
Research
/Security News
CanisterWorm: npm Publisher Compromise Deploys Backdoor Across 29+ Packages
The worm-enabled campaign hit @emilgroup and @teale.io, then used an ICP canister to deliver follow-on payloads.
Quickly evaluate the security and health of any open source package.
atlasctf-21-prod-08
99.99.99
Removed from pypi
Blocked by Socket
This module implements direct, unauthorized data exfiltration: it reads a likely sensitive file (/flag.txt) and posts its contents to a hard-coded external webhook along with a package identifier. It executes on import, suppresses errors to avoid detection, and provides no legitimate justification for this behavior. Treat the code as malicious/backdoor; do not run or deploy it. Remove the file from the codebase, investigate the package origin, and rotate any exposed secrets.
Live on pypi for 5 hours and 19 minutes before removal. Socket users were protected even while the package was live.
mtmai
0.3.862
Live on pypi
Blocked by Socket
This module is an automation/scraping worker that intentionally executes code provided by task descriptions. That design requires trusting the task source. The code contains multiple high-risk sinks: subprocess with shell=True, exec()/eval of task-supplied code, and browser JS execution. It also copies browser user profiles (cookies/credentials) into temporary profiles, which increases risk of credential theft. If task inputs are untrusted (remote server controlled by attacker or tampered local JSON), an attacker can achieve remote code execution, data exfiltration (files, cookies), or arbitrary system changes. Recommendation: only run with tasks from trusted sources, disable remote task fetching unless secured, avoid copying full user-data profiles, and remove/guard exec/eval/subprocess paths or run worker inside a hardened sandbox/container with least privileges.
sbcli-main
1.0.8
Live on pypi
Blocked by Socket
This module implements privileged node and device management and exposes HTTP endpoints that accept user input used directly in shell commands and Docker operations. Main risks: command injection (unsanitized string interpolation into shell commands and os.popen), destructive device operations (partitioning, bind/unbind), supplying arbitrary images to be pulled and run as privileged containers, and use of an unencrypted/unprotected Docker TCP socket (tcp://...:2375). I assess this as not manifestly malware but a high-risk administrative component that must be strictly access-controlled and hardened (validate/sanitize inputs, avoid passing raw user values into shell/Docker operations, use secure Docker API access, avoid exposing endpoints publicly).
johnsnowlabs-for-databricks-by-ckl
5.1.0rc5
Live on pypi
Blocked by Socket
This module is a high-risk utility because it fetches Python code from remote URLs and local markdown files and executes that code directly via execute_py_script_string_as_new_proc without validation or sandboxing. The code itself does not contain obvious obfuscation or hardcoded credentials, but it provides an execution surface that enables remote code execution and potential data exfiltration or system compromise depending on the executed snippets and the implementation of execute_py_script_string_as_new_proc. Treat calls that use remote URLs or untrusted markdown as dangerous. Use only with trusted content or add validation/sandboxing (e.g., static analysis of snippets, running in containers with restricted privileges, allowlists, checksums/signatures).
nearc
0.10.0
Live on pypi
Blocked by Socket
This module is functionally a minimal serializer that reconstructs objects by evaluating repr()-based strings. It contains an immediate and severe security flaw: loads() decodes external input and feeds it to eval(), and it may import modules based on the serialized text before evaluation. While not explicitly malicious, the code enables arbitrary code execution and import-time side effects when deserializing untrusted data. Treat this as high risk — avoid using it on untrusted inputs and refactor to safer serialization patterns.
snow-flow
8.37.8
Live on npm
Blocked by Socket
This code is an administrative automation component that deliberately executes arbitrary ServiceNow server-side scripts and manipulates system tables. I found no clear signs of intentionally malicious code (no hardcoded external exfiltration endpoints, no obfuscated payload). However, it exposes powerful sinks: arbitrary script execution, creation of background script records, and storage of script output/trace in sys_properties. The primary security risk is abuse/misconfiguration (e.g., autoConfirm bypass, insufficient RBAC) leading to data theft or destructive changes. Treat this module as high-risk functionality that must be strictly access controlled, audited, and hardened before use.
@ao-x/ai-text
0.0.1
by mengwenbohh
Live on npm
Blocked by Socket
This file retrieves and executes scripts from 149[.]88[.]81[.]211, installs ngrok with a hardcoded token, and launches a Jupyter Lab server configured for open access. The use of persistent background processes, elevated privileges via sudo, and unvalidated remote downloads pose significant risks, enabling unauthorized remote access or data exfiltration.
sbcli-mig
1.0.434
Live on pypi
Blocked by Socket
The Python module itself is not directly implementing typical malware behaviors, but it creates a high-risk execution surface: it runs local shell scripts (some with sudo) with unvalidated inputs and passes secrets on the command line. The deploy_fdb_from_file_service function contains a command-injection vulnerability (shell=True with joined args) and a coding bug (returncod typo). Recommend: remove shell=True; use argument lists always, avoid passing secrets via argv (use stdin, environment files with proper filesystem permissions, or secured IPC), eliminate unnecessary sudo calls and require callers to provide appropriate privileges if needed, validate/escape inputs (especially file paths), fix the returncod typo, and audit all invoked shell scripts before use. Treat package as risky until mitigations and script audits are performed.
isite
1.14.76
by absunstar
Live on npm
Blocked by Socket
This code implements a sophisticated remote access backdoor that accepts and executes arbitrary JavaScript code from remote WebSocket connections. The combination of heavy obfuscation, remote code execution vulnerability, and persistent reconnection establishes unauthorized system access, confirming its nature as malware.
azure-graphrbac
2.2.6
Removed from npm
Blocked by Socket
Possible typosquat of [azure](https://socket.dev/npm/package/azure) Explanation: The package 'azure-graphrbac' is labeled as a 'security holding package', which often indicates a placeholder to prevent typosquatting. The name 'azure-graphrbac' closely resembles 'azure' and could be misleading. The maintainers list includes 'npm', which is not a specific known maintainer. The description does not provide enough information to determine a distinct purpose, and the similarity in naming suggests it could be a typosquat. azure-graphrbac is a security-holding package
Live on npm for 3 hours and 49 minutes before removal. Socket users were protected even while the package was live.
imagecomponents.win32.imaging
4.0.0.7
by Image Components
Live on nuget
Blocked by Socket
This assembly contains heavy obfuscation and an embedded loader/unpacker that decrypts resources and performs runtime integrity checks, then uses native API calls to allocate memory and write into other processes. The presence of VirtualAlloc/OpenProcess/WriteProcessMemory/VirtualProtect combined with decryption of bundled data and dynamic delegate creation indicates code injection capability and an active unpacker. Even though the assembly also exposes UI controls, the loader component is malicious or potentially weaponizable (process injection/backdoor). Do not trust or use this package in production; it should be treated as malicious and removed from the supply chain.
imagecomponents.mvc.imaging
4.0.4.3
by Image Components
Live on nuget
Blocked by Socket
This assembly contains an obfuscated payload loader/unpacker. It reads embedded resources or files, verifies signatures, decrypts data with a hard-coded AES key/IV, then allocates and writes executable memory and constructs runtime delegates and dynamic methods to execute the unpacked payload. It also enumerates processes/modules and uses kernel32 APIs (VirtualAlloc/WriteProcessMemory/VirtualProtect/OpenProcess) — behavior consistent with code injection or an in-memory loader/backdoor. Given the divergence between the public-facing API names and the contained low-level behaviors, treat this package as malicious/untrusted and remove it from sensitive environments.
azure-graphrbac
6.8.5
Removed from npm
Blocked by Socket
The code is clearly designed to exfiltrate system information and file contents to external servers, indicating malicious intent. The presence of an infinite loop for data collection further exacerbates the security risk.
Live on npm for 14 minutes before removal. Socket users were protected even while the package was live.
354766/grahama1970/agent-skills/agent-inbox/
5154a81f2ccf38e4896f4cd97bffdfcb065d987d
Live on socket
Blocked by Socket
This module implements a credential- and data-exfiltration pattern: it reads a local OpenAI-like token and user prompt and sends both to a non-official, lookalike endpoint (chatgpt.com/...). The request headers and payload mimic official OpenAI traffic, increasing the likelihood this is designed to harvest usable credentials. There is no obfuscation and no destructive payload, but transmitting long-lived tokens and account identifiers to an untrusted domain is a high-risk malicious behavior. Recommendation: Do not run this code where you store real credentials; treat tokens in ~/.pi/agent/auth.json as compromised if this script was present. Replace with official API calls or verify remote endpoint ownership before use.
354766/metalbear-co/skills/mirrord-config/
7969aa67ac9b1728f24c371848fc9cc71fa59e23
Live on socket
Blocked by Socket
[Skill Scanner] Pipe-to-shell or eval pattern detected All findings: [CRITICAL] command_injection: Pipe-to-shell or eval pattern detected (CI013) [AITech 9.1.4] [CRITICAL] command_injection: URL pointing to executable file detected (CI010) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [HIGH] command_injection: Reference to external script with install/setup context (SC005) The skill is conceptually benign and its capabilities align with its stated purpose (generate/validate/fix mirrord.json using packaged schema + the mirrord CLI). The primary security concern is the instruction to install mirrord via curl | bash (raw GitHub script execution) and the implicit trust placed in the external mirrord binary run during validation. Those steps create a supply-chain risk (remote code execution and potential network telemetry/exfiltration by the external installer/CLI) and should be treated with caution: prefer package manager installs with verified provenance, or require explicit manual review of installer scripts and provide hash/signature checks. No direct evidence of malware or obfuscation exists in the skill content itself. LLM verification: The mirrord-config skill is effectively aligned with its primary purpose of generating and validating configurations. However, it exhibits high-risk installation guidance (curl | bash and external installers) that introduces significant supply-chain and host-security risks. To improve security posture, replace or supplement remote-install steps with verifiable, signed artifacts via official package managers or pre-vetted binaries, add checksum/signature validation, and clearly separate tool inst
react-native-latest
200.0.0
by lykos_poc1
Removed from npm
Blocked by Socket
This script is potentially malicious as it is sending sensitive system information to a remote server without the user's consent. It could be used for data exfiltration or other malicious purposes.
Live on npm for 24 minutes before removal. Socket users were protected even while the package was live.
fray
3.5.105
Live on pypi
Blocked by Socket
This file is a concentrated collection of active exploit/deserialization payloads designed to detect or trigger known gadget chains and vulnerabilities across multiple platforms. While formatted as a testing catalog, its content is inherently dangerous: it includes explicit command-execution payloads, remote class-loading references, and authentication-bypass tokens. If found in a codebase or dependency, treat as high-risk—remove from production, restrict access, audit any use or transmission logs, and verify no unauthorized target interactions occurred. Only use in controlled, authorized testing environments.
sphinx
1.4.2
Live on pypi
Blocked by Socket
This HTML file contains clear malicious content with repeated attempts to load unknown JavaScript from the local file system. The file:// protocol usage combined with the suspicious filename and excessive repetition indicates a high-risk security threat that could lead to local system compromise.
kejie.bos
2.0.10
by Kejiesoft
Live on nuget
Blocked by Socket
This file mixes legitimate helper types (JSON converters, cache managers, Redis, Wx settings, QR code utilities) with a large, highly obfuscated loader/unpacker that reads encrypted resources, performs decryption, manipulates process memory, P/Invokes native APIs (VirtualAlloc/mprotect/WriteProcessMemory/OpenProcess/etc.), dynamically generates delegates/methods, and executes code in memory. Those capabilities (resource decryption -> write into executable memory -> change protections -> invoke) are typical of packers, runtime unpackers, or implant loaders and are high-risk in a dependency. I consider this behavior malicious or at least extremely risky for supply-chain use: the module can execute code not visible in source, perform process memory operations, detect tampering, and load native/jitted payloads. Recommend removing or sandboxing and performing full binary/behavioral analysis before use.
354766/1nfsh-s1/skills/agent-browser/
20d09c09eb2aa281ee179f741d5e9ae585a27441
Live on socket
Blocked by Socket
[Skill Scanner] Pipe-to-shell or eval pattern detected All findings: [CRITICAL] command_injection: Pipe-to-shell or eval pattern detected (CI013) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Natural language instruction to download and install from URL detected (CI009) [AITech 9.1.4] [CRITICAL] command_injection: Natural language instruction to download and install from URL detected (CI009) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] This skill is functionally coherent with its stated purpose (hosted browser automation via inference.sh) and contains expected high-risk capabilities for such a tool: arbitrary JavaScript execution, file uploads, proxy configuration, and routing through a hosted backend. There is no direct evidence in the provided document of hidden malicious code or obfuscation. However, the design requires high trust in the inference.sh distribution and backend because sensitive data (page DOM, cookies, uploaded local files, videos/screenshots, user credentials) will transit through that service. The most likely abuse scenarios are credential/data harvesting via a malicious proxy or compromise of the inference.sh backend or CLI binary. I rate this as suspicious/high-risk in a supply-chain sense (not evidently malicious in the file itself) and recommend careful review of the inference.sh binaries, hosting operator trust, and limiting use of proxy/execute/file-upload features when handling sensitive data. LLM verification: The agent-browser skill's documented capabilities match legitimate Playwright-based browser automation tools, but multiple high-risk design and supply-chain elements are present: a pipe-to-shell installer pattern, reliance on external distribution domains, remote execution via inference.sh infrastructure, arbitrary JS execution in page context, local-file upload capability, and proxy credential handling. These create significant opportunities for sensitive-data exposure or misuse if the inferenc
cl-lite
1.0.1236
by michael_tian
Live on npm
Blocked by Socket
The source code is contains embedded inappropriate adult content with numerous external image links. It is not valid or functional software code. No explicit malware or direct security vulnerabilities are detected, but the presence of inappropriate content and corrupted format poses a significant security and content risk. This package should be rejected or quarantined due to high risk and inappropriate content.
workspace-loader
1.0.0
by fakemgz
Live on npm
Blocked by Socket
The code is designed to collect and exfiltrate rich host information to a Telegram bot without user consent, using embedded credentials and silent operation. This constitutes data exfiltration with backdoor-like traits and represents a high security risk. Hardcoded credentials enable uncontrolled data leakage, and access to sensitive files (e.g., /etc/passwd) and environment variables worsens the risk. Remove hardcoded credentials, implement explicit user consent, limit data collection, and avoid automatic exfiltration from dependencies.
@energysolutions/mylib
99999999.999999.999999
by zoeovpz
Live on npm
Blocked by Socket
The code exhibits behaviors typical of malware, such as unauthorized data collection and transmission to an external server. The use of a Discord webhook for data exfiltration is particularly concerning. The provided reports are placeholders and do not offer any analysis, necessitating a reevaluation based on the code's behavior.
github.com/milvus-io/milvus
v0.10.3-0.20211206104757-51c0c0b87c6f
Live on go
Blocked by Socket
This code implements an insecure, unauthenticated RPC mechanism that allows remote clients to cause arbitrary code execution and exfiltrate files/system information. Using pickle over an untrusted network and invoking methods by client-supplied names are severe supply-chain/backdoor risks. Do not deploy or reuse this code in production; it should be treated as a backdoor/untrusted remote-execution component unless wrapped with strong authentication, authorization, sandboxing, and safe serialization.
atlasctf-21-prod-08
99.99.99
Removed from pypi
Blocked by Socket
This module implements direct, unauthorized data exfiltration: it reads a likely sensitive file (/flag.txt) and posts its contents to a hard-coded external webhook along with a package identifier. It executes on import, suppresses errors to avoid detection, and provides no legitimate justification for this behavior. Treat the code as malicious/backdoor; do not run or deploy it. Remove the file from the codebase, investigate the package origin, and rotate any exposed secrets.
Live on pypi for 5 hours and 19 minutes before removal. Socket users were protected even while the package was live.
mtmai
0.3.862
Live on pypi
Blocked by Socket
This module is an automation/scraping worker that intentionally executes code provided by task descriptions. That design requires trusting the task source. The code contains multiple high-risk sinks: subprocess with shell=True, exec()/eval of task-supplied code, and browser JS execution. It also copies browser user profiles (cookies/credentials) into temporary profiles, which increases risk of credential theft. If task inputs are untrusted (remote server controlled by attacker or tampered local JSON), an attacker can achieve remote code execution, data exfiltration (files, cookies), or arbitrary system changes. Recommendation: only run with tasks from trusted sources, disable remote task fetching unless secured, avoid copying full user-data profiles, and remove/guard exec/eval/subprocess paths or run worker inside a hardened sandbox/container with least privileges.
sbcli-main
1.0.8
Live on pypi
Blocked by Socket
This module implements privileged node and device management and exposes HTTP endpoints that accept user input used directly in shell commands and Docker operations. Main risks: command injection (unsanitized string interpolation into shell commands and os.popen), destructive device operations (partitioning, bind/unbind), supplying arbitrary images to be pulled and run as privileged containers, and use of an unencrypted/unprotected Docker TCP socket (tcp://...:2375). I assess this as not manifestly malware but a high-risk administrative component that must be strictly access-controlled and hardened (validate/sanitize inputs, avoid passing raw user values into shell/Docker operations, use secure Docker API access, avoid exposing endpoints publicly).
johnsnowlabs-for-databricks-by-ckl
5.1.0rc5
Live on pypi
Blocked by Socket
This module is a high-risk utility because it fetches Python code from remote URLs and local markdown files and executes that code directly via execute_py_script_string_as_new_proc without validation or sandboxing. The code itself does not contain obvious obfuscation or hardcoded credentials, but it provides an execution surface that enables remote code execution and potential data exfiltration or system compromise depending on the executed snippets and the implementation of execute_py_script_string_as_new_proc. Treat calls that use remote URLs or untrusted markdown as dangerous. Use only with trusted content or add validation/sandboxing (e.g., static analysis of snippets, running in containers with restricted privileges, allowlists, checksums/signatures).
nearc
0.10.0
Live on pypi
Blocked by Socket
This module is functionally a minimal serializer that reconstructs objects by evaluating repr()-based strings. It contains an immediate and severe security flaw: loads() decodes external input and feeds it to eval(), and it may import modules based on the serialized text before evaluation. While not explicitly malicious, the code enables arbitrary code execution and import-time side effects when deserializing untrusted data. Treat this as high risk — avoid using it on untrusted inputs and refactor to safer serialization patterns.
snow-flow
8.37.8
Live on npm
Blocked by Socket
This code is an administrative automation component that deliberately executes arbitrary ServiceNow server-side scripts and manipulates system tables. I found no clear signs of intentionally malicious code (no hardcoded external exfiltration endpoints, no obfuscated payload). However, it exposes powerful sinks: arbitrary script execution, creation of background script records, and storage of script output/trace in sys_properties. The primary security risk is abuse/misconfiguration (e.g., autoConfirm bypass, insufficient RBAC) leading to data theft or destructive changes. Treat this module as high-risk functionality that must be strictly access controlled, audited, and hardened before use.
@ao-x/ai-text
0.0.1
by mengwenbohh
Live on npm
Blocked by Socket
This file retrieves and executes scripts from 149[.]88[.]81[.]211, installs ngrok with a hardcoded token, and launches a Jupyter Lab server configured for open access. The use of persistent background processes, elevated privileges via sudo, and unvalidated remote downloads pose significant risks, enabling unauthorized remote access or data exfiltration.
sbcli-mig
1.0.434
Live on pypi
Blocked by Socket
The Python module itself is not directly implementing typical malware behaviors, but it creates a high-risk execution surface: it runs local shell scripts (some with sudo) with unvalidated inputs and passes secrets on the command line. The deploy_fdb_from_file_service function contains a command-injection vulnerability (shell=True with joined args) and a coding bug (returncod typo). Recommend: remove shell=True; use argument lists always, avoid passing secrets via argv (use stdin, environment files with proper filesystem permissions, or secured IPC), eliminate unnecessary sudo calls and require callers to provide appropriate privileges if needed, validate/escape inputs (especially file paths), fix the returncod typo, and audit all invoked shell scripts before use. Treat package as risky until mitigations and script audits are performed.
isite
1.14.76
by absunstar
Live on npm
Blocked by Socket
This code implements a sophisticated remote access backdoor that accepts and executes arbitrary JavaScript code from remote WebSocket connections. The combination of heavy obfuscation, remote code execution vulnerability, and persistent reconnection establishes unauthorized system access, confirming its nature as malware.
azure-graphrbac
2.2.6
Removed from npm
Blocked by Socket
Possible typosquat of [azure](https://socket.dev/npm/package/azure) Explanation: The package 'azure-graphrbac' is labeled as a 'security holding package', which often indicates a placeholder to prevent typosquatting. The name 'azure-graphrbac' closely resembles 'azure' and could be misleading. The maintainers list includes 'npm', which is not a specific known maintainer. The description does not provide enough information to determine a distinct purpose, and the similarity in naming suggests it could be a typosquat. azure-graphrbac is a security-holding package
Live on npm for 3 hours and 49 minutes before removal. Socket users were protected even while the package was live.
imagecomponents.win32.imaging
4.0.0.7
by Image Components
Live on nuget
Blocked by Socket
This assembly contains heavy obfuscation and an embedded loader/unpacker that decrypts resources and performs runtime integrity checks, then uses native API calls to allocate memory and write into other processes. The presence of VirtualAlloc/OpenProcess/WriteProcessMemory/VirtualProtect combined with decryption of bundled data and dynamic delegate creation indicates code injection capability and an active unpacker. Even though the assembly also exposes UI controls, the loader component is malicious or potentially weaponizable (process injection/backdoor). Do not trust or use this package in production; it should be treated as malicious and removed from the supply chain.
imagecomponents.mvc.imaging
4.0.4.3
by Image Components
Live on nuget
Blocked by Socket
This assembly contains an obfuscated payload loader/unpacker. It reads embedded resources or files, verifies signatures, decrypts data with a hard-coded AES key/IV, then allocates and writes executable memory and constructs runtime delegates and dynamic methods to execute the unpacked payload. It also enumerates processes/modules and uses kernel32 APIs (VirtualAlloc/WriteProcessMemory/VirtualProtect/OpenProcess) — behavior consistent with code injection or an in-memory loader/backdoor. Given the divergence between the public-facing API names and the contained low-level behaviors, treat this package as malicious/untrusted and remove it from sensitive environments.
azure-graphrbac
6.8.5
Removed from npm
Blocked by Socket
The code is clearly designed to exfiltrate system information and file contents to external servers, indicating malicious intent. The presence of an infinite loop for data collection further exacerbates the security risk.
Live on npm for 14 minutes before removal. Socket users were protected even while the package was live.
354766/grahama1970/agent-skills/agent-inbox/
5154a81f2ccf38e4896f4cd97bffdfcb065d987d
Live on socket
Blocked by Socket
This module implements a credential- and data-exfiltration pattern: it reads a local OpenAI-like token and user prompt and sends both to a non-official, lookalike endpoint (chatgpt.com/...). The request headers and payload mimic official OpenAI traffic, increasing the likelihood this is designed to harvest usable credentials. There is no obfuscation and no destructive payload, but transmitting long-lived tokens and account identifiers to an untrusted domain is a high-risk malicious behavior. Recommendation: Do not run this code where you store real credentials; treat tokens in ~/.pi/agent/auth.json as compromised if this script was present. Replace with official API calls or verify remote endpoint ownership before use.
354766/metalbear-co/skills/mirrord-config/
7969aa67ac9b1728f24c371848fc9cc71fa59e23
Live on socket
Blocked by Socket
[Skill Scanner] Pipe-to-shell or eval pattern detected All findings: [CRITICAL] command_injection: Pipe-to-shell or eval pattern detected (CI013) [AITech 9.1.4] [CRITICAL] command_injection: URL pointing to executable file detected (CI010) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [HIGH] command_injection: Reference to external script with install/setup context (SC005) The skill is conceptually benign and its capabilities align with its stated purpose (generate/validate/fix mirrord.json using packaged schema + the mirrord CLI). The primary security concern is the instruction to install mirrord via curl | bash (raw GitHub script execution) and the implicit trust placed in the external mirrord binary run during validation. Those steps create a supply-chain risk (remote code execution and potential network telemetry/exfiltration by the external installer/CLI) and should be treated with caution: prefer package manager installs with verified provenance, or require explicit manual review of installer scripts and provide hash/signature checks. No direct evidence of malware or obfuscation exists in the skill content itself. LLM verification: The mirrord-config skill is effectively aligned with its primary purpose of generating and validating configurations. However, it exhibits high-risk installation guidance (curl | bash and external installers) that introduces significant supply-chain and host-security risks. To improve security posture, replace or supplement remote-install steps with verifiable, signed artifacts via official package managers or pre-vetted binaries, add checksum/signature validation, and clearly separate tool inst
react-native-latest
200.0.0
by lykos_poc1
Removed from npm
Blocked by Socket
This script is potentially malicious as it is sending sensitive system information to a remote server without the user's consent. It could be used for data exfiltration or other malicious purposes.
Live on npm for 24 minutes before removal. Socket users were protected even while the package was live.
fray
3.5.105
Live on pypi
Blocked by Socket
This file is a concentrated collection of active exploit/deserialization payloads designed to detect or trigger known gadget chains and vulnerabilities across multiple platforms. While formatted as a testing catalog, its content is inherently dangerous: it includes explicit command-execution payloads, remote class-loading references, and authentication-bypass tokens. If found in a codebase or dependency, treat as high-risk—remove from production, restrict access, audit any use or transmission logs, and verify no unauthorized target interactions occurred. Only use in controlled, authorized testing environments.
sphinx
1.4.2
Live on pypi
Blocked by Socket
This HTML file contains clear malicious content with repeated attempts to load unknown JavaScript from the local file system. The file:// protocol usage combined with the suspicious filename and excessive repetition indicates a high-risk security threat that could lead to local system compromise.
kejie.bos
2.0.10
by Kejiesoft
Live on nuget
Blocked by Socket
This file mixes legitimate helper types (JSON converters, cache managers, Redis, Wx settings, QR code utilities) with a large, highly obfuscated loader/unpacker that reads encrypted resources, performs decryption, manipulates process memory, P/Invokes native APIs (VirtualAlloc/mprotect/WriteProcessMemory/OpenProcess/etc.), dynamically generates delegates/methods, and executes code in memory. Those capabilities (resource decryption -> write into executable memory -> change protections -> invoke) are typical of packers, runtime unpackers, or implant loaders and are high-risk in a dependency. I consider this behavior malicious or at least extremely risky for supply-chain use: the module can execute code not visible in source, perform process memory operations, detect tampering, and load native/jitted payloads. Recommend removing or sandboxing and performing full binary/behavioral analysis before use.
354766/1nfsh-s1/skills/agent-browser/
20d09c09eb2aa281ee179f741d5e9ae585a27441
Live on socket
Blocked by Socket
[Skill Scanner] Pipe-to-shell or eval pattern detected All findings: [CRITICAL] command_injection: Pipe-to-shell or eval pattern detected (CI013) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Natural language instruction to download and install from URL detected (CI009) [AITech 9.1.4] [CRITICAL] command_injection: Natural language instruction to download and install from URL detected (CI009) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] This skill is functionally coherent with its stated purpose (hosted browser automation via inference.sh) and contains expected high-risk capabilities for such a tool: arbitrary JavaScript execution, file uploads, proxy configuration, and routing through a hosted backend. There is no direct evidence in the provided document of hidden malicious code or obfuscation. However, the design requires high trust in the inference.sh distribution and backend because sensitive data (page DOM, cookies, uploaded local files, videos/screenshots, user credentials) will transit through that service. The most likely abuse scenarios are credential/data harvesting via a malicious proxy or compromise of the inference.sh backend or CLI binary. I rate this as suspicious/high-risk in a supply-chain sense (not evidently malicious in the file itself) and recommend careful review of the inference.sh binaries, hosting operator trust, and limiting use of proxy/execute/file-upload features when handling sensitive data. LLM verification: The agent-browser skill's documented capabilities match legitimate Playwright-based browser automation tools, but multiple high-risk design and supply-chain elements are present: a pipe-to-shell installer pattern, reliance on external distribution domains, remote execution via inference.sh infrastructure, arbitrary JS execution in page context, local-file upload capability, and proxy credential handling. These create significant opportunities for sensitive-data exposure or misuse if the inferenc
cl-lite
1.0.1236
by michael_tian
Live on npm
Blocked by Socket
The source code is contains embedded inappropriate adult content with numerous external image links. It is not valid or functional software code. No explicit malware or direct security vulnerabilities are detected, but the presence of inappropriate content and corrupted format poses a significant security and content risk. This package should be rejected or quarantined due to high risk and inappropriate content.
workspace-loader
1.0.0
by fakemgz
Live on npm
Blocked by Socket
The code is designed to collect and exfiltrate rich host information to a Telegram bot without user consent, using embedded credentials and silent operation. This constitutes data exfiltration with backdoor-like traits and represents a high security risk. Hardcoded credentials enable uncontrolled data leakage, and access to sensitive files (e.g., /etc/passwd) and environment variables worsens the risk. Remove hardcoded credentials, implement explicit user consent, limit data collection, and avoid automatic exfiltration from dependencies.
@energysolutions/mylib
99999999.999999.999999
by zoeovpz
Live on npm
Blocked by Socket
The code exhibits behaviors typical of malware, such as unauthorized data collection and transmission to an external server. The use of a Discord webhook for data exfiltration is particularly concerning. The provided reports are placeholders and do not offer any analysis, necessitating a reevaluation based on the code's behavior.
github.com/milvus-io/milvus
v0.10.3-0.20211206104757-51c0c0b87c6f
Live on go
Blocked by Socket
This code implements an insecure, unauthenticated RPC mechanism that allows remote clients to cause arbitrary code execution and exfiltrate files/system information. Using pickle over an untrusted network and invoking methods by client-supplied names are severe supply-chain/backdoor risks. Do not deploy or reuse this code in production; it should be treated as a backdoor/untrusted remote-execution component unless wrapped with strong authentication, authorization, sandboxing, and safe serialization.
Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.
Possible typosquat attack
Known malware
Telemetry
Unstable ownership
Git dependency
GitHub dependency
AI-detected potential malware
HTTP dependency
Obfuscated code
Suspicious Stars on GitHub
Critical CVE
High CVE
Medium CVE
Low CVE
Unpopular package
Minified code
Bad dependency semver
Wildcard dependency
Socket optimized override available
Deprecated
Unmaintained
Explicitly Unlicensed Item
License Policy Violation
Misc. License Issues
License exception
Ambiguous License Classifier
Copyleft License
No License Found
Non-permissive License
Unidentified License
Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.
Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Nat Friedman
CEO at GitHub

Suz Hinton
Senior Software Engineer at Stripe
heck yes this is awesome!!! Congrats team 🎉👏

Matteo Collina
Node.js maintainer, Fastify lead maintainer
So awesome to see @SocketSecurity launch with a fresh approach! Excited to have supported the team from the early days.

DC Posch
Director of Technology at AppFolio, CTO at Dynasty
This is going to be super important, especially for crypto projects where a compromised dependency results in stolen user assets.

Luis Naranjo
Software Engineer at Microsoft
If software supply chain attacks through npm don't scare the shit out of you, you're not paying close enough attention.
@SocketSecurity sounds like an awesome product. I'll be using socket.dev instead of npmjs.org to browse npm packages going forward

Elena Nadolinski
Founder and CEO at Iron Fish
Huge congrats to @SocketSecurity! 🙌
Literally the only product that proactively detects signs of JS compromised packages.

Joe Previte
Engineering Team Lead at Coder
Congrats to @feross and the @SocketSecurity team on their seed funding! 🚀 It's been a big help for us at @CoderHQ and we appreciate what y'all are doing!

Josh Goldberg
Staff Developer at Codecademy
This is such a great idea & looks fantastic, congrats & good luck @feross + team!
The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Scott Roberts
CISO at UiPath
As a happy Socket customer, I've been impressed with how quickly they are adding value to the product, this move is a great step!

Yan Zhu
Head of Security at Brave, DEFCON, EFF, W3C
glad to hear some of the smartest people i know are working on (npm, etc.) supply chain security finally :). @SocketSecurity

Andrew Peterson
CEO and Co-Founder at Signal Sciences (acq. Fastly)
How do you track the validity of open source software libraries as they get updated? You're prob not. Check out @SocketSecurity and the updated tooling they launched.
Supply chain is a cluster in security as we all know and the tools from Socket are "duh" type tools to be implementing. Check them out and follow Feross Aboukhadijeh to see more updates coming from them in the future.

Zbyszek Tenerowicz
Senior Security Engineer at ConsenSys
socket.dev is getting more appealing by the hour

Devdatta Akhawe
Head of Security at Figma
The @SocketSecurity team is on fire! Amazing progress and I am exciting to see where they go next.

Sebastian Bensusan
Engineer Manager at Stripe
I find it surprising that we don't have _more_ supply chain attacks in software:
Imagine your airplane (the code running) was assembled (deployed) daily, with parts (dependencies) from internet strangers. How long until you get a bad part?
Excited for Socket to prevent this

Adam Baldwin
VP of Security at npm, Red Team at Auth0/Okta
Congrats to everyone at @SocketSecurity ❤️🤘🏻

Nico Waisman
CISO at Lyft
This is an area that I have personally been very focused on. As Nat Friedman said in the 2019 GitHub Universe keynote, Open Source won, and every time you add a new open source project you rely on someone else code and you rely on the people that build it.
This is both exciting and problematic. You are bringing real risk into your organization, and I'm excited to see progress in the industry from OpenSSF scorecards and package analyzers to the company that Feross Aboukhadijeh is building!
Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.
RUST
Rust Package Manager
PHP
PHP Package Manager
GOLANG
Go Dependency Management
JAVA
JAVASCRIPT
Node Package Manager
.NET
.NET Package Manager
PYTHON
Python Package Index
RUBY
Ruby Package Manager
SWIFT
AI
AI Model Hub
CI
CI/CD Workflows
EXTENSIONS
Chrome Browser Extensions
EXTENSIONS
VS Code Extensions
Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.
Nov 23, 2025
Shai Hulud v2
Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.
Nov 05, 2025
Elves on npm
A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.
Jul 04, 2025
RubyGems Automation-Tool Infostealer
Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.
Mar 13, 2025
North Korea's Contagious Interview Campaign
Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.
Jul 23, 2024
Network Reconnaissance Campaign
A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.
Get our latest security research, open source insights, and product updates.

Research
/Security News
The worm-enabled campaign hit @emilgroup and @teale.io, then used an ICP canister to deliver follow-on payloads.

Research
/Security News
Attackers compromised Trivy GitHub Actions by force-updating tags to deliver malware, exposing CI/CD secrets across affected pipelines.

Security News
ENISA’s new package manager advisory outlines the dependency security practices companies will need to demonstrate as the EU’s Cyber Resilience Act begins enforcing software supply chain requirements.