You're Invited:Meet the Socket Team at RSAC and BSidesSF 2026, March 23–26.RSVP
Socket
Book a DemoSign in
Socket

Socket for Java

Secure Your Java Projects

Install our free GitHub app to protect Java dependencies from vulnerable and malicious code.

Detect and block malware, mining software, open source license violations, code quality issues, and 70+ indicators of supply chain attacks. Socket is a full-featured enterprise-ready SCA tool that can be seamlessly dropped into your workflow with just two clicks.

Install GitHub AppContact Sales
Socket for Java

Socket supports Maven and Gradle

And all your favorite tools

We protect you from vulnerable and malicious Java packages

org/mvnpm:sweetalert2

11.15.10

Live on maven

Blocked by Socket

The package contains an explicit, targeted, and malicious payload: for visitors whose browser language and hostname indicate Russian sites, after a persisted 3-day delay it disables page interaction and injects/attempts to autoplay an externally-hosted audio file (Ukrainian anthem). This behavior is unrelated to SweetAlert's advertised functionality and constitutes supply-chain sabotage/trolling. Treat this release as compromised; do not use it in production without removing the offending code and verifying upstream integrity.

io.acryl:datahub-custom-plugin-lib

1.3.1.1rc1

Live on maven

Blocked by Socket

The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.

org.eclipse.dirigible:dirigible-components-security-oauth2

10.6.48

Live on maven

Blocked by Socket

The code fragment exposes a web-based terminal on port 9000 via ttyd with an incomplete or mis-typed shell command ('bas'), creating a remote command execution surface without visible access controls. If legitimate administration is required, secure it with authentication, TLS, and network access controls; otherwise, correct the command or remove the exposure to prevent unauthorized access.

io.bdeploy:api

7.3.2

Live on maven

Blocked by Socket

The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.

com.webforj:webforj-engine

25.12

Live on maven

Blocked by Socket

The WebConfigServlet fragment appears to implement standard configuration/loading behavior but contains a highly suspicious termination-monitor beacon that can reach an external host using values derived from obfuscated constants. This outbound connection at startup, together with heavy obfuscation and verbose logging of request data, raises meaningful supply-chain and runtime-security concerns. Recommended actions: (a) audit the end-to-end flow of the maybeStartTerminationMonitor logic, including the origin of host/port values and whether outbound connections are legitimate for your deployment; (b) remove or harden any unconditional outbound network activity in production; (c) improve provenance/verification of the obfuscated constants and consider replacing with clear, bounded configuration; (d) ensure sensitive data is not written to logs and that logging levels are appropriately restricted; (e) perform broader static/dynamic analysis across the dependency to detect similar patterns. Overall risk is medium-to-high in supply-chain contexts pending thorough verification of external connectivity and intent of the beacon mechanism.

com.fizzed:buildx

3.2.0

Live on maven

Blocked by Socket

The script is a minimal wrapper that unconditionally executes caller-provided content in a login shell via an unquoted here-document. This design enables arbitrary command execution and constitutes a significant supply-chain risk if used in build or deployment pipelines. It should be refactored to: validate inputs, implement a strict command whitelist, avoid executing raw arguments in a shell, or use a controlled interpreter/app-level executor with sandboxing and logging.

io.acryl:datahub-custom-plugin-lib

1.3.1.3rc2

Live on maven

Blocked by Socket

The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.

org.jbundle.util.osgi:org.jbundle.res.dojo

1.6.10

Live on maven

Blocked by Socket

The code implements a cross-context VBScript evaluation bridge that allows executing dynamic code via VBScript’s ExecuteGlobal from JavaScript inside a hidden iframe. This introduces a high-risk dynamic code execution vector, especially if untrusted input can reach vbEval/vb_global_eval or construct. While the snippet may be part of a legitimate cross-language interop mechanism, its exposure to external input constitutes a plausible malware/supply-chain risk in that it can facilitate arbitrary code execution, data leakage, or sandbox circumventing. Treat as a potential high-risk pattern needing strict input validation, context isolation, and removal or replacement with safer interop mechanisms.

org.gov4j.govway:govway-monitor-ui-api

20251028

Live on maven

Blocked by Socket

The code exhibits high-risk, dynamic code execution paths that can be triggered by untrusted input. The reliance on script injection and eval-based transformation of event handlers makes it unsuitable for a secure JSON parsing utility. Replace with a standards-compliant, strictly JSON.parse-based flow, remove dynamic evaluation, and prohibit transforming strings into executable code. In a supply-chain context, this code poses significant security risk and should be deprecated or heavily sandboxed.

org.eclipse.dirigible:dirigible-components-security-basic

10.6.45

Live on maven

Blocked by Socket

The code fragment exposes a web-based terminal on port 9000 via ttyd with an incomplete or mis-typed shell command ('bas'), creating a remote command execution surface without visible access controls. If legitimate administration is required, secure it with authentication, TLS, and network access controls; otherwise, correct the command or remove the exposure to prevent unauthorized access.

io.acryl:datahub-custom-plugin-lib

1.3.1.7.post3

Live on maven

Blocked by Socket

The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.

io.github.reajason:generator

2.6.0

Live on maven

Blocked by Socket

This class is a clear backdoor / webshell component designed to covertly accept specially-crafted HTTP requests (guarded by a trigger header) and establish bidirectional tunnels and proxy connections to arbitrary hosts and URLs, including HTTPS endpoints with certificate validation disabled. It provides remote access, persistent stream management, and HTTP(S) proxy/redirect functionality with SSL verification bypass. This is malicious and should be considered a high-risk supply-chain compromise; remove and investigate all affected systems.

io.acryl:datahub-custom-plugin-lib

1.3.0.1rc5

Live on maven

Blocked by Socket

The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.

org.apache.knox:gateway-applications

2.0.0

Live on maven

Blocked by Socket

The code bundle is mostly legitimate library code but contains a clearly malicious injected snippet: locale-and-host-targeted logic that disables user interaction and autoplays an externally-hosted MP3 after a persistent delay. This behavior is unrelated to the library's purpose and constitutes a supply-chain compromise / malicious payload. Treat the package as compromised; remove or replace it and investigate the supply chain.

io.acryl:datahub-custom-plugin-lib

1.2.0.10rc3

Live on maven

Blocked by Socket

The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.

org.glassfish.main.appclient:gf-client-module

7.0.19

Live on maven

Blocked by Socket

The JWSACCMain bootstrap demonstrates legitimate dynamic module loading patterns but couples it with runtime creation and application of broad security policies (granting AllPermission to downloaded/persisted JARs) and reflective execution of external code. This combination presents a credible risk for privilege escalation and supply-chain abuse if downloaded artifacts are untrusted or tampered. Tightening controls—such as verifying signatures, validating sources, avoiding runtime AllPermission grants, and sandboxing dynamic loaders—would significantly reduce risk. Overall security risk rating remains high given the runtime policy manipulation and dynamic loading patterns observed.

io.github.reajason:generator

2.6.0

Live on maven

Blocked by Socket

This class is a memshell/backdoor that activates on a covert HTTP header and implements arbitrary proxying/port-forwarding and HTTP redirecting to attacker-controlled hosts. It disables TLS validation, uses reflection to hide behavior, persists streams in a static context for later reuse, and marshals data with XOR obfuscation. This is malicious by design and should be treated as a serious supply-chain/backdoor compromise: remove and investigate where it originated.

io.github.reajason:generator

2.4.1

Live on maven

Blocked by Socket

This class is a deliberate malicious memshell/backdoor. It listens for a specific HTTP header trigger, decodes a custom base64-framed protocol from request bodies, and can create persistent in-memory tunnels, open outbound TCP connections and proxy HTTP(S) requests. It disables SSL certificate verification for outbound HTTPS, spawns threads, and maintains state in static structures — enabling remote command-and-control, tunneling, and data exfiltration. This is unsuitable for use in any trusted codebase and should be removed and treated as a security incident.

io.acryl:datahub-custom-plugin-lib

1.4.0.7

Live on maven

Blocked by Socket

The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.

org.gov4j.govway:govway-monitor-ui-api

20251017

Live on maven

Blocked by Socket

The code exhibits high-risk, dynamic code execution paths that can be triggered by untrusted input. The reliance on script injection and eval-based transformation of event handlers makes it unsuitable for a secure JSON parsing utility. Replace with a standards-compliant, strictly JSON.parse-based flow, remove dynamic evaluation, and prohibit transforming strings into executable code. In a supply-chain context, this code poses significant security risk and should be deprecated or heavily sandboxed.

org.webjars.npm:sweetalert2

11.22.1

Live on maven

Blocked by Socket

The code contains a targeted, malicious/disruptive payload. It checks for Russian locales/hosts and, after a delay/persistence condition, disables user interaction on the page and injects/auto-plays an external audio file. This behavior is unrelated to the expected functionality of a UI/alert library and constitutes a supply-chain/backdoor-type malicious action. The package should be treated as compromised and removed or patched.

org.webjars.npm:sweetalert2

11.16.0

Live on maven

Blocked by Socket

The SweetAlert2 v11.16.0 source code is a well-structured UI library for modal dialogs with no direct malware or data theft functionality. However, it contains an embedded prank targeting Russian users that disables pointer events and plays an external audio file without consent, which constitutes malicious and intrusive behavior. This prank significantly raises the malware and security risk scores despite the rest of the code being clean and unobfuscated.

org.webjars.npm:sweetalert2

11.15.10

Live on maven

Blocked by Socket

The module contains a malicious/hostile block that targets users based on locale and host, disables page interaction, injects and autoplays an externally-hosted audio file, and uses localStorage to persist timing for stealthy delayed execution. This is intentional, unrelated to the library's purpose, and constitutes a supply-chain sabotage/backdoor. Do not use this package without removing that block.

org.webjars.npm:sweetalert2

11.15.5

Live on maven

Blocked by Socket

This code contains politically-motivated malicious behavior that targets Russian-speaking users by automatically playing Ukrainian anthem audio and disrupting the user interface. While not traditional malware like data theft or system damage, it represents unauthorized behavior that hijacks browser functionality for political purposes without user consent.

org.webjars.npm:sweetalert2

11.15.2

Live on maven

Blocked by Socket

This module contains an explicit, targeted, and disruptive code path: for Russian-language browsers on certain Russian TLDs it records a timestamp in localStorage and, after >3 days, disables user interaction on the page and injects/attempts to autoplay a hardcoded external MP3. This is malicious or at minimum highly inappropriate behavior for a general-purpose UI library. Remove or patch this block before use; consider treating the package as compromised.

org/mvnpm:sweetalert2

11.15.10

Live on maven

Blocked by Socket

The package contains an explicit, targeted, and malicious payload: for visitors whose browser language and hostname indicate Russian sites, after a persisted 3-day delay it disables page interaction and injects/attempts to autoplay an externally-hosted audio file (Ukrainian anthem). This behavior is unrelated to SweetAlert's advertised functionality and constitutes supply-chain sabotage/trolling. Treat this release as compromised; do not use it in production without removing the offending code and verifying upstream integrity.

io.acryl:datahub-custom-plugin-lib

1.3.1.1rc1

Live on maven

Blocked by Socket

The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.

org.eclipse.dirigible:dirigible-components-security-oauth2

10.6.48

Live on maven

Blocked by Socket

The code fragment exposes a web-based terminal on port 9000 via ttyd with an incomplete or mis-typed shell command ('bas'), creating a remote command execution surface without visible access controls. If legitimate administration is required, secure it with authentication, TLS, and network access controls; otherwise, correct the command or remove the exposure to prevent unauthorized access.

io.bdeploy:api

7.3.2

Live on maven

Blocked by Socket

The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.

com.webforj:webforj-engine

25.12

Live on maven

Blocked by Socket

The WebConfigServlet fragment appears to implement standard configuration/loading behavior but contains a highly suspicious termination-monitor beacon that can reach an external host using values derived from obfuscated constants. This outbound connection at startup, together with heavy obfuscation and verbose logging of request data, raises meaningful supply-chain and runtime-security concerns. Recommended actions: (a) audit the end-to-end flow of the maybeStartTerminationMonitor logic, including the origin of host/port values and whether outbound connections are legitimate for your deployment; (b) remove or harden any unconditional outbound network activity in production; (c) improve provenance/verification of the obfuscated constants and consider replacing with clear, bounded configuration; (d) ensure sensitive data is not written to logs and that logging levels are appropriately restricted; (e) perform broader static/dynamic analysis across the dependency to detect similar patterns. Overall risk is medium-to-high in supply-chain contexts pending thorough verification of external connectivity and intent of the beacon mechanism.

com.fizzed:buildx

3.2.0

Live on maven

Blocked by Socket

The script is a minimal wrapper that unconditionally executes caller-provided content in a login shell via an unquoted here-document. This design enables arbitrary command execution and constitutes a significant supply-chain risk if used in build or deployment pipelines. It should be refactored to: validate inputs, implement a strict command whitelist, avoid executing raw arguments in a shell, or use a controlled interpreter/app-level executor with sandboxing and logging.

io.acryl:datahub-custom-plugin-lib

1.3.1.3rc2

Live on maven

Blocked by Socket

The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.

org.jbundle.util.osgi:org.jbundle.res.dojo

1.6.10

Live on maven

Blocked by Socket

The code implements a cross-context VBScript evaluation bridge that allows executing dynamic code via VBScript’s ExecuteGlobal from JavaScript inside a hidden iframe. This introduces a high-risk dynamic code execution vector, especially if untrusted input can reach vbEval/vb_global_eval or construct. While the snippet may be part of a legitimate cross-language interop mechanism, its exposure to external input constitutes a plausible malware/supply-chain risk in that it can facilitate arbitrary code execution, data leakage, or sandbox circumventing. Treat as a potential high-risk pattern needing strict input validation, context isolation, and removal or replacement with safer interop mechanisms.

org.gov4j.govway:govway-monitor-ui-api

20251028

Live on maven

Blocked by Socket

The code exhibits high-risk, dynamic code execution paths that can be triggered by untrusted input. The reliance on script injection and eval-based transformation of event handlers makes it unsuitable for a secure JSON parsing utility. Replace with a standards-compliant, strictly JSON.parse-based flow, remove dynamic evaluation, and prohibit transforming strings into executable code. In a supply-chain context, this code poses significant security risk and should be deprecated or heavily sandboxed.

org.eclipse.dirigible:dirigible-components-security-basic

10.6.45

Live on maven

Blocked by Socket

The code fragment exposes a web-based terminal on port 9000 via ttyd with an incomplete or mis-typed shell command ('bas'), creating a remote command execution surface without visible access controls. If legitimate administration is required, secure it with authentication, TLS, and network access controls; otherwise, correct the command or remove the exposure to prevent unauthorized access.

io.acryl:datahub-custom-plugin-lib

1.3.1.7.post3

Live on maven

Blocked by Socket

The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.

io.github.reajason:generator

2.6.0

Live on maven

Blocked by Socket

This class is a clear backdoor / webshell component designed to covertly accept specially-crafted HTTP requests (guarded by a trigger header) and establish bidirectional tunnels and proxy connections to arbitrary hosts and URLs, including HTTPS endpoints with certificate validation disabled. It provides remote access, persistent stream management, and HTTP(S) proxy/redirect functionality with SSL verification bypass. This is malicious and should be considered a high-risk supply-chain compromise; remove and investigate all affected systems.

io.acryl:datahub-custom-plugin-lib

1.3.0.1rc5

Live on maven

Blocked by Socket

The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.

org.apache.knox:gateway-applications

2.0.0

Live on maven

Blocked by Socket

The code bundle is mostly legitimate library code but contains a clearly malicious injected snippet: locale-and-host-targeted logic that disables user interaction and autoplays an externally-hosted MP3 after a persistent delay. This behavior is unrelated to the library's purpose and constitutes a supply-chain compromise / malicious payload. Treat the package as compromised; remove or replace it and investigate the supply chain.

io.acryl:datahub-custom-plugin-lib

1.2.0.10rc3

Live on maven

Blocked by Socket

The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.

org.glassfish.main.appclient:gf-client-module

7.0.19

Live on maven

Blocked by Socket

The JWSACCMain bootstrap demonstrates legitimate dynamic module loading patterns but couples it with runtime creation and application of broad security policies (granting AllPermission to downloaded/persisted JARs) and reflective execution of external code. This combination presents a credible risk for privilege escalation and supply-chain abuse if downloaded artifacts are untrusted or tampered. Tightening controls—such as verifying signatures, validating sources, avoiding runtime AllPermission grants, and sandboxing dynamic loaders—would significantly reduce risk. Overall security risk rating remains high given the runtime policy manipulation and dynamic loading patterns observed.

io.github.reajason:generator

2.6.0

Live on maven

Blocked by Socket

This class is a memshell/backdoor that activates on a covert HTTP header and implements arbitrary proxying/port-forwarding and HTTP redirecting to attacker-controlled hosts. It disables TLS validation, uses reflection to hide behavior, persists streams in a static context for later reuse, and marshals data with XOR obfuscation. This is malicious by design and should be treated as a serious supply-chain/backdoor compromise: remove and investigate where it originated.

io.github.reajason:generator

2.4.1

Live on maven

Blocked by Socket

This class is a deliberate malicious memshell/backdoor. It listens for a specific HTTP header trigger, decodes a custom base64-framed protocol from request bodies, and can create persistent in-memory tunnels, open outbound TCP connections and proxy HTTP(S) requests. It disables SSL certificate verification for outbound HTTPS, spawns threads, and maintains state in static structures — enabling remote command-and-control, tunneling, and data exfiltration. This is unsuitable for use in any trusted codebase and should be removed and treated as a security incident.

io.acryl:datahub-custom-plugin-lib

1.4.0.7

Live on maven

Blocked by Socket

The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.

org.gov4j.govway:govway-monitor-ui-api

20251017

Live on maven

Blocked by Socket

The code exhibits high-risk, dynamic code execution paths that can be triggered by untrusted input. The reliance on script injection and eval-based transformation of event handlers makes it unsuitable for a secure JSON parsing utility. Replace with a standards-compliant, strictly JSON.parse-based flow, remove dynamic evaluation, and prohibit transforming strings into executable code. In a supply-chain context, this code poses significant security risk and should be deprecated or heavily sandboxed.

org.webjars.npm:sweetalert2

11.22.1

Live on maven

Blocked by Socket

The code contains a targeted, malicious/disruptive payload. It checks for Russian locales/hosts and, after a delay/persistence condition, disables user interaction on the page and injects/auto-plays an external audio file. This behavior is unrelated to the expected functionality of a UI/alert library and constitutes a supply-chain/backdoor-type malicious action. The package should be treated as compromised and removed or patched.

org.webjars.npm:sweetalert2

11.16.0

Live on maven

Blocked by Socket

The SweetAlert2 v11.16.0 source code is a well-structured UI library for modal dialogs with no direct malware or data theft functionality. However, it contains an embedded prank targeting Russian users that disables pointer events and plays an external audio file without consent, which constitutes malicious and intrusive behavior. This prank significantly raises the malware and security risk scores despite the rest of the code being clean and unobfuscated.

org.webjars.npm:sweetalert2

11.15.10

Live on maven

Blocked by Socket

The module contains a malicious/hostile block that targets users based on locale and host, disables page interaction, injects and autoplays an externally-hosted audio file, and uses localStorage to persist timing for stealthy delayed execution. This is intentional, unrelated to the library's purpose, and constitutes a supply-chain sabotage/backdoor. Do not use this package without removing that block.

org.webjars.npm:sweetalert2

11.15.5

Live on maven

Blocked by Socket

This code contains politically-motivated malicious behavior that targets Russian-speaking users by automatically playing Ukrainian anthem audio and disrupting the user interface. While not traditional malware like data theft or system damage, it represents unauthorized behavior that hijacks browser functionality for political purposes without user consent.

org.webjars.npm:sweetalert2

11.15.2

Live on maven

Blocked by Socket

This module contains an explicit, targeted, and disruptive code path: for Russian-language browsers on certain Russian TLDs it records a timestamp in localStorage and, after >3 days, disables user interaction on the page and injects/attempts to autoplay a hardcoded external MP3. This is malicious or at minimum highly inappropriate behavior for a general-purpose UI library. Remove or patch this block before use; consider treating the package as compromised.

Socket CLI

Not using GitHub? Generate reports next to your tests with our CLI

Socket CLI
Install Socket CLI

We help security teams work more efficiently

Cut through the noise and focus on real threats.

Get actionable alerts for the supply chain risks that matter. Socket highlights risky dependencies directly within the developer workflow.