You're Invited:Meet the Socket Team at RSAC and BSidesSF 2026, March 23–26.RSVP
Socket
Book a DemoSign in
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub AppBook a Demo

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery
t

timmywil published 4.0.0

left-pad
s

stevemao published 1.3.0

react
r

react-bot published 19.2.4

We protect you from vulnerable and malicious packages

bip-utilss

1.0.0

Live on pypi

Blocked by Socket

This setup.py contains a concealed payload that is decrypted and executed during package installation on Windows. That constitutes high-risk, likely malicious supply-chain behavior (arbitrary code execution in installer context). Do not install this package. Block/remove from package indexes and investigate any systems where it was installed. If analysis is required, decrypt the blob offline using the hardcoded Fernet key in a sandbox and inspect the plaintext thoroughly.

gatecrash

2.999.1

by shreyasc-h01

Removed from npm

Blocked by Socket

The code is extremely dangerous as it collects sensitive system information and sends it to an external server without the user's consent. It should not be used.

Live on npm for 1 hour and 37 minutes before removal. Socket users were protected even while the package was live.

ss-component-new

1.1.953

by leyuntao

Live on npm

Blocked by Socket

This code contains clear malicious or backdoor-like behavior: automated login attempts using hardcoded superadmin credentials (two different long secrets), including a POST to an external plain-HTTP IP address, and storing tokens into sessionStorage. Those behaviors allow silent privileged access (credential-based privilege escalation) and potential exfiltration or remote control via the external endpoint. Treat this package as suspicious and potentially malicious; it should be removed or blocked and investigated further.

@everymatrix/player-account-balance-modal

0.0.311

by raul.vasile

Live on npm

Blocked by Socket

The bundle contains an injected behavior that is unrelated to its stated functionality: it checks the client's timezone against a hardcoded list and, for matching timezones, constructs and displays a political message and automatically opens external URLs (including a Tor onion link and change.org) and shows an alert. This is unexpected, potentially harmful (forced popups/navigation), and constitutes a malicious or unauthorized modification of the package. Do not use this version; investigate source repository, verify integrity (checksums/signatures), and replace with a clean build.

ailever

0.1.72

Live on pypi

Blocked by Socket

The code introduces a high-risk pattern: it downloads and immediately executes arbitrary Python code from a remote repository based on user-supplied input, with no validation, authentication, or sandboxing. This constitutes a severe supply chain and remote code execution risk and should be avoided or restricted with strict whitelisting, integrity checks (e.g., code signing or hash verification), and safe execution environments.

roundcube/roundcubemail

dev-catch-group-syntax

Live on composer

Blocked by Socket

This code is a high-risk privilege-escalation wrapper that can execute a root-owned binary with unvalidated user input. It represents a significant supply-chain security concern and should be removed or heavily audited, with proper controls such as removing SUID, introducing input validation, auditing, and a safe execution model (least privilege, allowlists).

yektadg/medialibrary

3

Live on composer

Blocked by Socket

The SweetAlert2 library code is mostly benign and serves as a UI modal dialog tool. However, it contains a suspicious and potentially malicious snippet that targets Russian users on certain domains to play an unsolicited audio prank, disabling pointer events and potentially disrupting user interaction. This behavior is unexpected and should be considered a moderate security risk and potential malware. The rest of the code shows no signs of malicious intent. The provided reports were invalid and unhelpful. Users should be cautious about this version of the library due to the embedded prank behavior.

atsumic_tools

1.0.0.18

by Takuya Atsumi

Live on nuget

Blocked by Socket

The code is primarily a utility library, but contains an explicit, high-risk destructive routine: standard_tools.suiceder writes and executes a batch file that runs 'rmdir /s /q' against the application's parent directory and a temp directory. That single function makes the package unsafe for supply-chain use. No network exfiltration or obfuscation is present, but the destructive local filesystem operation constitutes malicious behavior (or at least a critical safety hazard). Do not use this package in production; remove or disable the suicider function and audit all filesystem operations before trusting the library.

admin1001

4.3.53

by teseet11111

Removed from npm

Blocked by Socket

High-risk malicious behavior: the package attempts to send local process listings to an external server during installation (data exfiltration/telemetry). This is active network exfiltration and should be treated as malware. Do not install; investigate any systems where this package was installed and block the destination domain.

Live on npm for 1 day, 17 hours and 11 minutes before removal. Socket users were protected even while the package was live.

ss-component-new

1.3.74

Live on npm

Blocked by Socket

This component contains a suspicious external authentication call to a hardcoded numeric IP with embedded 'superadmin' credentials and persists the returned token into sessionStorage. The call masks failures by returning true on exceptions, which can hide errors and make the external step appear successful. These behaviors are consistent with a possible supply-chain backdoor or unauthorized 'call-home' mechanism and represent a significant security risk. Immediate actions: treat this as high priority — audit repository history, remove or isolate the hardcoded external call and credentials, search codebase for other occurrences, and investigate any services at the referenced IP. Also review how 'magicToken' is used elsewhere. If provenance is unknown or untrusted, do not deploy this package.

sh-py

17.29

Live on pypi

Blocked by Socket

This module exhibits numerous malicious and high-risk supply-chain behaviors: self-modification, writing hardcoded credentials to ~/.pypirc, decrypting and executing payloads from disk, deleting files, uploading packages to PyPI, installing third-party packages on demand, and dynamically importing and executing code based on environment input. These patterns indicate intentional unauthorized actions (sabotage, hidden payload execution, or backdoor-like behavior). The package should be treated as malicious and not trusted. Immediate actions: do not run, inspect any systems where it was executed for persistence or deleted files, and treat any PyPI accounts or credentials referenced as compromised.

github.com/BishopFox/sliver

v0.0.0-20200915204034-cb10bc9c2491

Live on go

Blocked by Socket

This source file is a CLI layer for the Sliver implant framework and explicitly builds and saves implant/stager binaries and manages C2/profiles/canaries via RPC. The code itself lacks obfuscation and obvious covert exfiltration, but its purpose is offensive: it enables generation and deployment of payloads that are malicious in many contexts. Notable issues: logic bugs in saveLocation that may cause incorrect path resolution, and insufficient filename/path sanitization when persisting RPC-provided files (risk of path traversal or unintended overwrite). Treat this package as high-risk; include only in authorized testing/red-team environments and audit RPC server trust and filename handling before use.

django-admin-star

1.0.0

Live on pypi

Blocked by Socket

This ACE snippet file is mostly benign static snippet definitions, but it contains a clearly malicious/inappropriate embedded template expression that attempts to execute shell commands (reading /etc/passwd) via system(...). If any consumer evaluates template expressions in snippetText (particularly in privileged or server-side contexts), this will enable local information disclosure and arbitrary command execution. Treat the file as unsafe: remove or sanitize the system(...) invocation, audit any environments that consumed the snippetText, and consider this a supply-chain red flag. For typical browser-only ACE usage the payload is likely inert, but do not assume safety in privileged runtimes.

objection

1.1.9

Live on pypi

Blocked by Socket

This code is a Frida hook that deliberately bypasses biometric authentication by replacing the reply block for LAContext evaluatePolicy:localizedReason:reply: and forcing successful authentication responses. It also leaks localizedReason and status messages via send() to the Frida client. This is an intentional security bypass/sabotage tool. Use of this in production or by an attacker undermines app authentication and is high risk.

ui-cluster-driver-civo

1.0.0

by kaimkamboj

Removed from npm

Blocked by Socket

The code exhibits malicious behavior by collecting and sending sensitive system information to an external server without user consent. This poses a significant security risk and indicates potential data exfiltration.

Live on npm for 5 hours and 20 minutes before removal. Socket users were protected even while the package was live.

openstack-toolbox

1.3

Live on pypi

Blocked by Socket

This module is a standard compiler abstraction used by build systems, but the provided fragment is corrupted/buggy: has_function() writes an invalid C source (large unrelated docstring pasted into the code) and a variable name typo exists (lib_opts vs lib_opt). There is no direct evidence of malicious behavior (network exfiltration, credential theft, shell backdoors) in this file. Primary recommendation: treat the file as corrupted — do not use until fixed; review repository history/commits to detect tampering, run tests, and audit other modules that call spawn/execute/move_file for proper input handling before trusting the package in production.

carbonorm/carbonphp

9.1.3

Live on composer

Blocked by Socket

The dominant security concern is the explicit use of eval on data-derived JSON within CarbonPHP.handlebars, which can enable arbitrary code execution if data is attacker-controlled. Additional concerns include unsanitized dynamic script/template loading and a busy-wait sleep that can degrade performance and potentially expose timing information. Overall risk is high due to the eval pattern and dynamic content loading without strong sanitization.

marinff-test

0.4

Removed from pypi

Blocked by Socket

The code contains a serious security threat in the form of a reverse shell, which allows unauthorized remote access to the system. This is a clear indicator of malicious intent.

Live on pypi for 7 minutes before removal. Socket users were protected even while the package was live.

elf-stats-evergreen-muffin-867

1.0.3

Live on npm

Blocked by Socket

This file implements a straightforward reverse shell/backdoor: it connects to a hardcoded remote IP:port and exposes an interactive /bin/sh over the network. It provides remote arbitrary code execution and data exfiltration capability, contains stealthy failure handling, and lacks any legitimate safeguards. Treat as malicious: do not run, remove from systems, and investigate source/origin and exposure of the host and network.

directlinetoactionsongooglelib

4.0.1

by mohameddiv

Removed from npm

Blocked by Socket

The script is designed to collect and send sensitive information from the user's system to an external server, which is highly malicious and poses a severe security threat.

Live on npm for 3 hours and 17 minutes before removal. Socket users were protected even while the package was live.

arm-portal

99.10.9

by mhj6mdv6

Removed from npm

Blocked by Socket

The code is designed to collect and send sensitive information to a remote server without the user's knowledge or consent. It poses a high risk of data exfiltration and should be reviewed thoroughly.

Live on npm for 2 hours and 23 minutes before removal. Socket users were protected even while the package was live.

354766/zcy22606/codebase-context/codebase-context/

0b77c4fb8181b380f6bf4641997a57cd3d1ea5d6

Live on socket

Blocked by Socket

This Skill is primarily a documentation/config-generator for onboarding repositories to AI coding tools. Functionally it matches its stated purpose, but it increases attack surface in normal operation because it generates executable command templates, permission configs, and offers optional script-based validation. The highest risks are (1) enabling command execution via generated permit-lists/commands and (2) metadata exposure by enumerating sensitive filenames/backups. There is no explicit malicious code or remote exfiltration endpoint in the provided content, so I assess low probability of intentional malware (malware: 0.05) but a moderate operational security risk (securityRisk: 0.55). Recommend strict safeguards: never auto-execute generated validation scripts, review and sanitize any generated command allow-lists before granting agents execution rights, do not back up or copy secret files, and prefer read-only analysis by default.

@nomicsfoundation/hardhat-config

1.2.9

by nomicsfoundation

Live on npm

Blocked by Socket

The code appears to be a cryptocurrency trading library with a suspicious block that encrypts and sends data to a remote server, indicating potential malicious behavior.

simo

2.5.40

Live on pypi

Blocked by Socket

This file implements a high-impact automatic updater that, when enabled by a filesystem flag, will fetch PyPI metadata and, if a newer version exists, automatically install the 'simo' package and run multiple privileged/damaging maintenance commands (migrations, collectstatic, redis-cli flushall, supervisor restart). The code itself is not obfuscated and contains no direct data-exfiltration routines, but it creates a significant supply-chain and operational risk: automatic, unauthenticated upgrades from PyPI with no integrity verification and immediate execution of system-level commands can lead to remote code execution, data loss, service disruption, or full host compromise if an attacker controls the published package or the update path. Recommend disabling auto-updates, adding cryptographic verification/pinned versions, removing or gating destructive commands (redis-cli flushall), running upgrades in isolated environments, and adding logging/auditing and authorization checks before performing upgrades.

bip-utilss

1.0.0

Live on pypi

Blocked by Socket

This setup.py contains a concealed payload that is decrypted and executed during package installation on Windows. That constitutes high-risk, likely malicious supply-chain behavior (arbitrary code execution in installer context). Do not install this package. Block/remove from package indexes and investigate any systems where it was installed. If analysis is required, decrypt the blob offline using the hardcoded Fernet key in a sandbox and inspect the plaintext thoroughly.

gatecrash

2.999.1

by shreyasc-h01

Removed from npm

Blocked by Socket

The code is extremely dangerous as it collects sensitive system information and sends it to an external server without the user's consent. It should not be used.

