You're Invited:Meet the Socket Team at RSAC and BSidesSF 2026, March 23–26.RSVP
Socket
Book a DemoSign in
Socket

Socket for Java

Secure Your Java Projects

Install our free GitHub app to protect Java dependencies from vulnerable and malicious code.

Detect and block malware, mining software, open source license violations, code quality issues, and 70+ indicators of supply chain attacks. Socket is a full-featured enterprise-ready SCA tool that can be seamlessly dropped into your workflow with just two clicks.

Install GitHub AppContact Sales
Socket for Java

Socket supports Maven and Gradle

And all your favorite tools

We protect you from vulnerable and malicious Java packages

org/mvnpm:sweetalert2

11.15.10

Live on maven

Blocked by Socket

The module contains a malicious/hostile block that targets users based on locale and host, disables page interaction, injects and autoplays an externally-hosted audio file, and uses localStorage to persist timing for stealthy delayed execution. This is intentional, unrelated to the library's purpose, and constitutes a supply-chain sabotage/backdoor. Do not use this package without removing that block.

org.scalameta:testkit_2.11

4.14.3

Live on maven

Blocked by Socket

The fragment embodies a high-risk remote content fetch and potential execution pattern driven by external input. Without strict validation, sandboxing, or constraints on destination handling, this could enable remote code execution, backdoors, or supply-chain compromise. Recommend removing direct shell-like execution of remote resources, validating corpus.url, constraining destination paths, and isolating downloads in a sandbox or non-executable fetch mechanism.

org.webjars.npm:sweetalert2

11.22.3

Live on maven

Blocked by Socket

This file is largely legitimate modal/dialog logic, but it contains a clearly malicious or highly inappropriate conditional routine that targets users with Russian locale/hosts: it disables pointer events, injects an <audio> element pointing to a hardcoded external URL and autoplays looped audio after a time delay controlled by localStorage. This behavior is intrusive, targeted, and outside the scope of a UI library — consistent with a supply-chain compromise or vandalism. Treat this package as compromised until verified; remove the injected block or restore from a verified upstream release. Users in the targeted locales are at risk of disruptive UX, unsolicited network requests, and potential political targeting.

io.github.reajason:generator

2.4.1

Live on maven

Blocked by Socket

This class implements a covert webshell/mem-shell that establishes and manages attacker-controlled tunnels and proxying over HTTP(S). It decodes a custom framed protocol from request bodies, opens outbound sockets and HTTP(s) connections (with SSL trust disabled), spawns background threads, and maintains persistent per-tunnel state in a Hashtable. These behaviors allow remote attackers to relay arbitrary traffic through the compromised server, exfiltrate data, and create persistent remote access. The component is malicious and should be removed; any systems where this class is present should be considered compromised and investigated.

io.acryl:datahub-custom-plugin-lib

1.3.1.3rc2

Live on maven

Blocked by Socket

The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.

io.acryl:datahub-custom-plugin-lib

1.3.1.7rc1

Live on maven

Blocked by Socket

The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.

io.github.reajason:generator

2.5.0

Live on maven

Blocked by Socket

The class is a memshell/backdoor that accepts specially crafted HTTP requests (via a custom binary protocol), opens outbound TCP sockets or HTTP(S) requests to attacker-controlled addresses/ports, proxies data bidirectionally, stores OutputStream objects in a global map for later use, and disables SSL certificate/hostname verification. This is malicious functionality intended to provide remote access and arbitrary network connectivity from the compromised server. The package should be treated as a backdoor and removed; forensic and incident response steps are recommended.

io.github.reajason:generator

2.4.2

Live on maven

Blocked by Socket

This class is a dynamic payload loader: it decodes (base64 and optional gzip) a supplied string into class bytes, reflectively defines the class bypassing visibility, instantiates it and returns its toString(). That behavior provides an in-process arbitrary code loading and execution primitive. In a software supply-chain context this is high risk: if untrusted data can reach this method it can enable remote or local code execution, backdoors, or payload execution. Use of reflection to call defineClass with setAccessible increases the malicious potential. The code fragment itself is a loader (suspicious in libraries) and should be treated as dangerous unless its inputs are strictly controlled and validated.

org.jetbrains.kotlin:kotlin-stdlib-js

1.8.0

Live on maven

Blocked by Socket

The snippet shows an unusually large inline payload with no visible consumption logic. This pattern is typical of obfuscated payload delivery within supply chains. A definitive determination requires tracing the decoding/usage path in the full project. Pending such analysis, treat as a high-risk indicator and perform targeted in-sandbox decoding and audit of any dynamic execution paths.

org.ton.ton4j:liteclient

2.0.0

Live on maven

Blocked by Socket

The LiteClient class exhibits high-risk supply-chain and runtime behavior due to runtime downloading and execution of external binaries with no apparent integrity verification. This creates an attack surface for tampered artifacts, rogue binaries, or configuration manipulation. While some components serve legitimate utilities (OS/config helpers), the overarching pattern is insecure in typical library usage contexts. Recommended mitigations include: removing runtime binary download/execution, introducing strong integrity checks (signatures/hashes), sandboxing external binaries behind a vetted launcher, validating inputs strictly, and auditing all external endpoints and artifacts.

io.github.reajason:generator

2.4.2

Live on maven

Blocked by Socket

This class is a backdoor/memshell implant. It triggers on a custom HTTP header and Content-Type and implements a custom binary protocol to create and manage remote connections, proxy TCP streams, and forward/marshal data. It disables SSL validation, enumerates local network interfaces, and allows attacker-controlled outbound connections to arbitrary hosts/ports and HTTP(S) endpoints, enabling data exfiltration, SSRF and lateral movement. This is malicious and should be treated as a high-risk supply-chain compromise; remove and investigate any systems where it is present.

org.tinystruct:tinystruct

1.7.15

Live on maven

Blocked by Socket

The Dispatcher fragment presents a broad surface of capabilities (install/update/download/open/generate/exec) with multiple high-risk data flows from untrusted inputs to dangerous sinks (shell execution, remote object exposure, and remote downloads). While some features serve legitimate framework needs, the combination of untrusted input-driven ProcessBuilder usage, RMI exposure, and dynamic/reflection-heavy code paths constitutes meaningful supply-chain and runtime risk. Treat this module as medium-to-high risk in security reviews; apply strong input governance, access controls, sandboxing, and verification of remote resources before integration into public-facing deployments.

org.mvnpm:sweetalert2

11.17.2

Live on maven

Blocked by Socket

The fragment contains a targeted, unexpected payload that, for users with a Russian locale on certain TLDs, will (after a persistent delay condition) disable pointer interactions and load/play an external audio file from a hard-coded third-party domain. This behavior is not appropriate for a modal/dialog library and is likely malicious or at least maliciously prank-like / sabotage-oriented. Remove or patch this conditional block before using the package, and treat builds containing this behavior as compromised.

org.eclipse.dirigible:dirigible-components-security-keycloak

11.4.1

Live on maven

Blocked by Socket

The code fragment exposes a web-based terminal on port 9000 via ttyd with an incomplete or mis-typed shell command ('bas'), creating a remote command execution surface without visible access controls. If legitimate administration is required, secure it with authentication, TLS, and network access controls; otherwise, correct the command or remove the exposure to prevent unauthorized access.

ai.databand:dbnd-azkaban-agent

1.0.27.14

Live on maven

Blocked by Socket

The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.

io.github.reajason:generator

2.4.2

Live on maven

Blocked by Socket

This class is a clear backdoor / webshell component designed to covertly accept specially-crafted HTTP requests (guarded by a trigger header) and establish bidirectional tunnels and proxy connections to arbitrary hosts and URLs, including HTTPS endpoints with certificate validation disabled. It provides remote access, persistent stream management, and HTTP(S) proxy/redirect functionality with SSL verification bypass. This is malicious and should be considered a high-risk supply-chain compromise; remove and investigate all affected systems.

com.lihaoyi:mill-scalalib-backgroundwrapper

0.12.14-12-b663dc

Live on maven

Blocked by Socket

MillBackgroundWrapper.java provides a robust yet dangerous subprocess supervisory capability, capable of invoking arbitrary code paths or launching external processes based on user-provided inputs. While not inherently malicious by design, the combination of untrusted input-driven reflection, arbitrary subprocess execution, and token/log file handling introduces significant supply-chain and runtime security risks. It should be hardened before reuse in public or widely distributed packages: enforce strict input validation, implement a whitelist of allowed classes/methods, avoid arbitrary ProcessBuilder invocations, restrict file paths to secure, non-public locations, and consider sandboxing or removing reflective launcher paths entirely.

com.liferay:com.liferay.journal.web

5.0.7

Live on maven

Blocked by Socket

The fragment fetches external HTML and injects it into the DOM using dangerouslySetInnerHTML, then executes any embedded scripts via runScriptsInElement. This pattern poses significant XSS and remote code execution risks if the fetched content is untrusted or compromised. While not definitive malware, the combination represents a high-risk behavior in a supply-chain context. Mitigations include sanitization of fetched content, enabling strict CSP with nonce or disallowing inline scripts, avoiding runScriptsInElement or sandboxing, and validating the source URL prior to fetch.

io.github.jprocms:cp-core

2.2.0.1

Live on maven

Blocked by Socket

The PlatformUtil fragment exhibits several high-risk patterns that could enable runtime instrumentation or backdoor-like behavior. While some elements may be legitimate for licensing enforcement or diagnostics, the combination of embedded license keys, dynamic attachment of agents via the Attach API, and extensive reflective invocation constitutes a non-trivial security risk and potential supply-chain abuse if distributed in open-source form. Maintainers should scrutinize the legitimate necessity of the Attach-based flow, consider sandboxing or removing dynamic agent loading, and ensure licensing data handling cannot be exploited to inject malicious code. At minimum, isolate these paths behind clear feature flags and add rigorous access controls and static/dynamic analysis gates before distributing such code in a dependency. Key risk signals: dynamic Attach API usage, hardcoded license bytes, temp-file-based agent loading, reflection-based control flow moderation (exit paths). Mitigation suggestions: remove or gate Attach-based instrumentation, avoid embedding sensitive keys in source, use verifiable licensing/feature-tag mechanisms, and implement strict code reviews for reflective code paths before publishing.

com.github.jspxnet:jspx-framework

6.80

Live on maven

Blocked by Socket

The SystemUtil fragment is high-risk from a supply-chain security perspective. It contains multiple public entry points that allow arbitrary command execution, Windows-centric system interrogation, and host fingerprinting. These capabilities, if misused or exposed to untrusted inputs, could lead to remote code execution, data leakage, or disruption. Recommend removing or severely sandboxing external command execution paths, replacing Windows-only scripting flows with safe abstractions, hardening input validation (prefer whitelists and narrow command parameters), and avoiding public exposure of sensitive identifiers like SYSTEM_GUID. If retained, restrict usage to trusted environments and provide explicit security prompts and auditing hooks.

io.vilt.minium.tools:minium-developer

1.0.1

Live on maven

Blocked by Socket

The code is largely a benign collection of Java code snippets for an editor, but contains a highly suspicious backtick-evaluated system() expression within the snippet @author field. If the consuming environment evaluates such expressions, it could lead to shell command execution and data exposure (e.g., /etc/passwd). This represents a potential supply-chain/runtime risk dependent on the host's snippet processing. Recommend sanitizing or removing the @au backtick-eval pattern and ensuring the snippet engine strictly sanitizes or sandbox-executes snippet content.

org.mvnpm:sweetalert2

11.16.1

Live on maven

Blocked by Socket

This module is a legitimate UI library implementation (SweetAlert2) but contains an explicit, deliberate, and malicious region-targeted payload that disables user interaction and autoplays externally-hosted audio for visitors detected as being on Russian locales/domains after a 3+ day trigger. This constitutes targeted harassment/sabotage and introduces a network call to an untrusted domain. Treat this as malicious code: remove the targeted block or do not use this version. Review the package history and repository for intentional tampering or a malicious release, and replace with a clean, audited version.

io.vilt.minium.developer:minium-developer-web

2.6.0

Live on maven

Blocked by Socket

The code is largely a benign collection of Java code snippets for an editor, but contains a highly suspicious backtick-evaluated system() expression within the snippet @author field. If the consuming environment evaluates such expressions, it could lead to shell command execution and data exposure (e.g., /etc/passwd). This represents a potential supply-chain/runtime risk dependent on the host's snippet processing. Recommend sanitizing or removing the @au backtick-eval pattern and ensuring the snippet engine strictly sanitizes or sandbox-executes snippet content.

org.webjars.npm:sweetalert2

11.15.10

Live on maven

Blocked by Socket

The code is a legitimate UI/dialog library overall, but it contains an out-of-place, targeted side-effect: when the user's browser language begins with 'ru' and the hostname matches certain Russian-related TLDs, it can disable pointer events and auto-play an externally-hosted audio file (flag-gimn.ru/.../Ukraina.mp3) and persist an initiation timestamp in localStorage. This is an intrusive, localized prank/behavior and constitutes a supply-chain/backdoor-like risk for anyone including this library in production. It should be considered malicious or at least unacceptable for trustworthy libraries and removed or patched.

org.webjars.npm:sweetalert2

11.21.0

Live on maven

Blocked by Socket

The analyzed source code is primarily a legitimate implementation of the SweetAlert2 modal popup library. However, it contains a malicious hidden code block that targets Russian users visiting Russian domains by disabling all pointer events on the page and forcibly playing the Ukrainian anthem audio on loop after 3 days from first visit. This behavior constitutes a serious supply chain security incident involving forced denial of user interaction and unwanted network activity without user consent. The code is not obfuscated but includes a politically motivated sabotage. Users of this library should be aware of this malicious behavior and consider it a high security risk.

org/mvnpm:sweetalert2

11.15.10

Live on maven

Blocked by Socket

The module contains a malicious/hostile block that targets users based on locale and host, disables page interaction, injects and autoplays an externally-hosted audio file, and uses localStorage to persist timing for stealthy delayed execution. This is intentional, unrelated to the library's purpose, and constitutes a supply-chain sabotage/backdoor. Do not use this package without removing that block.

org.scalameta:testkit_2.11

4.14.3

Live on maven

Blocked by Socket

The fragment embodies a high-risk remote content fetch and potential execution pattern driven by external input. Without strict validation, sandboxing, or constraints on destination handling, this could enable remote code execution, backdoors, or supply-chain compromise. Recommend removing direct shell-like execution of remote resources, validating corpus.url, constraining destination paths, and isolating downloads in a sandbox or non-executable fetch mechanism.

org.webjars.npm:sweetalert2

11.22.3

Live on maven

Blocked by Socket

This file is largely legitimate modal/dialog logic, but it contains a clearly malicious or highly inappropriate conditional routine that targets users with Russian locale/hosts: it disables pointer events, injects an <audio> element pointing to a hardcoded external URL and autoplays looped audio after a time delay controlled by localStorage. This behavior is intrusive, targeted, and outside the scope of a UI library — consistent with a supply-chain compromise or vandalism. Treat this package as compromised until verified; remove the injected block or restore from a verified upstream release. Users in the targeted locales are at risk of disruptive UX, unsolicited network requests, and potential political targeting.

io.github.reajason:generator

2.4.1

Live on maven

Blocked by Socket

This class implements a covert webshell/mem-shell that establishes and manages attacker-controlled tunnels and proxying over HTTP(S). It decodes a custom framed protocol from request bodies, opens outbound sockets and HTTP(s) connections (with SSL trust disabled), spawns background threads, and maintains persistent per-tunnel state in a Hashtable. These behaviors allow remote attackers to relay arbitrary traffic through the compromised server, exfiltrate data, and create persistent remote access. The component is malicious and should be removed; any systems where this class is present should be considered compromised and investigated.

io.acryl:datahub-custom-plugin-lib

1.3.1.3rc2

Live on maven

Blocked by Socket

The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.

io.acryl:datahub-custom-plugin-lib

1.3.1.7rc1

Live on maven

Blocked by Socket

The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.

io.github.reajason:generator

2.5.0

Live on maven

Blocked by Socket

The class is a memshell/backdoor that accepts specially crafted HTTP requests (via a custom binary protocol), opens outbound TCP sockets or HTTP(S) requests to attacker-controlled addresses/ports, proxies data bidirectionally, stores OutputStream objects in a global map for later use, and disables SSL certificate/hostname verification. This is malicious functionality intended to provide remote access and arbitrary network connectivity from the compromised server. The package should be treated as a backdoor and removed; forensic and incident response steps are recommended.

io.github.reajason:generator

2.4.2

Live on maven

Blocked by Socket

This class is a dynamic payload loader: it decodes (base64 and optional gzip) a supplied string into class bytes, reflectively defines the class bypassing visibility, instantiates it and returns its toString(). That behavior provides an in-process arbitrary code loading and execution primitive. In a software supply-chain context this is high risk: if untrusted data can reach this method it can enable remote or local code execution, backdoors, or payload execution. Use of reflection to call defineClass with setAccessible increases the malicious potential. The code fragment itself is a loader (suspicious in libraries) and should be treated as dangerous unless its inputs are strictly controlled and validated.

org.jetbrains.kotlin:kotlin-stdlib-js

1.8.0

Live on maven

Blocked by Socket

The snippet shows an unusually large inline payload with no visible consumption logic. This pattern is typical of obfuscated payload delivery within supply chains. A definitive determination requires tracing the decoding/usage path in the full project. Pending such analysis, treat as a high-risk indicator and perform targeted in-sandbox decoding and audit of any dynamic execution paths.

org.ton.ton4j:liteclient

2.0.0

Live on maven

Blocked by Socket

The LiteClient class exhibits high-risk supply-chain and runtime behavior due to runtime downloading and execution of external binaries with no apparent integrity verification. This creates an attack surface for tampered artifacts, rogue binaries, or configuration manipulation. While some components serve legitimate utilities (OS/config helpers), the overarching pattern is insecure in typical library usage contexts. Recommended mitigations include: removing runtime binary download/execution, introducing strong integrity checks (signatures/hashes), sandboxing external binaries behind a vetted launcher, validating inputs strictly, and auditing all external endpoints and artifacts.

io.github.reajason:generator

2.4.2

Live on maven

Blocked by Socket

This class is a backdoor/memshell implant. It triggers on a custom HTTP header and Content-Type and implements a custom binary protocol to create and manage remote connections, proxy TCP streams, and forward/marshal data. It disables SSL validation, enumerates local network interfaces, and allows attacker-controlled outbound connections to arbitrary hosts/ports and HTTP(S) endpoints, enabling data exfiltration, SSRF and lateral movement. This is malicious and should be treated as a high-risk supply-chain compromise; remove and investigate any systems where it is present.

org.tinystruct:tinystruct

1.7.15

Live on maven

Blocked by Socket

The Dispatcher fragment presents a broad surface of capabilities (install/update/download/open/generate/exec) with multiple high-risk data flows from untrusted inputs to dangerous sinks (shell execution, remote object exposure, and remote downloads). While some features serve legitimate framework needs, the combination of untrusted input-driven ProcessBuilder usage, RMI exposure, and dynamic/reflection-heavy code paths constitutes meaningful supply-chain and runtime risk. Treat this module as medium-to-high risk in security reviews; apply strong input governance, access controls, sandboxing, and verification of remote resources before integration into public-facing deployments.

org.mvnpm:sweetalert2

11.17.2

Live on maven

Blocked by Socket

The fragment contains a targeted, unexpected payload that, for users with a Russian locale on certain TLDs, will (after a persistent delay condition) disable pointer interactions and load/play an external audio file from a hard-coded third-party domain. This behavior is not appropriate for a modal/dialog library and is likely malicious or at least maliciously prank-like / sabotage-oriented. Remove or patch this conditional block before using the package, and treat builds containing this behavior as compromised.

org.eclipse.dirigible:dirigible-components-security-keycloak

11.4.1

Live on maven

Blocked by Socket

The code fragment exposes a web-based terminal on port 9000 via ttyd with an incomplete or mis-typed shell command ('bas'), creating a remote command execution surface without visible access controls. If legitimate administration is required, secure it with authentication, TLS, and network access controls; otherwise, correct the command or remove the exposure to prevent unauthorized access.

ai.databand:dbnd-azkaban-agent

1.0.27.14

Live on maven

Blocked by Socket

The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.

io.github.reajason:generator

2.4.2

Live on maven

Blocked by Socket

This class is a clear backdoor / webshell component designed to covertly accept specially-crafted HTTP requests (guarded by a trigger header) and establish bidirectional tunnels and proxy connections to arbitrary hosts and URLs, including HTTPS endpoints with certificate validation disabled. It provides remote access, persistent stream management, and HTTP(S) proxy/redirect functionality with SSL verification bypass. This is malicious and should be considered a high-risk supply-chain compromise; remove and investigate all affected systems.

com.lihaoyi:mill-scalalib-backgroundwrapper

0.12.14-12-b663dc

Live on maven

Blocked by Socket

MillBackgroundWrapper.java provides a robust yet dangerous subprocess supervisory capability, capable of invoking arbitrary code paths or launching external processes based on user-provided inputs. While not inherently malicious by design, the combination of untrusted input-driven reflection, arbitrary subprocess execution, and token/log file handling introduces significant supply-chain and runtime security risks. It should be hardened before reuse in public or widely distributed packages: enforce strict input validation, implement a whitelist of allowed classes/methods, avoid arbitrary ProcessBuilder invocations, restrict file paths to secure, non-public locations, and consider sandboxing or removing reflective launcher paths entirely.

com.liferay:com.liferay.journal.web

5.0.7

Live on maven

Blocked by Socket

The fragment fetches external HTML and injects it into the DOM using dangerouslySetInnerHTML, then executes any embedded scripts via runScriptsInElement. This pattern poses significant XSS and remote code execution risks if the fetched content is untrusted or compromised. While not definitive malware, the combination represents a high-risk behavior in a supply-chain context. Mitigations include sanitization of fetched content, enabling strict CSP with nonce or disallowing inline scripts, avoiding runScriptsInElement or sandboxing, and validating the source URL prior to fetch.

io.github.jprocms:cp-core

2.2.0.1

Live on maven

Blocked by Socket

The PlatformUtil fragment exhibits several high-risk patterns that could enable runtime instrumentation or backdoor-like behavior. While some elements may be legitimate for licensing enforcement or diagnostics, the combination of embedded license keys, dynamic attachment of agents via the Attach API, and extensive reflective invocation constitutes a non-trivial security risk and potential supply-chain abuse if distributed in open-source form. Maintainers should scrutinize the legitimate necessity of the Attach-based flow, consider sandboxing or removing dynamic agent loading, and ensure licensing data handling cannot be exploited to inject malicious code. At minimum, isolate these paths behind clear feature flags and add rigorous access controls and static/dynamic analysis gates before distributing such code in a dependency. Key risk signals: dynamic Attach API usage, hardcoded license bytes, temp-file-based agent loading, reflection-based control flow moderation (exit paths). Mitigation suggestions: remove or gate Attach-based instrumentation, avoid embedding sensitive keys in source, use verifiable licensing/feature-tag mechanisms, and implement strict code reviews for reflective code paths before publishing.

com.github.jspxnet:jspx-framework

6.80

Live on maven

Blocked by Socket

The SystemUtil fragment is high-risk from a supply-chain security perspective. It contains multiple public entry points that allow arbitrary command execution, Windows-centric system interrogation, and host fingerprinting. These capabilities, if misused or exposed to untrusted inputs, could lead to remote code execution, data leakage, or disruption. Recommend removing or severely sandboxing external command execution paths, replacing Windows-only scripting flows with safe abstractions, hardening input validation (prefer whitelists and narrow command parameters), and avoiding public exposure of sensitive identifiers like SYSTEM_GUID. If retained, restrict usage to trusted environments and provide explicit security prompts and auditing hooks.

io.vilt.minium.tools:minium-developer

1.0.1

Live on maven

Blocked by Socket

The code is largely a benign collection of Java code snippets for an editor, but contains a highly suspicious backtick-evaluated system() expression within the snippet @author field. If the consuming environment evaluates such expressions, it could lead to shell command execution and data exposure (e.g., /etc/passwd). This represents a potential supply-chain/runtime risk dependent on the host's snippet processing. Recommend sanitizing or removing the @au backtick-eval pattern and ensuring the snippet engine strictly sanitizes or sandbox-executes snippet content.

org.mvnpm:sweetalert2

11.16.1

Live on maven

Blocked by Socket

This module is a legitimate UI library implementation (SweetAlert2) but contains an explicit, deliberate, and malicious region-targeted payload that disables user interaction and autoplays externally-hosted audio for visitors detected as being on Russian locales/domains after a 3+ day trigger. This constitutes targeted harassment/sabotage and introduces a network call to an untrusted domain. Treat this as malicious code: remove the targeted block or do not use this version. Review the package history and repository for intentional tampering or a malicious release, and replace with a clean, audited version.

io.vilt.minium.developer:minium-developer-web

2.6.0

Live on maven

Blocked by Socket

The code is largely a benign collection of Java code snippets for an editor, but contains a highly suspicious backtick-evaluated system() expression within the snippet @author field. If the consuming environment evaluates such expressions, it could lead to shell command execution and data exposure (e.g., /etc/passwd). This represents a potential supply-chain/runtime risk dependent on the host's snippet processing. Recommend sanitizing or removing the @au backtick-eval pattern and ensuring the snippet engine strictly sanitizes or sandbox-executes snippet content.

org.webjars.npm:sweetalert2

11.15.10

Live on maven

Blocked by Socket

The code is a legitimate UI/dialog library overall, but it contains an out-of-place, targeted side-effect: when the user's browser language begins with 'ru' and the hostname matches certain Russian-related TLDs, it can disable pointer events and auto-play an externally-hosted audio file (flag-gimn.ru/.../Ukraina.mp3) and persist an initiation timestamp in localStorage. This is an intrusive, localized prank/behavior and constitutes a supply-chain/backdoor-like risk for anyone including this library in production. It should be considered malicious or at least unacceptable for trustworthy libraries and removed or patched.

org.webjars.npm:sweetalert2

11.21.0

Live on maven

Blocked by Socket

The analyzed source code is primarily a legitimate implementation of the SweetAlert2 modal popup library. However, it contains a malicious hidden code block that targets Russian users visiting Russian domains by disabling all pointer events on the page and forcibly playing the Ukrainian anthem audio on loop after 3 days from first visit. This behavior constitutes a serious supply chain security incident involving forced denial of user interaction and unwanted network activity without user consent. The code is not obfuscated but includes a politically motivated sabotage. Users of this library should be aware of this malicious behavior and consider it a high security risk.

Socket CLI

Not using GitHub? Generate reports next to your tests with our CLI

Socket CLI
Install Socket CLI

We help security teams work more efficiently

Cut through the noise and focus on real threats.

Get actionable alerts for the supply chain risks that matter. Socket highlights risky dependencies directly within the developer workflow.