Socket for Java

org/mvnpm:sweetalert2
11.15.10
Live on maven
Blocked by Socket
The package contains an explicit, targeted, and malicious payload: for visitors whose browser language and hostname indicate Russian sites, after a persisted 3-day delay it disables page interaction and injects/attempts to autoplay an externally-hosted audio file (Ukrainian anthem). This behavior is unrelated to SweetAlert's advertised functionality and constitutes supply-chain sabotage/trolling. Treat this release as compromised; do not use it in production without removing the offending code and verifying upstream integrity.
io.acryl:datahub-custom-plugin-lib
1.3.1.1rc1
Live on maven
Blocked by Socket
The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.
org.eclipse.dirigible:dirigible-components-security-oauth2
10.6.48
Live on maven
Blocked by Socket
The code fragment exposes a web-based terminal on port 9000 via ttyd with an incomplete or mis-typed shell command ('bas'), creating a remote command execution surface without visible access controls. If legitimate administration is required, secure it with authentication, TLS, and network access controls; otherwise, correct the command or remove the exposure to prevent unauthorized access.
io.bdeploy:api
7.3.2
Live on maven
Blocked by Socket
The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.
com.webforj:webforj-engine
25.12
Live on maven
Blocked by Socket
The WebConfigServlet fragment appears to implement standard configuration/loading behavior but contains a highly suspicious termination-monitor beacon that can reach an external host using values derived from obfuscated constants. This outbound connection at startup, together with heavy obfuscation and verbose logging of request data, raises meaningful supply-chain and runtime-security concerns. Recommended actions: (a) audit the end-to-end flow of the maybeStartTerminationMonitor logic, including the origin of host/port values and whether outbound connections are legitimate for your deployment; (b) remove or harden any unconditional outbound network activity in production; (c) improve provenance/verification of the obfuscated constants and consider replacing with clear, bounded configuration; (d) ensure sensitive data is not written to logs and that logging levels are appropriately restricted; (e) perform broader static/dynamic analysis across the dependency to detect similar patterns. Overall risk is medium-to-high in supply-chain contexts pending thorough verification of external connectivity and intent of the beacon mechanism.
com.fizzed:buildx
3.2.0
Live on maven
Blocked by Socket
The script is a minimal wrapper that unconditionally executes caller-provided content in a login shell via an unquoted here-document. This design enables arbitrary command execution and constitutes a significant supply-chain risk if used in build or deployment pipelines. It should be refactored to: validate inputs, implement a strict command whitelist, avoid executing raw arguments in a shell, or use a controlled interpreter/app-level executor with sandboxing and logging.
io.acryl:datahub-custom-plugin-lib
1.3.1.3rc2
Live on maven
Blocked by Socket
The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.
org.jbundle.util.osgi:org.jbundle.res.dojo
1.6.10
Live on maven
Blocked by Socket
The code implements a cross-context VBScript evaluation bridge that allows executing dynamic code via VBScript’s ExecuteGlobal from JavaScript inside a hidden iframe. This introduces a high-risk dynamic code execution vector, especially if untrusted input can reach vbEval/vb_global_eval or construct. While the snippet may be part of a legitimate cross-language interop mechanism, its exposure to external input constitutes a plausible malware/supply-chain risk in that it can facilitate arbitrary code execution, data leakage, or sandbox circumventing. Treat as a potential high-risk pattern needing strict input validation, context isolation, and removal or replacement with safer interop mechanisms.
org.gov4j.govway:govway-monitor-ui-api
20251028
Live on maven
Blocked by Socket
The code exhibits high-risk, dynamic code execution paths that can be triggered by untrusted input. The reliance on script injection and eval-based transformation of event handlers makes it unsuitable for a secure JSON parsing utility. Replace with a standards-compliant, strictly JSON.parse-based flow, remove dynamic evaluation, and prohibit transforming strings into executable code. In a supply-chain context, this code poses significant security risk and should be deprecated or heavily sandboxed.
org.eclipse.dirigible:dirigible-components-security-basic
10.6.45
Live on maven
Blocked by Socket
The code fragment exposes a web-based terminal on port 9000 via ttyd with an incomplete or mis-typed shell command ('bas'), creating a remote command execution surface without visible access controls. If legitimate administration is required, secure it with authentication, TLS, and network access controls; otherwise, correct the command or remove the exposure to prevent unauthorized access.
io.acryl:datahub-custom-plugin-lib
1.3.1.7.post3
Live on maven
Blocked by Socket
The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.
io.github.reajason:generator
2.6.0
Live on maven
Blocked by Socket
This class is a clear backdoor / webshell component designed to covertly accept specially-crafted HTTP requests (guarded by a trigger header) and establish bidirectional tunnels and proxy connections to arbitrary hosts and URLs, including HTTPS endpoints with certificate validation disabled. It provides remote access, persistent stream management, and HTTP(S) proxy/redirect functionality with SSL verification bypass. This is malicious and should be considered a high-risk supply-chain compromise; remove and investigate all affected systems.
io.acryl:datahub-custom-plugin-lib
1.3.0.1rc5
Live on maven
Blocked by Socket
The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.
org.apache.knox:gateway-applications
2.0.0
Live on maven
Blocked by Socket
The code bundle is mostly legitimate library code but contains a clearly malicious injected snippet: locale-and-host-targeted logic that disables user interaction and autoplays an externally-hosted MP3 after a persistent delay. This behavior is unrelated to the library's purpose and constitutes a supply-chain compromise / malicious payload. Treat the package as compromised; remove or replace it and investigate the supply chain.
io.acryl:datahub-custom-plugin-lib
1.2.0.10rc3
Live on maven
Blocked by Socket
The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.
org.glassfish.main.appclient:gf-client-module
7.0.19
Live on maven
Blocked by Socket
The JWSACCMain bootstrap demonstrates legitimate dynamic module loading patterns but couples it with runtime creation and application of broad security policies (granting AllPermission to downloaded/persisted JARs) and reflective execution of external code. This combination presents a credible risk for privilege escalation and supply-chain abuse if downloaded artifacts are untrusted or tampered. Tightening controls—such as verifying signatures, validating sources, avoiding runtime AllPermission grants, and sandboxing dynamic loaders—would significantly reduce risk. Overall security risk rating remains high given the runtime policy manipulation and dynamic loading patterns observed.
io.github.reajason:generator
2.6.0
Live on maven
Blocked by Socket
This class is a memshell/backdoor that activates on a covert HTTP header and implements arbitrary proxying/port-forwarding and HTTP redirecting to attacker-controlled hosts. It disables TLS validation, uses reflection to hide behavior, persists streams in a static context for later reuse, and marshals data with XOR obfuscation. This is malicious by design and should be treated as a serious supply-chain/backdoor compromise: remove and investigate where it originated.
io.github.reajason:generator
2.4.1
Live on maven
Blocked by Socket
This class is a deliberate malicious memshell/backdoor. It listens for a specific HTTP header trigger, decodes a custom base64-framed protocol from request bodies, and can create persistent in-memory tunnels, open outbound TCP connections and proxy HTTP(S) requests. It disables SSL certificate verification for outbound HTTPS, spawns threads, and maintains state in static structures — enabling remote command-and-control, tunneling, and data exfiltration. This is unsuitable for use in any trusted codebase and should be removed and treated as a security incident.
io.acryl:datahub-custom-plugin-lib
1.4.0.7
Live on maven
Blocked by Socket
The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.
org.gov4j.govway:govway-monitor-ui-api
20251017
Live on maven
Blocked by Socket
The code exhibits high-risk, dynamic code execution paths that can be triggered by untrusted input. The reliance on script injection and eval-based transformation of event handlers makes it unsuitable for a secure JSON parsing utility. Replace with a standards-compliant, strictly JSON.parse-based flow, remove dynamic evaluation, and prohibit transforming strings into executable code. In a supply-chain context, this code poses significant security risk and should be deprecated or heavily sandboxed.
org.webjars.npm:sweetalert2
11.22.1
Live on maven
Blocked by Socket
The code contains a targeted, malicious/disruptive payload. It checks for Russian locales/hosts and, after a delay/persistence condition, disables user interaction on the page and injects/auto-plays an external audio file. This behavior is unrelated to the expected functionality of a UI/alert library and constitutes a supply-chain/backdoor-type malicious action. The package should be treated as compromised and removed or patched.
org.webjars.npm:sweetalert2
11.16.0
Live on maven
Blocked by Socket
The SweetAlert2 v11.16.0 source code is a well-structured UI library for modal dialogs with no direct malware or data theft functionality. However, it contains an embedded prank targeting Russian users that disables pointer events and plays an external audio file without consent, which constitutes malicious and intrusive behavior. This prank significantly raises the malware and security risk scores despite the rest of the code being clean and unobfuscated.
org.webjars.npm:sweetalert2
11.15.10
Live on maven
Blocked by Socket
The module contains a malicious/hostile block that targets users based on locale and host, disables page interaction, injects and autoplays an externally-hosted audio file, and uses localStorage to persist timing for stealthy delayed execution. This is intentional, unrelated to the library's purpose, and constitutes a supply-chain sabotage/backdoor. Do not use this package without removing that block.
org.webjars.npm:sweetalert2
11.15.5
Live on maven
Blocked by Socket
This code contains politically-motivated malicious behavior that targets Russian-speaking users by automatically playing Ukrainian anthem audio and disrupting the user interface. While not traditional malware like data theft or system damage, it represents unauthorized behavior that hijacks browser functionality for political purposes without user consent.
org.webjars.npm:sweetalert2
11.15.2
Live on maven
Blocked by Socket
This module contains an explicit, targeted, and disruptive code path: for Russian-language browsers on certain Russian TLDs it records a timestamp in localStorage and, after >3 days, disables user interaction on the page and injects/attempts to autoplay a hardcoded external MP3. This is malicious or at minimum highly inappropriate behavior for a general-purpose UI library. Remove or patch this block before use; consider treating the package as compromised.
org/mvnpm:sweetalert2
11.15.10
Live on maven
Blocked by Socket
The package contains an explicit, targeted, and malicious payload: for visitors whose browser language and hostname indicate Russian sites, after a persisted 3-day delay it disables page interaction and injects/attempts to autoplay an externally-hosted audio file (Ukrainian anthem). This behavior is unrelated to SweetAlert's advertised functionality and constitutes supply-chain sabotage/trolling. Treat this release as compromised; do not use it in production without removing the offending code and verifying upstream integrity.
io.acryl:datahub-custom-plugin-lib
1.3.1.1rc1
Live on maven
Blocked by Socket
The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.
org.eclipse.dirigible:dirigible-components-security-oauth2
10.6.48
Live on maven
Blocked by Socket
The code fragment exposes a web-based terminal on port 9000 via ttyd with an incomplete or mis-typed shell command ('bas'), creating a remote command execution surface without visible access controls. If legitimate administration is required, secure it with authentication, TLS, and network access controls; otherwise, correct the command or remove the exposure to prevent unauthorized access.
io.bdeploy:api
7.3.2
Live on maven
Blocked by Socket
The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.
com.webforj:webforj-engine
25.12
Live on maven
Blocked by Socket
The WebConfigServlet fragment appears to implement standard configuration/loading behavior but contains a highly suspicious termination-monitor beacon that can reach an external host using values derived from obfuscated constants. This outbound connection at startup, together with heavy obfuscation and verbose logging of request data, raises meaningful supply-chain and runtime-security concerns. Recommended actions: (a) audit the end-to-end flow of the maybeStartTerminationMonitor logic, including the origin of host/port values and whether outbound connections are legitimate for your deployment; (b) remove or harden any unconditional outbound network activity in production; (c) improve provenance/verification of the obfuscated constants and consider replacing with clear, bounded configuration; (d) ensure sensitive data is not written to logs and that logging levels are appropriately restricted; (e) perform broader static/dynamic analysis across the dependency to detect similar patterns. Overall risk is medium-to-high in supply-chain contexts pending thorough verification of external connectivity and intent of the beacon mechanism.
com.fizzed:buildx
3.2.0
Live on maven
Blocked by Socket
The script is a minimal wrapper that unconditionally executes caller-provided content in a login shell via an unquoted here-document. This design enables arbitrary command execution and constitutes a significant supply-chain risk if used in build or deployment pipelines. It should be refactored to: validate inputs, implement a strict command whitelist, avoid executing raw arguments in a shell, or use a controlled interpreter/app-level executor with sandboxing and logging.
io.acryl:datahub-custom-plugin-lib
1.3.1.3rc2
Live on maven
Blocked by Socket
The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.
org.jbundle.util.osgi:org.jbundle.res.dojo
1.6.10
Live on maven
Blocked by Socket
The code implements a cross-context VBScript evaluation bridge that allows executing dynamic code via VBScript’s ExecuteGlobal from JavaScript inside a hidden iframe. This introduces a high-risk dynamic code execution vector, especially if untrusted input can reach vbEval/vb_global_eval or construct. While the snippet may be part of a legitimate cross-language interop mechanism, its exposure to external input constitutes a plausible malware/supply-chain risk in that it can facilitate arbitrary code execution, data leakage, or sandbox circumventing. Treat as a potential high-risk pattern needing strict input validation, context isolation, and removal or replacement with safer interop mechanisms.
org.gov4j.govway:govway-monitor-ui-api
20251028
Live on maven
Blocked by Socket
The code exhibits high-risk, dynamic code execution paths that can be triggered by untrusted input. The reliance on script injection and eval-based transformation of event handlers makes it unsuitable for a secure JSON parsing utility. Replace with a standards-compliant, strictly JSON.parse-based flow, remove dynamic evaluation, and prohibit transforming strings into executable code. In a supply-chain context, this code poses significant security risk and should be deprecated or heavily sandboxed.
org.eclipse.dirigible:dirigible-components-security-basic
10.6.45
Live on maven
Blocked by Socket
The code fragment exposes a web-based terminal on port 9000 via ttyd with an incomplete or mis-typed shell command ('bas'), creating a remote command execution surface without visible access controls. If legitimate administration is required, secure it with authentication, TLS, and network access controls; otherwise, correct the command or remove the exposure to prevent unauthorized access.
io.acryl:datahub-custom-plugin-lib
1.3.1.7.post3
Live on maven
Blocked by Socket
The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.
io.github.reajason:generator
2.6.0
Live on maven
Blocked by Socket
This class is a clear backdoor / webshell component designed to covertly accept specially-crafted HTTP requests (guarded by a trigger header) and establish bidirectional tunnels and proxy connections to arbitrary hosts and URLs, including HTTPS endpoints with certificate validation disabled. It provides remote access, persistent stream management, and HTTP(S) proxy/redirect functionality with SSL verification bypass. This is malicious and should be considered a high-risk supply-chain compromise; remove and investigate all affected systems.
io.acryl:datahub-custom-plugin-lib
1.3.0.1rc5
Live on maven
Blocked by Socket
The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.
org.apache.knox:gateway-applications
2.0.0
Live on maven
Blocked by Socket
The code bundle is mostly legitimate library code but contains a clearly malicious injected snippet: locale-and-host-targeted logic that disables user interaction and autoplays an externally-hosted MP3 after a persistent delay. This behavior is unrelated to the library's purpose and constitutes a supply-chain compromise / malicious payload. Treat the package as compromised; remove or replace it and investigate the supply chain.
io.acryl:datahub-custom-plugin-lib
1.2.0.10rc3
Live on maven
Blocked by Socket
The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.
org.glassfish.main.appclient:gf-client-module
7.0.19
Live on maven
Blocked by Socket
The JWSACCMain bootstrap demonstrates legitimate dynamic module loading patterns but couples it with runtime creation and application of broad security policies (granting AllPermission to downloaded/persisted JARs) and reflective execution of external code. This combination presents a credible risk for privilege escalation and supply-chain abuse if downloaded artifacts are untrusted or tampered. Tightening controls—such as verifying signatures, validating sources, avoiding runtime AllPermission grants, and sandboxing dynamic loaders—would significantly reduce risk. Overall security risk rating remains high given the runtime policy manipulation and dynamic loading patterns observed.
io.github.reajason:generator
2.6.0
Live on maven
Blocked by Socket
This class is a memshell/backdoor that activates on a covert HTTP header and implements arbitrary proxying/port-forwarding and HTTP redirecting to attacker-controlled hosts. It disables TLS validation, uses reflection to hide behavior, persists streams in a static context for later reuse, and marshals data with XOR obfuscation. This is malicious by design and should be treated as a serious supply-chain/backdoor compromise: remove and investigate where it originated.
io.github.reajason:generator
2.4.1
Live on maven
Blocked by Socket
This class is a deliberate malicious memshell/backdoor. It listens for a specific HTTP header trigger, decodes a custom base64-framed protocol from request bodies, and can create persistent in-memory tunnels, open outbound TCP connections and proxy HTTP(S) requests. It disables SSL certificate verification for outbound HTTPS, spawns threads, and maintains state in static structures — enabling remote command-and-control, tunneling, and data exfiltration. This is unsuitable for use in any trusted codebase and should be removed and treated as a security incident.
io.acryl:datahub-custom-plugin-lib
1.4.0.7
Live on maven
Blocked by Socket
The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.
org.gov4j.govway:govway-monitor-ui-api
20251017
Live on maven
Blocked by Socket
The code exhibits high-risk, dynamic code execution paths that can be triggered by untrusted input. The reliance on script injection and eval-based transformation of event handlers makes it unsuitable for a secure JSON parsing utility. Replace with a standards-compliant, strictly JSON.parse-based flow, remove dynamic evaluation, and prohibit transforming strings into executable code. In a supply-chain context, this code poses significant security risk and should be deprecated or heavily sandboxed.
org.webjars.npm:sweetalert2
11.22.1
Live on maven
Blocked by Socket
The code contains a targeted, malicious/disruptive payload. It checks for Russian locales/hosts and, after a delay/persistence condition, disables user interaction on the page and injects/auto-plays an external audio file. This behavior is unrelated to the expected functionality of a UI/alert library and constitutes a supply-chain/backdoor-type malicious action. The package should be treated as compromised and removed or patched.
org.webjars.npm:sweetalert2
11.16.0
Live on maven
Blocked by Socket
The SweetAlert2 v11.16.0 source code is a well-structured UI library for modal dialogs with no direct malware or data theft functionality. However, it contains an embedded prank targeting Russian users that disables pointer events and plays an external audio file without consent, which constitutes malicious and intrusive behavior. This prank significantly raises the malware and security risk scores despite the rest of the code being clean and unobfuscated.
org.webjars.npm:sweetalert2
11.15.10
Live on maven
Blocked by Socket
The module contains a malicious/hostile block that targets users based on locale and host, disables page interaction, injects and autoplays an externally-hosted audio file, and uses localStorage to persist timing for stealthy delayed execution. This is intentional, unrelated to the library's purpose, and constitutes a supply-chain sabotage/backdoor. Do not use this package without removing that block.
org.webjars.npm:sweetalert2
11.15.5
Live on maven
Blocked by Socket
This code contains politically-motivated malicious behavior that targets Russian-speaking users by automatically playing Ukrainian anthem audio and disrupting the user interface. While not traditional malware like data theft or system damage, it represents unauthorized behavior that hijacks browser functionality for political purposes without user consent.
org.webjars.npm:sweetalert2
11.15.2
Live on maven
Blocked by Socket
This module contains an explicit, targeted, and disruptive code path: for Russian-language browsers on certain Russian TLDs it records a timestamp in localStorage and, after >3 days, disables user interaction on the page and injects/attempts to autoplay a hardcoded external MP3. This is malicious or at minimum highly inappropriate behavior for a general-purpose UI library. Remove or patch this block before use; consider treating the package as compromised.
Not using GitHub? Generate reports next to your tests with our CLI
We help security teams work more efficiently
Get actionable alerts for the supply chain risks that matter. Socket highlights risky dependencies directly within the developer workflow.