
Research
/Security News
CanisterWorm: npm Publisher Compromise Deploys Backdoor Across 29+ Packages
The worm-enabled campaign hit @emilgroup and @teale.io, then used an ICP canister to deliver follow-on payloads.
Quickly evaluate the security and health of any open source package.
bip-utilss
1.0.0
Live on pypi
Blocked by Socket
This setup.py contains a concealed payload that is decrypted and executed during package installation on Windows. That constitutes high-risk, likely malicious supply-chain behavior (arbitrary code execution in installer context). Do not install this package. Block/remove from package indexes and investigate any systems where it was installed. If analysis is required, decrypt the blob offline using the hardcoded Fernet key in a sandbox and inspect the plaintext thoroughly.
gatecrash
2.999.1
by shreyasc-h01
Removed from npm
Blocked by Socket
The code is extremely dangerous as it collects sensitive system information and sends it to an external server without the user's consent. It should not be used.
Live on npm for 1 hour and 37 minutes before removal. Socket users were protected even while the package was live.
ss-component-new
1.1.953
by leyuntao
Live on npm
Blocked by Socket
This code contains clear malicious or backdoor-like behavior: automated login attempts using hardcoded superadmin credentials (two different long secrets), including a POST to an external plain-HTTP IP address, and storing tokens into sessionStorage. Those behaviors allow silent privileged access (credential-based privilege escalation) and potential exfiltration or remote control via the external endpoint. Treat this package as suspicious and potentially malicious; it should be removed or blocked and investigated further.
@everymatrix/player-account-balance-modal
0.0.311
by raul.vasile
Live on npm
Blocked by Socket
The bundle contains an injected behavior that is unrelated to its stated functionality: it checks the client's timezone against a hardcoded list and, for matching timezones, constructs and displays a political message and automatically opens external URLs (including a Tor onion link and change.org) and shows an alert. This is unexpected, potentially harmful (forced popups/navigation), and constitutes a malicious or unauthorized modification of the package. Do not use this version; investigate source repository, verify integrity (checksums/signatures), and replace with a clean build.
ailever
0.1.72
Live on pypi
Blocked by Socket
The code introduces a high-risk pattern: it downloads and immediately executes arbitrary Python code from a remote repository based on user-supplied input, with no validation, authentication, or sandboxing. This constitutes a severe supply chain and remote code execution risk and should be avoided or restricted with strict whitelisting, integrity checks (e.g., code signing or hash verification), and safe execution environments.
roundcube/roundcubemail
dev-catch-group-syntax
Live on composer
Blocked by Socket
This code is a high-risk privilege-escalation wrapper that can execute a root-owned binary with unvalidated user input. It represents a significant supply-chain security concern and should be removed or heavily audited, with proper controls such as removing SUID, introducing input validation, auditing, and a safe execution model (least privilege, allowlists).
yektadg/medialibrary
3
Live on composer
Blocked by Socket
The SweetAlert2 library code is mostly benign and serves as a UI modal dialog tool. However, it contains a suspicious and potentially malicious snippet that targets Russian users on certain domains to play an unsolicited audio prank, disabling pointer events and potentially disrupting user interaction. This behavior is unexpected and should be considered a moderate security risk and potential malware. The rest of the code shows no signs of malicious intent. The provided reports were invalid and unhelpful. Users should be cautious about this version of the library due to the embedded prank behavior.
atsumic_tools
1.0.0.18
by Takuya Atsumi
Live on nuget
Blocked by Socket
The code is primarily a utility library, but contains an explicit, high-risk destructive routine: standard_tools.suiceder writes and executes a batch file that runs 'rmdir /s /q' against the application's parent directory and a temp directory. That single function makes the package unsafe for supply-chain use. No network exfiltration or obfuscation is present, but the destructive local filesystem operation constitutes malicious behavior (or at least a critical safety hazard). Do not use this package in production; remove or disable the suicider function and audit all filesystem operations before trusting the library.
admin1001
4.3.53
by teseet11111
Removed from npm
Blocked by Socket
High-risk malicious behavior: the package attempts to send local process listings to an external server during installation (data exfiltration/telemetry). This is active network exfiltration and should be treated as malware. Do not install; investigate any systems where this package was installed and block the destination domain.
Live on npm for 1 day, 17 hours and 11 minutes before removal. Socket users were protected even while the package was live.
ss-component-new
1.3.74
Live on npm
Blocked by Socket
This component contains a suspicious external authentication call to a hardcoded numeric IP with embedded 'superadmin' credentials and persists the returned token into sessionStorage. The call masks failures by returning true on exceptions, which can hide errors and make the external step appear successful. These behaviors are consistent with a possible supply-chain backdoor or unauthorized 'call-home' mechanism and represent a significant security risk. Immediate actions: treat this as high priority — audit repository history, remove or isolate the hardcoded external call and credentials, search codebase for other occurrences, and investigate any services at the referenced IP. Also review how 'magicToken' is used elsewhere. If provenance is unknown or untrusted, do not deploy this package.
sh-py
17.29
Live on pypi
Blocked by Socket
This module exhibits numerous malicious and high-risk supply-chain behaviors: self-modification, writing hardcoded credentials to ~/.pypirc, decrypting and executing payloads from disk, deleting files, uploading packages to PyPI, installing third-party packages on demand, and dynamically importing and executing code based on environment input. These patterns indicate intentional unauthorized actions (sabotage, hidden payload execution, or backdoor-like behavior). The package should be treated as malicious and not trusted. Immediate actions: do not run, inspect any systems where it was executed for persistence or deleted files, and treat any PyPI accounts or credentials referenced as compromised.
github.com/BishopFox/sliver
v0.0.0-20200915204034-cb10bc9c2491
Live on go
Blocked by Socket
This source file is a CLI layer for the Sliver implant framework and explicitly builds and saves implant/stager binaries and manages C2/profiles/canaries via RPC. The code itself lacks obfuscation and obvious covert exfiltration, but its purpose is offensive: it enables generation and deployment of payloads that are malicious in many contexts. Notable issues: logic bugs in saveLocation that may cause incorrect path resolution, and insufficient filename/path sanitization when persisting RPC-provided files (risk of path traversal or unintended overwrite). Treat this package as high-risk; include only in authorized testing/red-team environments and audit RPC server trust and filename handling before use.
django-admin-star
1.0.0
Live on pypi
Blocked by Socket
This ACE snippet file is mostly benign static snippet definitions, but it contains a clearly malicious/inappropriate embedded template expression that attempts to execute shell commands (reading /etc/passwd) via system(...). If any consumer evaluates template expressions in snippetText (particularly in privileged or server-side contexts), this will enable local information disclosure and arbitrary command execution. Treat the file as unsafe: remove or sanitize the system(...) invocation, audit any environments that consumed the snippetText, and consider this a supply-chain red flag. For typical browser-only ACE usage the payload is likely inert, but do not assume safety in privileged runtimes.
objection
1.1.9
Live on pypi
Blocked by Socket
This code is a Frida hook that deliberately bypasses biometric authentication by replacing the reply block for LAContext evaluatePolicy:localizedReason:reply: and forcing successful authentication responses. It also leaks localizedReason and status messages via send() to the Frida client. This is an intentional security bypass/sabotage tool. Use of this in production or by an attacker undermines app authentication and is high risk.
ui-cluster-driver-civo
1.0.0
by kaimkamboj
Removed from npm
Blocked by Socket
The code exhibits malicious behavior by collecting and sending sensitive system information to an external server without user consent. This poses a significant security risk and indicates potential data exfiltration.
Live on npm for 5 hours and 20 minutes before removal. Socket users were protected even while the package was live.
openstack-toolbox
1.3
Live on pypi
Blocked by Socket
This module is a standard compiler abstraction used by build systems, but the provided fragment is corrupted/buggy: has_function() writes an invalid C source (large unrelated docstring pasted into the code) and a variable name typo exists (lib_opts vs lib_opt). There is no direct evidence of malicious behavior (network exfiltration, credential theft, shell backdoors) in this file. Primary recommendation: treat the file as corrupted — do not use until fixed; review repository history/commits to detect tampering, run tests, and audit other modules that call spawn/execute/move_file for proper input handling before trusting the package in production.
carbonorm/carbonphp
9.1.3
Live on composer
Blocked by Socket
The dominant security concern is the explicit use of eval on data-derived JSON within CarbonPHP.handlebars, which can enable arbitrary code execution if data is attacker-controlled. Additional concerns include unsanitized dynamic script/template loading and a busy-wait sleep that can degrade performance and potentially expose timing information. Overall risk is high due to the eval pattern and dynamic content loading without strong sanitization.
marinff-test
0.4
Removed from pypi
Blocked by Socket
The code contains a serious security threat in the form of a reverse shell, which allows unauthorized remote access to the system. This is a clear indicator of malicious intent.
Live on pypi for 7 minutes before removal. Socket users were protected even while the package was live.
elf-stats-evergreen-muffin-867
1.0.3
Live on npm
Blocked by Socket
This file implements a straightforward reverse shell/backdoor: it connects to a hardcoded remote IP:port and exposes an interactive /bin/sh over the network. It provides remote arbitrary code execution and data exfiltration capability, contains stealthy failure handling, and lacks any legitimate safeguards. Treat as malicious: do not run, remove from systems, and investigate source/origin and exposure of the host and network.
directlinetoactionsongooglelib
4.0.1
by mohameddiv
Removed from npm
Blocked by Socket
The script is designed to collect and send sensitive information from the user's system to an external server, which is highly malicious and poses a severe security threat.
Live on npm for 3 hours and 17 minutes before removal. Socket users were protected even while the package was live.
arm-portal
99.10.9
by mhj6mdv6
Removed from npm
Blocked by Socket
The code is designed to collect and send sensitive information to a remote server without the user's knowledge or consent. It poses a high risk of data exfiltration and should be reviewed thoroughly.
Live on npm for 2 hours and 23 minutes before removal. Socket users were protected even while the package was live.
354766/zcy22606/codebase-context/codebase-context/
0b77c4fb8181b380f6bf4641997a57cd3d1ea5d6
Live on socket
Blocked by Socket
This Skill is primarily a documentation/config-generator for onboarding repositories to AI coding tools. Functionally it matches its stated purpose, but it increases attack surface in normal operation because it generates executable command templates, permission configs, and offers optional script-based validation. The highest risks are (1) enabling command execution via generated permit-lists/commands and (2) metadata exposure by enumerating sensitive filenames/backups. There is no explicit malicious code or remote exfiltration endpoint in the provided content, so I assess low probability of intentional malware (malware: 0.05) but a moderate operational security risk (securityRisk: 0.55). Recommend strict safeguards: never auto-execute generated validation scripts, review and sanitize any generated command allow-lists before granting agents execution rights, do not back up or copy secret files, and prefer read-only analysis by default.
@nomicsfoundation/hardhat-config
1.2.9
by nomicsfoundation
Live on npm
Blocked by Socket
The code appears to be a cryptocurrency trading library with a suspicious block that encrypts and sends data to a remote server, indicating potential malicious behavior.
simo
2.5.40
Live on pypi
Blocked by Socket
This file implements a high-impact automatic updater that, when enabled by a filesystem flag, will fetch PyPI metadata and, if a newer version exists, automatically install the 'simo' package and run multiple privileged/damaging maintenance commands (migrations, collectstatic, redis-cli flushall, supervisor restart). The code itself is not obfuscated and contains no direct data-exfiltration routines, but it creates a significant supply-chain and operational risk: automatic, unauthenticated upgrades from PyPI with no integrity verification and immediate execution of system-level commands can lead to remote code execution, data loss, service disruption, or full host compromise if an attacker controls the published package or the update path. Recommend disabling auto-updates, adding cryptographic verification/pinned versions, removing or gating destructive commands (redis-cli flushall), running upgrades in isolated environments, and adding logging/auditing and authorization checks before performing upgrades.
bip-utilss
1.0.0
Live on pypi
Blocked by Socket
This setup.py contains a concealed payload that is decrypted and executed during package installation on Windows. That constitutes high-risk, likely malicious supply-chain behavior (arbitrary code execution in installer context). Do not install this package. Block/remove from package indexes and investigate any systems where it was installed. If analysis is required, decrypt the blob offline using the hardcoded Fernet key in a sandbox and inspect the plaintext thoroughly.
gatecrash
2.999.1
by shreyasc-h01
Removed from npm
Blocked by Socket
The code is extremely dangerous as it collects sensitive system information and sends it to an external server without the user's consent. It should not be used.
Live on npm for 1 hour and 37 minutes before removal. Socket users were protected even while the package was live.
ss-component-new
1.1.953
by leyuntao
Live on npm
Blocked by Socket
This code contains clear malicious or backdoor-like behavior: automated login attempts using hardcoded superadmin credentials (two different long secrets), including a POST to an external plain-HTTP IP address, and storing tokens into sessionStorage. Those behaviors allow silent privileged access (credential-based privilege escalation) and potential exfiltration or remote control via the external endpoint. Treat this package as suspicious and potentially malicious; it should be removed or blocked and investigated further.
@everymatrix/player-account-balance-modal
0.0.311
by raul.vasile
Live on npm
Blocked by Socket
The bundle contains an injected behavior that is unrelated to its stated functionality: it checks the client's timezone against a hardcoded list and, for matching timezones, constructs and displays a political message and automatically opens external URLs (including a Tor onion link and change.org) and shows an alert. This is unexpected, potentially harmful (forced popups/navigation), and constitutes a malicious or unauthorized modification of the package. Do not use this version; investigate source repository, verify integrity (checksums/signatures), and replace with a clean build.
ailever
0.1.72
Live on pypi
Blocked by Socket
The code introduces a high-risk pattern: it downloads and immediately executes arbitrary Python code from a remote repository based on user-supplied input, with no validation, authentication, or sandboxing. This constitutes a severe supply chain and remote code execution risk and should be avoided or restricted with strict whitelisting, integrity checks (e.g., code signing or hash verification), and safe execution environments.
roundcube/roundcubemail
dev-catch-group-syntax
Live on composer
Blocked by Socket
This code is a high-risk privilege-escalation wrapper that can execute a root-owned binary with unvalidated user input. It represents a significant supply-chain security concern and should be removed or heavily audited, with proper controls such as removing SUID, introducing input validation, auditing, and a safe execution model (least privilege, allowlists).
yektadg/medialibrary
3
Live on composer
Blocked by Socket
The SweetAlert2 library code is mostly benign and serves as a UI modal dialog tool. However, it contains a suspicious and potentially malicious snippet that targets Russian users on certain domains to play an unsolicited audio prank, disabling pointer events and potentially disrupting user interaction. This behavior is unexpected and should be considered a moderate security risk and potential malware. The rest of the code shows no signs of malicious intent. The provided reports were invalid and unhelpful. Users should be cautious about this version of the library due to the embedded prank behavior.
atsumic_tools
1.0.0.18
by Takuya Atsumi
Live on nuget
Blocked by Socket
The code is primarily a utility library, but contains an explicit, high-risk destructive routine: standard_tools.suiceder writes and executes a batch file that runs 'rmdir /s /q' against the application's parent directory and a temp directory. That single function makes the package unsafe for supply-chain use. No network exfiltration or obfuscation is present, but the destructive local filesystem operation constitutes malicious behavior (or at least a critical safety hazard). Do not use this package in production; remove or disable the suicider function and audit all filesystem operations before trusting the library.
admin1001
4.3.53
by teseet11111
Removed from npm
Blocked by Socket
High-risk malicious behavior: the package attempts to send local process listings to an external server during installation (data exfiltration/telemetry). This is active network exfiltration and should be treated as malware. Do not install; investigate any systems where this package was installed and block the destination domain.
Live on npm for 1 day, 17 hours and 11 minutes before removal. Socket users were protected even while the package was live.
ss-component-new
1.3.74
Live on npm
Blocked by Socket
This component contains a suspicious external authentication call to a hardcoded numeric IP with embedded 'superadmin' credentials and persists the returned token into sessionStorage. The call masks failures by returning true on exceptions, which can hide errors and make the external step appear successful. These behaviors are consistent with a possible supply-chain backdoor or unauthorized 'call-home' mechanism and represent a significant security risk. Immediate actions: treat this as high priority — audit repository history, remove or isolate the hardcoded external call and credentials, search codebase for other occurrences, and investigate any services at the referenced IP. Also review how 'magicToken' is used elsewhere. If provenance is unknown or untrusted, do not deploy this package.
sh-py
17.29
Live on pypi
Blocked by Socket
This module exhibits numerous malicious and high-risk supply-chain behaviors: self-modification, writing hardcoded credentials to ~/.pypirc, decrypting and executing payloads from disk, deleting files, uploading packages to PyPI, installing third-party packages on demand, and dynamically importing and executing code based on environment input. These patterns indicate intentional unauthorized actions (sabotage, hidden payload execution, or backdoor-like behavior). The package should be treated as malicious and not trusted. Immediate actions: do not run, inspect any systems where it was executed for persistence or deleted files, and treat any PyPI accounts or credentials referenced as compromised.
github.com/BishopFox/sliver
v0.0.0-20200915204034-cb10bc9c2491
Live on go
Blocked by Socket
This source file is a CLI layer for the Sliver implant framework and explicitly builds and saves implant/stager binaries and manages C2/profiles/canaries via RPC. The code itself lacks obfuscation and obvious covert exfiltration, but its purpose is offensive: it enables generation and deployment of payloads that are malicious in many contexts. Notable issues: logic bugs in saveLocation that may cause incorrect path resolution, and insufficient filename/path sanitization when persisting RPC-provided files (risk of path traversal or unintended overwrite). Treat this package as high-risk; include only in authorized testing/red-team environments and audit RPC server trust and filename handling before use.
django-admin-star
1.0.0
Live on pypi
Blocked by Socket
This ACE snippet file is mostly benign static snippet definitions, but it contains a clearly malicious/inappropriate embedded template expression that attempts to execute shell commands (reading /etc/passwd) via system(...). If any consumer evaluates template expressions in snippetText (particularly in privileged or server-side contexts), this will enable local information disclosure and arbitrary command execution. Treat the file as unsafe: remove or sanitize the system(...) invocation, audit any environments that consumed the snippetText, and consider this a supply-chain red flag. For typical browser-only ACE usage the payload is likely inert, but do not assume safety in privileged runtimes.
objection
1.1.9
Live on pypi
Blocked by Socket
This code is a Frida hook that deliberately bypasses biometric authentication by replacing the reply block for LAContext evaluatePolicy:localizedReason:reply: and forcing successful authentication responses. It also leaks localizedReason and status messages via send() to the Frida client. This is an intentional security bypass/sabotage tool. Use of this in production or by an attacker undermines app authentication and is high risk.
ui-cluster-driver-civo
1.0.0
by kaimkamboj
Removed from npm
Blocked by Socket
The code exhibits malicious behavior by collecting and sending sensitive system information to an external server without user consent. This poses a significant security risk and indicates potential data exfiltration.
Live on npm for 5 hours and 20 minutes before removal. Socket users were protected even while the package was live.
openstack-toolbox
1.3
Live on pypi
Blocked by Socket
This module is a standard compiler abstraction used by build systems, but the provided fragment is corrupted/buggy: has_function() writes an invalid C source (large unrelated docstring pasted into the code) and a variable name typo exists (lib_opts vs lib_opt). There is no direct evidence of malicious behavior (network exfiltration, credential theft, shell backdoors) in this file. Primary recommendation: treat the file as corrupted — do not use until fixed; review repository history/commits to detect tampering, run tests, and audit other modules that call spawn/execute/move_file for proper input handling before trusting the package in production.
carbonorm/carbonphp
9.1.3
Live on composer
Blocked by Socket
The dominant security concern is the explicit use of eval on data-derived JSON within CarbonPHP.handlebars, which can enable arbitrary code execution if data is attacker-controlled. Additional concerns include unsanitized dynamic script/template loading and a busy-wait sleep that can degrade performance and potentially expose timing information. Overall risk is high due to the eval pattern and dynamic content loading without strong sanitization.
marinff-test
0.4
Removed from pypi
Blocked by Socket
The code contains a serious security threat in the form of a reverse shell, which allows unauthorized remote access to the system. This is a clear indicator of malicious intent.
Live on pypi for 7 minutes before removal. Socket users were protected even while the package was live.
elf-stats-evergreen-muffin-867
1.0.3
Live on npm
Blocked by Socket
This file implements a straightforward reverse shell/backdoor: it connects to a hardcoded remote IP:port and exposes an interactive /bin/sh over the network. It provides remote arbitrary code execution and data exfiltration capability, contains stealthy failure handling, and lacks any legitimate safeguards. Treat as malicious: do not run, remove from systems, and investigate source/origin and exposure of the host and network.
directlinetoactionsongooglelib
4.0.1
by mohameddiv
Removed from npm
Blocked by Socket
The script is designed to collect and send sensitive information from the user's system to an external server, which is highly malicious and poses a severe security threat.
Live on npm for 3 hours and 17 minutes before removal. Socket users were protected even while the package was live.
arm-portal
99.10.9
by mhj6mdv6
Removed from npm
Blocked by Socket
The code is designed to collect and send sensitive information to a remote server without the user's knowledge or consent. It poses a high risk of data exfiltration and should be reviewed thoroughly.
Live on npm for 2 hours and 23 minutes before removal. Socket users were protected even while the package was live.
354766/zcy22606/codebase-context/codebase-context/
0b77c4fb8181b380f6bf4641997a57cd3d1ea5d6
Live on socket
Blocked by Socket
This Skill is primarily a documentation/config-generator for onboarding repositories to AI coding tools. Functionally it matches its stated purpose, but it increases attack surface in normal operation because it generates executable command templates, permission configs, and offers optional script-based validation. The highest risks are (1) enabling command execution via generated permit-lists/commands and (2) metadata exposure by enumerating sensitive filenames/backups. There is no explicit malicious code or remote exfiltration endpoint in the provided content, so I assess low probability of intentional malware (malware: 0.05) but a moderate operational security risk (securityRisk: 0.55). Recommend strict safeguards: never auto-execute generated validation scripts, review and sanitize any generated command allow-lists before granting agents execution rights, do not back up or copy secret files, and prefer read-only analysis by default.
@nomicsfoundation/hardhat-config
1.2.9
by nomicsfoundation
Live on npm
Blocked by Socket
The code appears to be a cryptocurrency trading library with a suspicious block that encrypts and sends data to a remote server, indicating potential malicious behavior.
simo
2.5.40
Live on pypi
Blocked by Socket
This file implements a high-impact automatic updater that, when enabled by a filesystem flag, will fetch PyPI metadata and, if a newer version exists, automatically install the 'simo' package and run multiple privileged/damaging maintenance commands (migrations, collectstatic, redis-cli flushall, supervisor restart). The code itself is not obfuscated and contains no direct data-exfiltration routines, but it creates a significant supply-chain and operational risk: automatic, unauthenticated upgrades from PyPI with no integrity verification and immediate execution of system-level commands can lead to remote code execution, data loss, service disruption, or full host compromise if an attacker controls the published package or the update path. Recommend disabling auto-updates, adding cryptographic verification/pinned versions, removing or gating destructive commands (redis-cli flushall), running upgrades in isolated environments, and adding logging/auditing and authorization checks before performing upgrades.
Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.
Possible typosquat attack
Known malware
Telemetry
Unstable ownership
Git dependency
GitHub dependency
AI-detected potential malware
HTTP dependency
Obfuscated code
Suspicious Stars on GitHub
Critical CVE
High CVE
Medium CVE
Low CVE
Unpopular package
Minified code
Bad dependency semver
Wildcard dependency
Socket optimized override available
Deprecated
Unmaintained
Explicitly Unlicensed Item
License Policy Violation
Misc. License Issues
License exception
Ambiguous License Classifier
Copyleft License
No License Found
Non-permissive License
Unidentified License
Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.
Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Nat Friedman
CEO at GitHub

Suz Hinton
Senior Software Engineer at Stripe
heck yes this is awesome!!! Congrats team 🎉👏

Matteo Collina
Node.js maintainer, Fastify lead maintainer
So awesome to see @SocketSecurity launch with a fresh approach! Excited to have supported the team from the early days.

DC Posch
Director of Technology at AppFolio, CTO at Dynasty
This is going to be super important, especially for crypto projects where a compromised dependency results in stolen user assets.

Luis Naranjo
Software Engineer at Microsoft
If software supply chain attacks through npm don't scare the shit out of you, you're not paying close enough attention.
@SocketSecurity sounds like an awesome product. I'll be using socket.dev instead of npmjs.org to browse npm packages going forward

Elena Nadolinski
Founder and CEO at Iron Fish
Huge congrats to @SocketSecurity! 🙌
Literally the only product that proactively detects signs of JS compromised packages.

Joe Previte
Engineering Team Lead at Coder
Congrats to @feross and the @SocketSecurity team on their seed funding! 🚀 It's been a big help for us at @CoderHQ and we appreciate what y'all are doing!

Josh Goldberg
Staff Developer at Codecademy
This is such a great idea & looks fantastic, congrats & good luck @feross + team!
The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Scott Roberts
CISO at UiPath
As a happy Socket customer, I've been impressed with how quickly they are adding value to the product, this move is a great step!

Yan Zhu
Head of Security at Brave, DEFCON, EFF, W3C
glad to hear some of the smartest people i know are working on (npm, etc.) supply chain security finally :). @SocketSecurity

Andrew Peterson
CEO and Co-Founder at Signal Sciences (acq. Fastly)
How do you track the validity of open source software libraries as they get updated? You're prob not. Check out @SocketSecurity and the updated tooling they launched.
Supply chain is a cluster in security as we all know and the tools from Socket are "duh" type tools to be implementing. Check them out and follow Feross Aboukhadijeh to see more updates coming from them in the future.

Zbyszek Tenerowicz
Senior Security Engineer at ConsenSys
socket.dev is getting more appealing by the hour

Devdatta Akhawe
Head of Security at Figma
The @SocketSecurity team is on fire! Amazing progress and I am exciting to see where they go next.

Sebastian Bensusan
Engineer Manager at Stripe
I find it surprising that we don't have _more_ supply chain attacks in software:
Imagine your airplane (the code running) was assembled (deployed) daily, with parts (dependencies) from internet strangers. How long until you get a bad part?
Excited for Socket to prevent this

Adam Baldwin
VP of Security at npm, Red Team at Auth0/Okta
Congrats to everyone at @SocketSecurity ❤️🤘🏻

Nico Waisman
CISO at Lyft
This is an area that I have personally been very focused on. As Nat Friedman said in the 2019 GitHub Universe keynote, Open Source won, and every time you add a new open source project you rely on someone else code and you rely on the people that build it.
This is both exciting and problematic. You are bringing real risk into your organization, and I'm excited to see progress in the industry from OpenSSF scorecards and package analyzers to the company that Feross Aboukhadijeh is building!
Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.
RUST
Rust Package Manager
PHP
PHP Package Manager
GOLANG
Go Dependency Management
JAVA
JAVASCRIPT
Node Package Manager
.NET
.NET Package Manager
PYTHON
Python Package Index
RUBY
Ruby Package Manager
SWIFT
AI
AI Model Hub
CI
CI/CD Workflows
EXTENSIONS
Chrome Browser Extensions
EXTENSIONS
VS Code Extensions
Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.
Nov 23, 2025
Shai Hulud v2
Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.
Nov 05, 2025
Elves on npm
A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.
Jul 04, 2025
RubyGems Automation-Tool Infostealer
Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.
Mar 13, 2025
North Korea's Contagious Interview Campaign
Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.
Jul 23, 2024
Network Reconnaissance Campaign
A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.
Get our latest security research, open source insights, and product updates.

Research
/Security News
The worm-enabled campaign hit @emilgroup and @teale.io, then used an ICP canister to deliver follow-on payloads.

Research
/Security News
Attackers compromised Trivy GitHub Actions by force-updating tags to deliver malware, exposing CI/CD secrets across affected pipelines.

Security News
ENISA’s new package manager advisory outlines the dependency security practices companies will need to demonstrate as the EU’s Cyber Resilience Act begins enforcing software supply chain requirements.