Live on npm for 1 hour and 37 minutes before removal. Socket users were protected even while the package was live.

ss-component-new

1.1.953

by leyuntao

Live on npm

Blocked by Socket

This code contains clear malicious or backdoor-like behavior: automated login attempts using hardcoded superadmin credentials (two different long secrets), including a POST to an external plain-HTTP IP address, and storing tokens into sessionStorage. Those behaviors allow silent privileged access (credential-based privilege escalation) and potential exfiltration or remote control via the external endpoint. Treat this package as suspicious and potentially malicious; it should be removed or blocked and investigated further.

@everymatrix/player-account-balance-modal

0.0.311

by raul.vasile

Live on npm

Blocked by Socket

The bundle contains an injected behavior that is unrelated to its stated functionality: it checks the client's timezone against a hardcoded list and, for matching timezones, constructs and displays a political message and automatically opens external URLs (including a Tor onion link and change.org) and shows an alert. This is unexpected, potentially harmful (forced popups/navigation), and constitutes a malicious or unauthorized modification of the package. Do not use this version; investigate source repository, verify integrity (checksums/signatures), and replace with a clean build.

ailever

0.1.72

Live on pypi

Blocked by Socket

The code introduces a high-risk pattern: it downloads and immediately executes arbitrary Python code from a remote repository based on user-supplied input, with no validation, authentication, or sandboxing. This constitutes a severe supply chain and remote code execution risk and should be avoided or restricted with strict whitelisting, integrity checks (e.g., code signing or hash verification), and safe execution environments.

roundcube/roundcubemail

dev-catch-group-syntax

Live on composer

Blocked by Socket

This code is a high-risk privilege-escalation wrapper that can execute a root-owned binary with unvalidated user input. It represents a significant supply-chain security concern and should be removed or heavily audited, with proper controls such as removing SUID, introducing input validation, auditing, and a safe execution model (least privilege, allowlists).

yektadg/medialibrary

3

Live on composer

Blocked by Socket

The SweetAlert2 library code is mostly benign and serves as a UI modal dialog tool. However, it contains a suspicious and potentially malicious snippet that targets Russian users on certain domains to play an unsolicited audio prank, disabling pointer events and potentially disrupting user interaction. This behavior is unexpected and should be considered a moderate security risk and potential malware. The rest of the code shows no signs of malicious intent. The provided reports were invalid and unhelpful. Users should be cautious about this version of the library due to the embedded prank behavior.

atsumic_tools

1.0.0.18

by Takuya Atsumi

Live on nuget

Blocked by Socket

The code is primarily a utility library, but contains an explicit, high-risk destructive routine: standard_tools.suiceder writes and executes a batch file that runs 'rmdir /s /q' against the application's parent directory and a temp directory. That single function makes the package unsafe for supply-chain use. No network exfiltration or obfuscation is present, but the destructive local filesystem operation constitutes malicious behavior (or at least a critical safety hazard). Do not use this package in production; remove or disable the suicider function and audit all filesystem operations before trusting the library.

admin1001

4.3.53

by teseet11111

Removed from npm

Blocked by Socket

High-risk malicious behavior: the package attempts to send local process listings to an external server during installation (data exfiltration/telemetry). This is active network exfiltration and should be treated as malware. Do not install; investigate any systems where this package was installed and block the destination domain.

Live on npm for 1 day, 17 hours and 11 minutes before removal. Socket users were protected even while the package was live.

ss-component-new

1.3.74

Live on npm

Blocked by Socket

This component contains a suspicious external authentication call to a hardcoded numeric IP with embedded 'superadmin' credentials and persists the returned token into sessionStorage. The call masks failures by returning true on exceptions, which can hide errors and make the external step appear successful. These behaviors are consistent with a possible supply-chain backdoor or unauthorized 'call-home' mechanism and represent a significant security risk. Immediate actions: treat this as high priority — audit repository history, remove or isolate the hardcoded external call and credentials, search codebase for other occurrences, and investigate any services at the referenced IP. Also review how 'magicToken' is used elsewhere. If provenance is unknown or untrusted, do not deploy this package.

sh-py

17.29

Live on pypi

Blocked by Socket

This module exhibits numerous malicious and high-risk supply-chain behaviors: self-modification, writing hardcoded credentials to ~/.pypirc, decrypting and executing payloads from disk, deleting files, uploading packages to PyPI, installing third-party packages on demand, and dynamically importing and executing code based on environment input. These patterns indicate intentional unauthorized actions (sabotage, hidden payload execution, or backdoor-like behavior). The package should be treated as malicious and not trusted. Immediate actions: do not run, inspect any systems where it was executed for persistence or deleted files, and treat any PyPI accounts or credentials referenced as compromised.

github.com/BishopFox/sliver

v0.0.0-20200915204034-cb10bc9c2491

Live on go

Blocked by Socket

This source file is a CLI layer for the Sliver implant framework and explicitly builds and saves implant/stager binaries and manages C2/profiles/canaries via RPC. The code itself lacks obfuscation and obvious covert exfiltration, but its purpose is offensive: it enables generation and deployment of payloads that are malicious in many contexts. Notable issues: logic bugs in saveLocation that may cause incorrect path resolution, and insufficient filename/path sanitization when persisting RPC-provided files (risk of path traversal or unintended overwrite). Treat this package as high-risk; include only in authorized testing/red-team environments and audit RPC server trust and filename handling before use.

django-admin-star

1.0.0

Live on pypi

Blocked by Socket

This ACE snippet file is mostly benign static snippet definitions, but it contains a clearly malicious/inappropriate embedded template expression that attempts to execute shell commands (reading /etc/passwd) via system(...). If any consumer evaluates template expressions in snippetText (particularly in privileged or server-side contexts), this will enable local information disclosure and arbitrary command execution. Treat the file as unsafe: remove or sanitize the system(...) invocation, audit any environments that consumed the snippetText, and consider this a supply-chain red flag. For typical browser-only ACE usage the payload is likely inert, but do not assume safety in privileged runtimes.

objection

1.1.9

Live on pypi

Blocked by Socket

This code is a Frida hook that deliberately bypasses biometric authentication by replacing the reply block for LAContext evaluatePolicy:localizedReason:reply: and forcing successful authentication responses. It also leaks localizedReason and status messages via send() to the Frida client. This is an intentional security bypass/sabotage tool. Use of this in production or by an attacker undermines app authentication and is high risk.

ui-cluster-driver-civo

1.0.0

by kaimkamboj

Removed from npm

Blocked by Socket

The code exhibits malicious behavior by collecting and sending sensitive system information to an external server without user consent. This poses a significant security risk and indicates potential data exfiltration.

Live on npm for 5 hours and 20 minutes before removal. Socket users were protected even while the package was live.

openstack-toolbox

1.3

Live on pypi

Blocked by Socket

This module is a standard compiler abstraction used by build systems, but the provided fragment is corrupted/buggy: has_function() writes an invalid C source (large unrelated docstring pasted into the code) and a variable name typo exists (lib_opts vs lib_opt). There is no direct evidence of malicious behavior (network exfiltration, credential theft, shell backdoors) in this file. Primary recommendation: treat the file as corrupted — do not use until fixed; review repository history/commits to detect tampering, run tests, and audit other modules that call spawn/execute/move_file for proper input handling before trusting the package in production.

carbonorm/carbonphp

9.1.3

Live on composer

Blocked by Socket

The dominant security concern is the explicit use of eval on data-derived JSON within CarbonPHP.handlebars, which can enable arbitrary code execution if data is attacker-controlled. Additional concerns include unsanitized dynamic script/template loading and a busy-wait sleep that can degrade performance and potentially expose timing information. Overall risk is high due to the eval pattern and dynamic content loading without strong sanitization.

marinff-test

0.4

Removed from pypi

Blocked by Socket

The code contains a serious security threat in the form of a reverse shell, which allows unauthorized remote access to the system. This is a clear indicator of malicious intent.

Live on pypi for 7 minutes before removal. Socket users were protected even while the package was live.

elf-stats-evergreen-muffin-867

1.0.3

Live on npm

Blocked by Socket

This file implements a straightforward reverse shell/backdoor: it connects to a hardcoded remote IP:port and exposes an interactive /bin/sh over the network. It provides remote arbitrary code execution and data exfiltration capability, contains stealthy failure handling, and lacks any legitimate safeguards. Treat as malicious: do not run, remove from systems, and investigate source/origin and exposure of the host and network.

directlinetoactionsongooglelib

4.0.1

by mohameddiv

Removed from npm

Blocked by Socket

The script is designed to collect and send sensitive information from the user's system to an external server, which is highly malicious and poses a severe security threat.

Live on npm for 3 hours and 17 minutes before removal. Socket users were protected even while the package was live.

arm-portal

99.10.9

by mhj6mdv6

Removed from npm

Blocked by Socket

The code is designed to collect and send sensitive information to a remote server without the user's knowledge or consent. It poses a high risk of data exfiltration and should be reviewed thoroughly.

Live on npm for 2 hours and 23 minutes before removal. Socket users were protected even while the package was live.

354766/zcy22606/codebase-context/codebase-context/

0b77c4fb8181b380f6bf4641997a57cd3d1ea5d6

Live on socket

Blocked by Socket

This Skill is primarily a documentation/config-generator for onboarding repositories to AI coding tools. Functionally it matches its stated purpose, but it increases attack surface in normal operation because it generates executable command templates, permission configs, and offers optional script-based validation. The highest risks are (1) enabling command execution via generated permit-lists/commands and (2) metadata exposure by enumerating sensitive filenames/backups. There is no explicit malicious code or remote exfiltration endpoint in the provided content, so I assess low probability of intentional malware (malware: 0.05) but a moderate operational security risk (securityRisk: 0.55). Recommend strict safeguards: never auto-execute generated validation scripts, review and sanitize any generated command allow-lists before granting agents execution rights, do not back up or copy secret files, and prefer read-only analysis by default.

@nomicsfoundation/hardhat-config

1.2.9

by nomicsfoundation

Live on npm

Blocked by Socket

The code appears to be a cryptocurrency trading library with a suspicious block that encrypts and sends data to a remote server, indicating potential malicious behavior.

simo

2.5.40

Live on pypi

Blocked by Socket

This file implements a high-impact automatic updater that, when enabled by a filesystem flag, will fetch PyPI metadata and, if a newer version exists, automatically install the 'simo' package and run multiple privileged/damaging maintenance commands (migrations, collectstatic, redis-cli flushall, supervisor restart). The code itself is not obfuscated and contains no direct data-exfiltration routines, but it creates a significant supply-chain and operational risk: automatic, unauthenticated upgrades from PyPI with no integrity verification and immediate execution of system-level commands can lead to remote code execution, data loss, service disruption, or full host compromise if an attacker controls the published package or the update path. Recommend disabling auto-updates, adding cryptographic verification/pinned versions, removing or gating destructive commands (redis-cli flushall), running upgrades in isolated environments, and adding logging/auditing and authorization checks before performing upgrades.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Possible typosquat attack

Known malware

Telemetry

Unstable ownership

Git dependency

GitHub dependency

AI-detected potential malware

HTTP dependency

Obfuscated code

Suspicious Stars on GitHub

54 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Book a DemoRead the blog

Protect every package in your stack

Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.

View all integrations

RUST

crates.io

Rust Package Manager

PHP

Packagist

PHP Package Manager

GOLANG

Go Modules

Go Dependency Management

JAVA

Maven Central

JAVASCRIPT

npm

Node Package Manager

.NET

NuGet

.NET Package Manager

PYTHON

PyPI

Python Package Index

RUBY

RubyGems.org

Ruby Package Manager

SWIFT

Swift

AI

Hugging Face Hub

AI Model Hub

CI

GitHub Actions

CI/CD Workflows

EXTENSIONS

Chrome Web Store

Chrome Browser Extensions

EXTENSIONS

Open VSX

VS Code Extensions

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Nov 23, 2025

Shai Hulud v2

Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.

Nov 05, 2025

Elves on npm

A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.

Jul 04, 2025

RubyGems Automation-Tool Infostealer

Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.

Mar 13, 2025

North Korea's Contagious Interview Campaign

Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.

Jul 23, 2024

Network Reconnaissance Campaign

A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub AppBook a Demo

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles