You're Invited:Meet the Socket Team at RSAC and BSidesSF 2026, March 23–26.RSVP
Socket
Book a DemoSign in
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub AppBook a Demo

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery
t

timmywil published 4.0.0

left-pad
s

stevemao published 1.3.0

react
r

react-bot published 19.2.4

We protect you from vulnerable and malicious packages

atlasctf-21-prod-08

99.99.99

Removed from pypi

Blocked by Socket

This module implements direct, unauthorized data exfiltration: it reads a likely sensitive file (/flag.txt) and posts its contents to a hard-coded external webhook along with a package identifier. It executes on import, suppresses errors to avoid detection, and provides no legitimate justification for this behavior. Treat the code as malicious/backdoor; do not run or deploy it. Remove the file from the codebase, investigate the package origin, and rotate any exposed secrets.

Live on pypi for 5 hours and 19 minutes before removal. Socket users were protected even while the package was live.

mtmai

0.3.862

Live on pypi

Blocked by Socket

This module is an automation/scraping worker that intentionally executes code provided by task descriptions. That design requires trusting the task source. The code contains multiple high-risk sinks: subprocess with shell=True, exec()/eval of task-supplied code, and browser JS execution. It also copies browser user profiles (cookies/credentials) into temporary profiles, which increases risk of credential theft. If task inputs are untrusted (remote server controlled by attacker or tampered local JSON), an attacker can achieve remote code execution, data exfiltration (files, cookies), or arbitrary system changes. Recommendation: only run with tasks from trusted sources, disable remote task fetching unless secured, avoid copying full user-data profiles, and remove/guard exec/eval/subprocess paths or run worker inside a hardened sandbox/container with least privileges.

sbcli-main

1.0.8

Live on pypi

Blocked by Socket

This module implements privileged node and device management and exposes HTTP endpoints that accept user input used directly in shell commands and Docker operations. Main risks: command injection (unsanitized string interpolation into shell commands and os.popen), destructive device operations (partitioning, bind/unbind), supplying arbitrary images to be pulled and run as privileged containers, and use of an unencrypted/unprotected Docker TCP socket (tcp://...:2375). I assess this as not manifestly malware but a high-risk administrative component that must be strictly access-controlled and hardened (validate/sanitize inputs, avoid passing raw user values into shell/Docker operations, use secure Docker API access, avoid exposing endpoints publicly).

johnsnowlabs-for-databricks-by-ckl

5.1.0rc5

Live on pypi

Blocked by Socket

This module is a high-risk utility because it fetches Python code from remote URLs and local markdown files and executes that code directly via execute_py_script_string_as_new_proc without validation or sandboxing. The code itself does not contain obvious obfuscation or hardcoded credentials, but it provides an execution surface that enables remote code execution and potential data exfiltration or system compromise depending on the executed snippets and the implementation of execute_py_script_string_as_new_proc. Treat calls that use remote URLs or untrusted markdown as dangerous. Use only with trusted content or add validation/sandboxing (e.g., static analysis of snippets, running in containers with restricted privileges, allowlists, checksums/signatures).

nearc

0.10.0

Live on pypi

Blocked by Socket

This module is functionally a minimal serializer that reconstructs objects by evaluating repr()-based strings. It contains an immediate and severe security flaw: loads() decodes external input and feeds it to eval(), and it may import modules based on the serialized text before evaluation. While not explicitly malicious, the code enables arbitrary code execution and import-time side effects when deserializing untrusted data. Treat this as high risk — avoid using it on untrusted inputs and refactor to safer serialization patterns.

snow-flow

8.37.8

Live on npm

Blocked by Socket

This code is an administrative automation component that deliberately executes arbitrary ServiceNow server-side scripts and manipulates system tables. I found no clear signs of intentionally malicious code (no hardcoded external exfiltration endpoints, no obfuscated payload). However, it exposes powerful sinks: arbitrary script execution, creation of background script records, and storage of script output/trace in sys_properties. The primary security risk is abuse/misconfiguration (e.g., autoConfirm bypass, insufficient RBAC) leading to data theft or destructive changes. Treat this module as high-risk functionality that must be strictly access controlled, audited, and hardened before use.

@ao-x/ai-text

0.0.1

by mengwenbohh

Live on npm

Blocked by Socket

This file retrieves and executes scripts from 149[.]88[.]81[.]211, installs ngrok with a hardcoded token, and launches a Jupyter Lab server configured for open access. The use of persistent background processes, elevated privileges via sudo, and unvalidated remote downloads pose significant risks, enabling unauthorized remote access or data exfiltration.

sbcli-mig

1.0.434

Live on pypi

Blocked by Socket

The Python module itself is not directly implementing typical malware behaviors, but it creates a high-risk execution surface: it runs local shell scripts (some with sudo) with unvalidated inputs and passes secrets on the command line. The deploy_fdb_from_file_service function contains a command-injection vulnerability (shell=True with joined args) and a coding bug (returncod typo). Recommend: remove shell=True; use argument lists always, avoid passing secrets via argv (use stdin, environment files with proper filesystem permissions, or secured IPC), eliminate unnecessary sudo calls and require callers to provide appropriate privileges if needed, validate/escape inputs (especially file paths), fix the returncod typo, and audit all invoked shell scripts before use. Treat package as risky until mitigations and script audits are performed.

isite

1.14.76

by absunstar

Live on npm

Blocked by Socket

This code implements a sophisticated remote access backdoor that accepts and executes arbitrary JavaScript code from remote WebSocket connections. The combination of heavy obfuscation, remote code execution vulnerability, and persistent reconnection establishes unauthorized system access, confirming its nature as malware.

azure-graphrbac

2.2.6

Removed from npm

Blocked by Socket

Possible typosquat of [azure](https://socket.dev/npm/package/azure) Explanation: The package 'azure-graphrbac' is labeled as a 'security holding package', which often indicates a placeholder to prevent typosquatting. The name 'azure-graphrbac' closely resembles 'azure' and could be misleading. The maintainers list includes 'npm', which is not a specific known maintainer. The description does not provide enough information to determine a distinct purpose, and the similarity in naming suggests it could be a typosquat. azure-graphrbac is a security-holding package

Live on npm for 3 hours and 49 minutes before removal. Socket users were protected even while the package was live.

imagecomponents.win32.imaging

4.0.0.7

by Image Components

Live on nuget

Blocked by Socket

This assembly contains heavy obfuscation and an embedded loader/unpacker that decrypts resources and performs runtime integrity checks, then uses native API calls to allocate memory and write into other processes. The presence of VirtualAlloc/OpenProcess/WriteProcessMemory/VirtualProtect combined with decryption of bundled data and dynamic delegate creation indicates code injection capability and an active unpacker. Even though the assembly also exposes UI controls, the loader component is malicious or potentially weaponizable (process injection/backdoor). Do not trust or use this package in production; it should be treated as malicious and removed from the supply chain.

imagecomponents.mvc.imaging

4.0.4.3

by Image Components

Live on nuget

Blocked by Socket

This assembly contains an obfuscated payload loader/unpacker. It reads embedded resources or files, verifies signatures, decrypts data with a hard-coded AES key/IV, then allocates and writes executable memory and constructs runtime delegates and dynamic methods to execute the unpacked payload. It also enumerates processes/modules and uses kernel32 APIs (VirtualAlloc/WriteProcessMemory/VirtualProtect/OpenProcess) — behavior consistent with code injection or an in-memory loader/backdoor. Given the divergence between the public-facing API names and the contained low-level behaviors, treat this package as malicious/untrusted and remove it from sensitive environments.

azure-graphrbac

6.8.5

Removed from npm

Blocked by Socket

The code is clearly designed to exfiltrate system information and file contents to external servers, indicating malicious intent. The presence of an infinite loop for data collection further exacerbates the security risk.

Live on npm for 14 minutes before removal. Socket users were protected even while the package was live.

354766/grahama1970/agent-skills/agent-inbox/

5154a81f2ccf38e4896f4cd97bffdfcb065d987d

Live on socket

Blocked by Socket

This module implements a credential- and data-exfiltration pattern: it reads a local OpenAI-like token and user prompt and sends both to a non-official, lookalike endpoint (chatgpt.com/...). The request headers and payload mimic official OpenAI traffic, increasing the likelihood this is designed to harvest usable credentials. There is no obfuscation and no destructive payload, but transmitting long-lived tokens and account identifiers to an untrusted domain is a high-risk malicious behavior. Recommendation: Do not run this code where you store real credentials; treat tokens in ~/.pi/agent/auth.json as compromised if this script was present. Replace with official API calls or verify remote endpoint ownership before use.

354766/metalbear-co/skills/mirrord-config/

7969aa67ac9b1728f24c371848fc9cc71fa59e23

Live on socket

Blocked by Socket

[Skill Scanner] Pipe-to-shell or eval pattern detected All findings: [CRITICAL] command_injection: Pipe-to-shell or eval pattern detected (CI013) [AITech 9.1.4] [CRITICAL] command_injection: URL pointing to executable file detected (CI010) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [HIGH] command_injection: Reference to external script with install/setup context (SC005) The skill is conceptually benign and its capabilities align with its stated purpose (generate/validate/fix mirrord.json using packaged schema + the mirrord CLI). The primary security concern is the instruction to install mirrord via curl | bash (raw GitHub script execution) and the implicit trust placed in the external mirrord binary run during validation. Those steps create a supply-chain risk (remote code execution and potential network telemetry/exfiltration by the external installer/CLI) and should be treated with caution: prefer package manager installs with verified provenance, or require explicit manual review of installer scripts and provide hash/signature checks. No direct evidence of malware or obfuscation exists in the skill content itself. LLM verification: The mirrord-config skill is effectively aligned with its primary purpose of generating and validating configurations. However, it exhibits high-risk installation guidance (curl | bash and external installers) that introduces significant supply-chain and host-security risks. To improve security posture, replace or supplement remote-install steps with verifiable, signed artifacts via official package managers or pre-vetted binaries, add checksum/signature validation, and clearly separate tool inst

react-native-latest

200.0.0

by lykos_poc1

Removed from npm

Blocked by Socket

This script is potentially malicious as it is sending sensitive system information to a remote server without the user's consent. It could be used for data exfiltration or other malicious purposes.

Live on npm for 24 minutes before removal. Socket users were protected even while the package was live.

fray

3.5.105

Live on pypi

Blocked by Socket

This file is a concentrated collection of active exploit/deserialization payloads designed to detect or trigger known gadget chains and vulnerabilities across multiple platforms. While formatted as a testing catalog, its content is inherently dangerous: it includes explicit command-execution payloads, remote class-loading references, and authentication-bypass tokens. If found in a codebase or dependency, treat as high-risk—remove from production, restrict access, audit any use or transmission logs, and verify no unauthorized target interactions occurred. Only use in controlled, authorized testing environments.

sphinx

1.4.2

Live on pypi

Blocked by Socket

This HTML file contains clear malicious content with repeated attempts to load unknown JavaScript from the local file system. The file:// protocol usage combined with the suspicious filename and excessive repetition indicates a high-risk security threat that could lead to local system compromise.

kejie.bos

2.0.10

by Kejiesoft

Live on nuget

Blocked by Socket

This file mixes legitimate helper types (JSON converters, cache managers, Redis, Wx settings, QR code utilities) with a large, highly obfuscated loader/unpacker that reads encrypted resources, performs decryption, manipulates process memory, P/Invokes native APIs (VirtualAlloc/mprotect/WriteProcessMemory/OpenProcess/etc.), dynamically generates delegates/methods, and executes code in memory. Those capabilities (resource decryption -> write into executable memory -> change protections -> invoke) are typical of packers, runtime unpackers, or implant loaders and are high-risk in a dependency. I consider this behavior malicious or at least extremely risky for supply-chain use: the module can execute code not visible in source, perform process memory operations, detect tampering, and load native/jitted payloads. Recommend removing or sandboxing and performing full binary/behavioral analysis before use.

354766/1nfsh-s1/skills/agent-browser/

20d09c09eb2aa281ee179f741d5e9ae585a27441

Live on socket

Blocked by Socket

[Skill Scanner] Pipe-to-shell or eval pattern detected All findings: [CRITICAL] command_injection: Pipe-to-shell or eval pattern detected (CI013) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Natural language instruction to download and install from URL detected (CI009) [AITech 9.1.4] [CRITICAL] command_injection: Natural language instruction to download and install from URL detected (CI009) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] This skill is functionally coherent with its stated purpose (hosted browser automation via inference.sh) and contains expected high-risk capabilities for such a tool: arbitrary JavaScript execution, file uploads, proxy configuration, and routing through a hosted backend. There is no direct evidence in the provided document of hidden malicious code or obfuscation. However, the design requires high trust in the inference.sh distribution and backend because sensitive data (page DOM, cookies, uploaded local files, videos/screenshots, user credentials) will transit through that service. The most likely abuse scenarios are credential/data harvesting via a malicious proxy or compromise of the inference.sh backend or CLI binary. I rate this as suspicious/high-risk in a supply-chain sense (not evidently malicious in the file itself) and recommend careful review of the inference.sh binaries, hosting operator trust, and limiting use of proxy/execute/file-upload features when handling sensitive data. LLM verification: The agent-browser skill's documented capabilities match legitimate Playwright-based browser automation tools, but multiple high-risk design and supply-chain elements are present: a pipe-to-shell installer pattern, reliance on external distribution domains, remote execution via inference.sh infrastructure, arbitrary JS execution in page context, local-file upload capability, and proxy credential handling. These create significant opportunities for sensitive-data exposure or misuse if the inferenc

cl-lite

1.0.1236

by michael_tian

Live on npm

Blocked by Socket

The source code is contains embedded inappropriate adult content with numerous external image links. It is not valid or functional software code. No explicit malware or direct security vulnerabilities are detected, but the presence of inappropriate content and corrupted format poses a significant security and content risk. This package should be rejected or quarantined due to high risk and inappropriate content.

workspace-loader

1.0.0

by fakemgz

Live on npm

Blocked by Socket

The code is designed to collect and exfiltrate rich host information to a Telegram bot without user consent, using embedded credentials and silent operation. This constitutes data exfiltration with backdoor-like traits and represents a high security risk. Hardcoded credentials enable uncontrolled data leakage, and access to sensitive files (e.g., /etc/passwd) and environment variables worsens the risk. Remove hardcoded credentials, implement explicit user consent, limit data collection, and avoid automatic exfiltration from dependencies.

@energysolutions/mylib

99999999.999999.999999

by zoeovpz

Live on npm

Blocked by Socket

The code exhibits behaviors typical of malware, such as unauthorized data collection and transmission to an external server. The use of a Discord webhook for data exfiltration is particularly concerning. The provided reports are placeholders and do not offer any analysis, necessitating a reevaluation based on the code's behavior.

github.com/milvus-io/milvus

v0.10.3-0.20211206104757-51c0c0b87c6f

Live on go

Blocked by Socket

This code implements an insecure, unauthenticated RPC mechanism that allows remote clients to cause arbitrary code execution and exfiltrate files/system information. Using pickle over an untrusted network and invoking methods by client-supplied names are severe supply-chain/backdoor risks. Do not deploy or reuse this code in production; it should be treated as a backdoor/untrusted remote-execution component unless wrapped with strong authentication, authorization, sandboxing, and safe serialization.

atlasctf-21-prod-08

99.99.99

Removed from pypi

Blocked by Socket

This module implements direct, unauthorized data exfiltration: it reads a likely sensitive file (/flag.txt) and posts its contents to a hard-coded external webhook along with a package identifier. It executes on import, suppresses errors to avoid detection, and provides no legitimate justification for this behavior. Treat the code as malicious/backdoor; do not run or deploy it. Remove the file from the codebase, investigate the package origin, and rotate any exposed secrets.

Live on pypi for 5 hours and 19 minutes before removal. Socket users were protected even while the package was live.

mtmai

0.3.862

Live on pypi

Blocked by Socket

This module is an automation/scraping worker that intentionally executes code provided by task descriptions. That design requires trusting the task source. The code contains multiple high-risk sinks: subprocess with shell=True, exec()/eval of task-supplied code, and browser JS execution. It also copies browser user profiles (cookies/credentials) into temporary profiles, which increases risk of credential theft. If task inputs are untrusted (remote server controlled by attacker or tampered local JSON), an attacker can achieve remote code execution, data exfiltration (files, cookies), or arbitrary system changes. Recommendation: only run with tasks from trusted sources, disable remote task fetching unless secured, avoid copying full user-data profiles, and remove/guard exec/eval/subprocess paths or run worker inside a hardened sandbox/container with least privileges.

sbcli-main

1.0.8

Live on pypi

Blocked by Socket

This module implements privileged node and device management and exposes HTTP endpoints that accept user input used directly in shell commands and Docker operations. Main risks: command injection (unsanitized string interpolation into shell commands and os.popen), destructive device operations (partitioning, bind/unbind), supplying arbitrary images to be pulled and run as privileged containers, and use of an unencrypted/unprotected Docker TCP socket (tcp://...:2375). I assess this as not manifestly malware but a high-risk administrative component that must be strictly access-controlled and hardened (validate/sanitize inputs, avoid passing raw user values into shell/Docker operations, use secure Docker API access, avoid exposing endpoints publicly).

johnsnowlabs-for-databricks-by-ckl

5.1.0rc5

Live on pypi

Blocked by Socket

This module is a high-risk utility because it fetches Python code from remote URLs and local markdown files and executes that code directly via execute_py_script_string_as_new_proc without validation or sandboxing. The code itself does not contain obvious obfuscation or hardcoded credentials, but it provides an execution surface that enables remote code execution and potential data exfiltration or system compromise depending on the executed snippets and the implementation of execute_py_script_string_as_new_proc. Treat calls that use remote URLs or untrusted markdown as dangerous. Use only with trusted content or add validation/sandboxing (e.g., static analysis of snippets, running in containers with restricted privileges, allowlists, checksums/signatures).

nearc

0.10.0

Live on pypi

Blocked by Socket

This module is functionally a minimal serializer that reconstructs objects by evaluating repr()-based strings. It contains an immediate and severe security flaw: loads() decodes external input and feeds it to eval(), and it may import modules based on the serialized text before evaluation. While not explicitly malicious, the code enables arbitrary code execution and import-time side effects when deserializing untrusted data. Treat this as high risk — avoid using it on untrusted inputs and refactor to safer serialization patterns.

snow-flow

8.37.8

Live on npm

Blocked by Socket

This code is an administrative automation component that deliberately executes arbitrary ServiceNow server-side scripts and manipulates system tables. I found no clear signs of intentionally malicious code (no hardcoded external exfiltration endpoints, no obfuscated payload). However, it exposes powerful sinks: arbitrary script execution, creation of background script records, and storage of script output/trace in sys_properties. The primary security risk is abuse/misconfiguration (e.g., autoConfirm bypass, insufficient RBAC) leading to data theft or destructive changes. Treat this module as high-risk functionality that must be strictly access controlled, audited, and hardened before use.

@ao-x/ai-text

0.0.1

by mengwenbohh

Live on npm

Blocked by Socket

This file retrieves and executes scripts from 149[.]88[.]81[.]211, installs ngrok with a hardcoded token, and launches a Jupyter Lab server configured for open access. The use of persistent background processes, elevated privileges via sudo, and unvalidated remote downloads pose significant risks, enabling unauthorized remote access or data exfiltration.

sbcli-mig

1.0.434

Live on pypi

Blocked by Socket

The Python module itself is not directly implementing typical malware behaviors, but it creates a high-risk execution surface: it runs local shell scripts (some with sudo) with unvalidated inputs and passes secrets on the command line. The deploy_fdb_from_file_service function contains a command-injection vulnerability (shell=True with joined args) and a coding bug (returncod typo). Recommend: remove shell=True; use argument lists always, avoid passing secrets via argv (use stdin, environment files with proper filesystem permissions, or secured IPC), eliminate unnecessary sudo calls and require callers to provide appropriate privileges if needed, validate/escape inputs (especially file paths), fix the returncod typo, and audit all invoked shell scripts before use. Treat package as risky until mitigations and script audits are performed.

isite

1.14.76

by absunstar

Live on npm

Blocked by Socket

This code implements a sophisticated remote access backdoor that accepts and executes arbitrary JavaScript code from remote WebSocket connections. The combination of heavy obfuscation, remote code execution vulnerability, and persistent reconnection establishes unauthorized system access, confirming its nature as malware.

azure-graphrbac

2.2.6

Removed from npm

Blocked by Socket

Possible typosquat of [azure](https://socket.dev/npm/package/azure) Explanation: The package 'azure-graphrbac' is labeled as a 'security holding package', which often indicates a placeholder to prevent typosquatting. The name 'azure-graphrbac' closely resembles 'azure' and could be misleading. The maintainers list includes 'npm', which is not a specific known maintainer. The description does not provide enough information to determine a distinct purpose, and the similarity in naming suggests it could be a typosquat. azure-graphrbac is a security-holding package

Live on npm for 3 hours and 49 minutes before removal. Socket users were protected even while the package was live.

imagecomponents.win32.imaging

4.0.0.7

by Image Components

Live on nuget

Blocked by Socket

This assembly contains heavy obfuscation and an embedded loader/unpacker that decrypts resources and performs runtime integrity checks, then uses native API calls to allocate memory and write into other processes. The presence of VirtualAlloc/OpenProcess/WriteProcessMemory/VirtualProtect combined with decryption of bundled data and dynamic delegate creation indicates code injection capability and an active unpacker. Even though the assembly also exposes UI controls, the loader component is malicious or potentially weaponizable (process injection/backdoor). Do not trust or use this package in production; it should be treated as malicious and removed from the supply chain.

imagecomponents.mvc.imaging

4.0.4.3

by Image Components

Live on nuget

Blocked by Socket

This assembly contains an obfuscated payload loader/unpacker. It reads embedded resources or files, verifies signatures, decrypts data with a hard-coded AES key/IV, then allocates and writes executable memory and constructs runtime delegates and dynamic methods to execute the unpacked payload. It also enumerates processes/modules and uses kernel32 APIs (VirtualAlloc/WriteProcessMemory/VirtualProtect/OpenProcess) — behavior consistent with code injection or an in-memory loader/backdoor. Given the divergence between the public-facing API names and the contained low-level behaviors, treat this package as malicious/untrusted and remove it from sensitive environments.

azure-graphrbac

6.8.5

Removed from npm

Blocked by Socket

The code is clearly designed to exfiltrate system information and file contents to external servers, indicating malicious intent. The presence of an infinite loop for data collection further exacerbates the security risk.

Live on npm for 14 minutes before removal. Socket users were protected even while the package was live.

354766/grahama1970/agent-skills/agent-inbox/

5154a81f2ccf38e4896f4cd97bffdfcb065d987d

Live on socket

Blocked by Socket

This module implements a credential- and data-exfiltration pattern: it reads a local OpenAI-like token and user prompt and sends both to a non-official, lookalike endpoint (chatgpt.com/...). The request headers and payload mimic official OpenAI traffic, increasing the likelihood this is designed to harvest usable credentials. There is no obfuscation and no destructive payload, but transmitting long-lived tokens and account identifiers to an untrusted domain is a high-risk malicious behavior. Recommendation: Do not run this code where you store real credentials; treat tokens in ~/.pi/agent/auth.json as compromised if this script was present. Replace with official API calls or verify remote endpoint ownership before use.

354766/metalbear-co/skills/mirrord-config/

7969aa67ac9b1728f24c371848fc9cc71fa59e23

Live on socket

Blocked by Socket

[Skill Scanner] Pipe-to-shell or eval pattern detected All findings: [CRITICAL] command_injection: Pipe-to-shell or eval pattern detected (CI013) [AITech 9.1.4] [CRITICAL] command_injection: URL pointing to executable file detected (CI010) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [HIGH] command_injection: Reference to external script with install/setup context (SC005) The skill is conceptually benign and its capabilities align with its stated purpose (generate/validate/fix mirrord.json using packaged schema + the mirrord CLI). The primary security concern is the instruction to install mirrord via curl | bash (raw GitHub script execution) and the implicit trust placed in the external mirrord binary run during validation. Those steps create a supply-chain risk (remote code execution and potential network telemetry/exfiltration by the external installer/CLI) and should be treated with caution: prefer package manager installs with verified provenance, or require explicit manual review of installer scripts and provide hash/signature checks. No direct evidence of malware or obfuscation exists in the skill content itself. LLM verification: The mirrord-config skill is effectively aligned with its primary purpose of generating and validating configurations. However, it exhibits high-risk installation guidance (curl | bash and external installers) that introduces significant supply-chain and host-security risks. To improve security posture, replace or supplement remote-install steps with verifiable, signed artifacts via official package managers or pre-vetted binaries, add checksum/signature validation, and clearly separate tool inst

react-native-latest

200.0.0

by lykos_poc1

Removed from npm

Blocked by Socket

This script is potentially malicious as it is sending sensitive system information to a remote server without the user's consent. It could be used for data exfiltration or other malicious purposes.

Live on npm for 24 minutes before removal. Socket users were protected even while the package was live.

fray

3.5.105

Live on pypi

Blocked by Socket

This file is a concentrated collection of active exploit/deserialization payloads designed to detect or trigger known gadget chains and vulnerabilities across multiple platforms. While formatted as a testing catalog, its content is inherently dangerous: it includes explicit command-execution payloads, remote class-loading references, and authentication-bypass tokens. If found in a codebase or dependency, treat as high-risk—remove from production, restrict access, audit any use or transmission logs, and verify no unauthorized target interactions occurred. Only use in controlled, authorized testing environments.

sphinx

1.4.2

Live on pypi

Blocked by Socket

This HTML file contains clear malicious content with repeated attempts to load unknown JavaScript from the local file system. The file:// protocol usage combined with the suspicious filename and excessive repetition indicates a high-risk security threat that could lead to local system compromise.

kejie.bos

2.0.10

by Kejiesoft

Live on nuget

Blocked by Socket

This file mixes legitimate helper types (JSON converters, cache managers, Redis, Wx settings, QR code utilities) with a large, highly obfuscated loader/unpacker that reads encrypted resources, performs decryption, manipulates process memory, P/Invokes native APIs (VirtualAlloc/mprotect/WriteProcessMemory/OpenProcess/etc.), dynamically generates delegates/methods, and executes code in memory. Those capabilities (resource decryption -> write into executable memory -> change protections -> invoke) are typical of packers, runtime unpackers, or implant loaders and are high-risk in a dependency. I consider this behavior malicious or at least extremely risky for supply-chain use: the module can execute code not visible in source, perform process memory operations, detect tampering, and load native/jitted payloads. Recommend removing or sandboxing and performing full binary/behavioral analysis before use.

354766/1nfsh-s1/skills/agent-browser/

20d09c09eb2aa281ee179f741d5e9ae585a27441

Live on socket

Blocked by Socket

[Skill Scanner] Pipe-to-shell or eval pattern detected All findings: [CRITICAL] command_injection: Pipe-to-shell or eval pattern detected (CI013) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Natural language instruction to download and install from URL detected (CI009) [AITech 9.1.4] [CRITICAL] command_injection: Natural language instruction to download and install from URL detected (CI009) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] This skill is functionally coherent with its stated purpose (hosted browser automation via inference.sh) and contains expected high-risk capabilities for such a tool: arbitrary JavaScript execution, file uploads, proxy configuration, and routing through a hosted backend. There is no direct evidence in the provided document of hidden malicious code or obfuscation. However, the design requires high trust in the inference.sh distribution and backend because sensitive data (page DOM, cookies, uploaded local files, videos/screenshots, user credentials) will transit through that service. The most likely abuse scenarios are credential/data harvesting via a malicious proxy or compromise of the inference.sh backend or CLI binary. I rate this as suspicious/high-risk in a supply-chain sense (not evidently malicious in the file itself) and recommend careful review of the inference.sh binaries, hosting operator trust, and limiting use of proxy/execute/file-upload features when handling sensitive data. LLM verification: The agent-browser skill's documented capabilities match legitimate Playwright-based browser automation tools, but multiple high-risk design and supply-chain elements are present: a pipe-to-shell installer pattern, reliance on external distribution domains, remote execution via inference.sh infrastructure, arbitrary JS execution in page context, local-file upload capability, and proxy credential handling. These create significant opportunities for sensitive-data exposure or misuse if the inferenc

cl-lite

1.0.1236

by michael_tian

Live on npm

Blocked by Socket

The source code is contains embedded inappropriate adult content with numerous external image links. It is not valid or functional software code. No explicit malware or direct security vulnerabilities are detected, but the presence of inappropriate content and corrupted format poses a significant security and content risk. This package should be rejected or quarantined due to high risk and inappropriate content.

workspace-loader

1.0.0

by fakemgz

Live on npm

Blocked by Socket

The code is designed to collect and exfiltrate rich host information to a Telegram bot without user consent, using embedded credentials and silent operation. This constitutes data exfiltration with backdoor-like traits and represents a high security risk. Hardcoded credentials enable uncontrolled data leakage, and access to sensitive files (e.g., /etc/passwd) and environment variables worsens the risk. Remove hardcoded credentials, implement explicit user consent, limit data collection, and avoid automatic exfiltration from dependencies.

@energysolutions/mylib

99999999.999999.999999

by zoeovpz

Live on npm

Blocked by Socket

The code exhibits behaviors typical of malware, such as unauthorized data collection and transmission to an external server. The use of a Discord webhook for data exfiltration is particularly concerning. The provided reports are placeholders and do not offer any analysis, necessitating a reevaluation based on the code's behavior.

github.com/milvus-io/milvus

v0.10.3-0.20211206104757-51c0c0b87c6f

Live on go

Blocked by Socket

This code implements an insecure, unauthenticated RPC mechanism that allows remote clients to cause arbitrary code execution and exfiltrate files/system information. Using pickle over an untrusted network and invoking methods by client-supplied names are severe supply-chain/backdoor risks. Do not deploy or reuse this code in production; it should be treated as a backdoor/untrusted remote-execution component unless wrapped with strong authentication, authorization, sandboxing, and safe serialization.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Possible typosquat attack

Known malware

Telemetry

Unstable ownership

Git dependency

GitHub dependency

AI-detected potential malware

HTTP dependency

Obfuscated code

Suspicious Stars on GitHub

54 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Book a DemoRead the blog

Protect every package in your stack

Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.

View all integrations

RUST

crates.io

Rust Package Manager

PHP

Packagist

PHP Package Manager

GOLANG

Go Modules

Go Dependency Management

JAVA

Maven Central

JAVASCRIPT

npm

Node Package Manager

.NET

NuGet

.NET Package Manager

PYTHON

PyPI

Python Package Index

RUBY

RubyGems.org

Ruby Package Manager

SWIFT

Swift

AI

Hugging Face Hub

AI Model Hub

CI

GitHub Actions

CI/CD Workflows

EXTENSIONS

Chrome Web Store

Chrome Browser Extensions

EXTENSIONS

Open VSX

VS Code Extensions

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Nov 23, 2025

Shai Hulud v2

Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.

Nov 05, 2025

Elves on npm

A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.

Jul 04, 2025

RubyGems Automation-Tool Infostealer

Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.

Mar 13, 2025

North Korea's Contagious Interview Campaign

Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.

Jul 23, 2024

Network Reconnaissance Campaign

A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub AppBook a Demo

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles