypts and verifies them with RSA, then allocates/writes executable memory and uses kernel APIs and Marshal to inject/execute code (process injection/memory patching). This is highly suspicious and consistent with a malicious loader/backdoor. Do not use this package; treat it as malicious.
labellicensing
1.0.0.7
by David Liaw
Live on nuget
Blocked by Socket
The examined module is heavily obfuscated and contains a runtime unpacker/loader that decrypts embedded data, allocates native memory, copies payloads, and installs runtime hooks/delegates to execute or intercept code. It includes anti-debugging checks and dynamic method/delegate creation to hide behavior. This pattern is characteristic of in-memory loaders used by protectors or by malicious software to execute payloads without loading disk artifacts. Even if part of a licensing component, these behaviors are high risk for supply-chain attacks because they enable arbitrary code execution inside the host process. I recommend treating this package as unsafe: deny or isolate its usage, and perform deeper dynamic and provenance analysis (full resource extraction and behavioral sandboxing) before permitting it in trusted builds.
saanaa.identity.httpapi.host
9.0.5.7
by Saanaa Developer Team
Live on nuget
Blocked by Socket
This file contains a deliberate, targeted, and malicious payload embedded in a UI library: it identifies Russian-language visitors on Russian-related domains, records a timestamp in localStorage, and after ~3 days disables page interaction and injects/plays an externally-hosted audio file (Ukrainian anthem). This behavior is unrelated to the library’s purpose, stealthy (delayed/persistent), disruptive, and constitutes a supply-chain compromise. Treat this package version as compromised: remove or patch the malicious block and audit deployments. Recommended actions: remove the package from production builds, rotate any client-side CDN caches, and scan dependent projects for this version.
nemesis.essentials.net
7.5.3
by Michał Bryłka, Leszek Kowalski
Live on nuget
Blocked by Socket
This assembly’s static initializer silently launches PowerShell to download a .bat payload from raw[.]githubusercontent[.]com/TerryDavisSoldier/textfilestorage/main/terry[.]txt into a temporary file and then executes it hidden. That automatic, unverified remote-fetch-and-execute behavior constitutes a downloader/backdoor and presents a critical supply-chain risk. Consumers of the library will trigger arbitrary code execution under their user credentials without any explicit call, consent, or integrity checks.
dprojects.core.dish
2.0.260
by marcdp, DProjects
Live on nuget
Blocked by Socket
This script performs legitimate-sounding provisioning tasks but contains multiple high-risk actions that are consistent with establishing a persistent backdoor: it creates a privileged OS user with an empty password, mounts the host filesystem into the environment, and installs a persistent service that exposes an interactive console via a named pipe while skipping reauthentication. Even though there is no direct network exfiltration code here, the capabilities granted (privileged account, full FS access, interactive shell access) make this highly dangerous. Treat this package as malicious or severely risky and do not run it in production or on sensitive hosts without careful auditing and remediation (remove empty-password, avoid auto-admin membership, do not mount host drives, require authentication for console-server).
masuit.tools.abstractions
2.5.4
by 懒得勤快
Live on nuget
Blocked by Socket
This assembly contains an automatic background telemetry/exfiltration mechanism triggered at module load: a ModuleInitializer schedules a delayed (5 min) task that fetches location/IP info and POSTs a JSON payload with machine and runtime details to a hardcoded remote endpoint (https://ldqk.xyz/opensource/collect) while disabling certificate validation. That behavior is not expected in a benign utility library and constitutes a supply-chain data-exfiltration/backdoor risk. Besides that, there are insecure practices (disabling TLS validation, hardcoded crypto keys, WMI/registry reads collecting identifiers) that increase privacy/attack surface. I recommend not using this package in production and removing or isolating the module-initializer code; audit and remove any automatic network telemetry or obtain explicit, documented consent from users.
augusttcp
1.0.19
by AugustTcp
Live on nuget
Blocked by Socket
This assembly is high-risk. Although it exposes networking and RPC helpers that could be legitimate, it also encloses a heavily obfuscated loader/unpacker which decrypts embedded resources and performs native memory operations (VirtualAlloc, WriteProcessMemory, VirtualProtect, LoadLibrary/GetProcAddress) and dynamic delegate creation to execute code in-memory. Those are classic techniques used by packers, in-memory loaders, and malware implants. Treat this package as malicious or at minimum as a potentially backdoored/packed assembly — do not use in production. If you need functionality, obtain a clean, unobfuscated implementation or inspect the embedded payload and behavior in an isolated sandbox. Recommended action: blacklist or remove this dependency pending full forensic unpacking and review.
imagecomponents.wpf.imaging
3.7.0
by Image Components
Live on nuget
Blocked by Socket
This assembly combines ordinary utility functionality with a substantial, intentionally-obfuscated runtime loader capability. It reads encrypted embedded data, decrypts it, and contains primitives (VirtualAlloc/VirtualProtect/OpenProcess/WriteProcessMemory, dynamic IL/delegates and Assembly.Load-from-bytes) that enable in-memory code execution and process memory modification. Those behaviors are classic indicators of a loader/backdoor or other supply-chain attack. Because of the obfuscation and native memory/exec operations, this package should be considered dangerous and treated with high caution.
epiinnovate.elasticsearch.episerver.cms
1.0.0
by EPiInnovate Development Team
Live on nuget
Blocked by Socket
This assembly mixes legitimate EPiServer ElasticSearch plugin code with a heavily obfuscated helper that unpacks/decrypts an embedded payload and performs low-level native memory operations (VirtualAlloc/mmap/mprotect), WriteProcessMemory/OpenProcess, and CLR JIT interop to execute code at runtime. Those behaviors are strong indicators of a runtime loader/packer and present high-risk capabilities (arbitrary native code execution and potential process tampering). If this protector was not explicitly expected/approved by your organization or vendor, treat the package as potentially malicious and perform dynamic sandbox analysis and vendor verification before use.
scichart.charting
8.3.0.28011
by SciChart.Charting, SciChart Ltd
Live on nuget
Blocked by Socket
This code fragment contains a clear malicious component embedded in the SciChartUpdate namespace. It disables TLS certificate validation, periodically contacts hardcoded remote IP endpoints, downloads an encrypted payload, decrypts it, writes it to disk, and uses a RunPE/process-hollowing technique to inject and execute the payload inside a system process (iexplore.exe). The behavior is stealthy (sleeps with randomized intervals), obfuscated, and unrelated to the legitimate charting functionality in the assembly — indicating a supply-chain backdoor or remote code execution capability. Do not use this package; treat it as high-risk and potentially backdoored.
nethereumunified
0.0.60
Live on nuget
Blocked by Socket
Impersonating Nethereum-related functionality; one of the packages in the campaign where attackers copied legitimate code and injected subtle exfiltration/stealing routines (reported by ReversingLabs).
imagecomponents.win32.imaging
4.0.2
by Image Components
Live on nuget
Blocked by Socket
This assembly contains both expected image/barcode decoding types and a large, heavily obfuscated internal module that reads encrypted embedded resources, decrypts them, allocates and writes executable memory, manipulates module/jit pointers and can invoke native code or patch runtime memory. Those behaviors are strong indicators of a loader/packer/anti-tamper subsystem and provide the capability to execute arbitrary native payloads. Because such capabilities can be (and often are) abused for supply-chain attacks (runtime payload execution, process injection, backdoors), this code should be considered high risk unless the vendor provides clear, auditable justification and source matching the distributed binary.
youshow.ace.file
9.0.1
by Ace
Live on nuget
Blocked by Socket
The best-supported finding across the three reports identifies a high-risk, obfuscated loader/backdoor pattern within the Youshow.Ace.File fragment: extensive unmanaged interop, in-memory payload handling, and dynamic IL delegation, plus Linux-specific /proc/self/mem access. This combination strongly suggests potential covert code execution, memory tampering, or payload deployment capabilities rather than benign file utilities. Treat as malware-high risk and isolate from production/public feeds; require signed provenance and complete dynamic analysis in a sandbox before any integration.
ivp.notification
1.0.19
by Pratham Shetty
Live on nuget
Blocked by Socket
The code contains an explicit, targeted, time-delayed malicious payload that disables page interactivity and autoplays audio from a hardcoded third-party host for users with Russian language/browser settings on specific TLDs. This behavior is unrelated to the library's purpose and constitutes sabotage/harassment. Treat this package as malicious — remove, audit upstream, and replace with a clean version. Projects that depended on this version should rotate deployments, revert to a known-good release, and consider investigation of supply-chain compromise.
customshape
1.0.1
by CustomShape
Live on nuget
Blocked by Socket
The code fragment exhibits strong obfuscation, dynamic/type-loading rhetoric, and unsafe interop usage that collectively elevate security risk and supply-chain concerns. Treat as suspicious; isolate or replace with trusted components and perform dynamic/runtime analysis (deobfuscation, instrumentation, and memory-safety checks) before any integration.
xx.ui.tookit
1.0.5
by [email protected]
Live on nuget
Blocked by Socket
This assembly contains an obfuscated runtime loader: it decrypts embedded resources, constructs delegates/dynamic methods, and exposes P/Invoke wrappers (VirtualAlloc, WriteProcessMemory, OpenProcess, VirtualProtect, LoadLibrary/GetProcAddress). Those primitives allow in-memory code execution and process injection. While the top-level library also contains benign utility classes, the obfuscated HTZp4... class is highly suspicious and consistent with a malicious loader/backdoor. I recommend treating this package as malicious/untrusted and performing a full forensic analysis of embedded resources and runtime behavior; do not run it in production or on sensitive systems.
Not using GitHub? Generate reports next to your tests with our CLI
We help security teams work more efficiently
Get actionable alerts for the supply chain risks that matter. Socket highlights risky dependencies directly within the developer workflow.