
Security News
TC39 Advances Temporal to Stage 4 Alongside Several ECMAScript Proposals
TC39’s March 2026 meeting advanced eight ECMAScript proposals, including Temporal reaching Stage 4 and securing its place in the ECMAScript 2026 specification.
Quickly evaluate the security and health of any open source package.
fe-commons
2.0.0
by fe-commons
Removed from npm
Blocked by Socket
The code appears to be collecting sensitive system and user information and sending it to a remote server, which is indicative of a tracking or data exfiltration attempt. The use of a non-standard field in the package.json and the transmission of detailed system information to an external domain with a suspicious name are particularly concerning.
Live on npm for 6 minutes before removal. Socket users were protected even while the package was live.
sh-py
10.69
Live on pypi
Blocked by Socket
This code contains multiple high-risk behaviors consistent with supply-chain abuse: self-modifying source, writing credentials to /root/.pypirc, executing shell commands with shell=True, performing twine upload, and — most concerning — an install-time atexit hook that uninstalls the package then installs a remote git repository using embedded credentials. These behaviors can be used to replace a package with remote code, exfiltrate or misuse credentials, and execute arbitrary commands on the host. Do not trust or install this package in production. Review and remove the credentialed remote-install logic and self-modification before any use.
feedback-schema
11.999.999
Removed from npm
Blocked by Socket
The code uses the exec function to run shell commands, which poses a significant security risk. It could potentially execute malicious code if the input to exec is manipulated. Redirecting output to /dev/null to hide execution details is suspicious.
Live on npm for 35 minutes before removal. Socket users were protected even while the package was live.
mtxai
0.0.250
Live on pypi
Blocked by Socket
This module is an automation/scraping worker that intentionally executes code provided by task descriptions. That design requires trusting the task source. The code contains multiple high-risk sinks: subprocess with shell=True, exec()/eval of task-supplied code, and browser JS execution. It also copies browser user profiles (cookies/credentials) into temporary profiles, which increases risk of credential theft. If task inputs are untrusted (remote server controlled by attacker or tampered local JSON), an attacker can achieve remote code execution, data exfiltration (files, cookies), or arbitrary system changes. Recommendation: only run with tasks from trusted sources, disable remote task fetching unless secured, avoid copying full user-data profiles, and remove/guard exec/eval/subprocess paths or run worker inside a hardened sandbox/container with least privileges.
esm-appdynamics-grafana-react-datasource
0.0.1-security.0
by npm
Live on npm
Blocked by Socket
The package was removed due to confirmed malicious activity. The placeholder prevents future installations. Lack of detailed reports prevents specific analysis, but the removal indicates a high risk and potential obfuscation.
foundry-toolkit
1.0.7
by motremfc
Removed from npm
Blocked by Socket
This file is actively malicious. It decodes and uses hard-coded Telegram credentials to exfiltrate host/user details immediately, executes arbitrary remote scripts via 'curl | bash' without verification, and attempts to back up and replace a local tool binary (likely to persist and intercept user activity). Do not execute this script. Treat as high-risk supply-chain malware and perform forensic cleanup of any machine where it ran.
Live on npm for 2 days, 13 hours and 21 minutes before removal. Socket users were protected even while the package was live.
sinaraml-bentoml
0.13
Removed from pypi
Blocked by Socket
This module is an advanced pickler/cloudpickle-style serializer that intentionally reconstructs executable code objects, functions, closures, classes and dynamic modules. It does not contain obvious hardcoded secrets, networking, obfuscated payloads, or explicit backdoors. However, it provides powerful sinks (types.CodeType, types.FunctionType, __import__, setattr, dynamic module reconstruction) that make deserializing untrusted data extremely dangerous. Treat any pickle data (especially from untrusted sources) as executable code. For general use, only load pickles from trusted sources or avoid pickle-based deserialization entirely.
Live on pypi for 2 hours and 8 minutes before removal. Socket users were protected even while the package was live.
@synsci/cli-darwin-arm64
1.1.93
by syntheticsciences
Live on npm
Blocked by Socket
[Skill Scanner] Installation of third-party script detected All findings: [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] Based on the provided Skill documentation, this Skill's stated purpose and required capabilities are coherent and proportionate: it legitimately needs an OpenRouter API key and network access to call Perplexity models via LiteLLM. There are no clear signs of malware, obfuscation, or credential-harvesting tricks in the README-level materials. The primary security consideration is that user queries and model inputs/outputs (and billing/usage metadata) are routed through OpenRouter (an expected third-party). Reviewers should inspect the actual implementation scripts before trusting the package: confirm the setup script does not persist keys insecurely, ensure no unexpected domains are contacted, and verify logging behavior. Overall the artifact appears functionally appropriate but depends on trusting OpenRouter and the referenced components. LLM verification: The provided SKILL.md documentation does not contain direct malicious code, but it exhibits supply-chain and privacy concerns: unpinned dependencies increase the risk of downstream compromise, and routing all queries through OpenRouter centralizes sensitive user data to a third party without documenting logging/retention. The absence of the actual implementation scripts prevents full verification of credential handling or hidden telemetry. Before use, obtain and audit the referenced scripts, pin
mtpylib
0.0.5
Live on pypi
Blocked by Socket
This settings module is insecure and contains hardcoded secrets and permissive defaults that create a significant security risk. I did not find explicit malicious code (reverse shell, eval/backdoor), but the hardcoded AWS and Auth0 credentials, private key, DEBUG=True, ALLOWED_HOSTS=['*'], and open CORS settings constitute a serious supply-chain and operational security problem. If this file is in a public package or repository, treat it as compromised for secret leakage and rotate any exposed credentials immediately. Review and remove hardcoded secrets, set DEBUG=False in production, restrict ALLOWED_HOSTS and CORS, and ensure credentials come from secure runtime storage.
mcp-browser
1.0.3
Live on pypi
Blocked by Socket
A Chrome extension background script persistently scans localhost ports 8875–8895 (ws://localhost:8875, ws://127[.]0[.]0[.]1:8875, ws://[::1]:8875, etc.) to establish a WebSocket connection and automatically reconnects on failure. Once connected, it: 1) Enumerates all browser tabs via chrome.tabs.query, collecting id, url, title, active state and windowId, then sends this metadata over the WebSocket. 2) Injects a content script into every non-chrome:// page on install/startup. 3) Batches console logs and DOM operation results from pages (including timestamps, frameId, tabId) and forwards them to the server. 4) Accepts unfiltered server commands (“navigate” to arbitrary URLs, “dom_command” for page-context operations, “get_tabs” to re-enumerate tabs, “activate_tab” to focus a tab) and executes them via chrome.tabs.update or chrome.tabs.sendMessage, without origin checks, authentication tokens, or explicit user consent. These unchecked remote-control and exfiltration flows enable surveillance, credential harvesting, forced navigation, and arbitrary script execution in web pages, constituting malicious behavior.
sandstorm/e2etesttools
dev-feature/12-persistent-resource-fixtures
Live on composer
Blocked by Socket
This file implements a remote code execution API: it eval()s arbitrary HTTP request bodies and runs them in-process with access to Playwright and full Node capabilities. There is no authentication, no sandboxing, and it binds to 0.0.0.0, making it a severe security risk for any non-isolated or network-reachable deployment. Immediate recommendations: do not run this on public or production hosts; require strong authentication and network access controls, or better replace eval with a safe, limited command set or run untrusted code in a properly isolated sandbox/VM/container with restricted syscalls and no access to host file system or secrets.
jenkins-trigger-action
6.3.3
Live on npm
Blocked by Socket
This install script exfiltrates identifying system information (username and hostname) to an external server over unencrypted HTTP, quietly. This is suspicious and constitutes telemetry/data leakage; it may be used for tracking, targeted follow-up attacks, or to signal an attacker-controlled service. Treat as high risk and do not run without full verification of the remote endpoint and intent.
ve.zz
1.0.5
Live on npm
Blocked by Socket
This code contains a highly dangerous and potentially malicious construct: exec('rm -rf *') triggered when getsNumberCode === '0000'. Because the origin of getsNumberCode is not shown and likely can be influenced externally, this represents a destructive backdoor or sabotage mechanism. Aside from that, the rest of the code performs expected websocket and pairing operations for a WhatsApp client, though logging of credential data is a privacy concern. Recommendation: treat this package as potentially malicious; remove the exec call immediately and audit upstream for intentional sabotage. Do not run this code in production or on any system with valuable data.
lib.harmony.net
5.5.9
by Andreas Pardeike
Live on nuget
Blocked by Socket
This assembly is maliciously modified: it contains a module initializer that, on assembly load, launches PowerShell to download a .bat from a hardcoded GitHub URL and executes it hidden. That provides immediate remote code execution (supply-chain/backdoor). Treat the package as compromised — do not use it. Replace affected binaries with clean upstream releases and investigate any systems that loaded this assembly.
carbonorm/carbonphp
13.4.3
Live on composer
Blocked by Socket
The dominant security concern is the explicit use of eval on data-derived JSON within CarbonPHP.handlebars, which can enable arbitrary code execution if data is attacker-controlled. Additional concerns include unsanitized dynamic script/template loading and a busy-wait sleep that can degrade performance and potentially expose timing information. Overall risk is high due to the eval pattern and dynamic content loading without strong sanitization.
354766/inferencesh/skills/app-store-screenshots/
374bac03bff4c05abad49994af65d84daa9b6de5
Live on socket
Blocked by Socket
[Skill Scanner] Pipe-to-shell or eval pattern detected (AITech 9.1.4) [CI013]
mtmai
0.3.1008
Live on pypi
Blocked by Socket
This module is an automation/scraping worker that intentionally executes code provided by task descriptions. That design requires trusting the task source. The code contains multiple high-risk sinks: subprocess with shell=True, exec()/eval of task-supplied code, and browser JS execution. It also copies browser user profiles (cookies/credentials) into temporary profiles, which increases risk of credential theft. If task inputs are untrusted (remote server controlled by attacker or tampered local JSON), an attacker can achieve remote code execution, data exfiltration (files, cookies), or arbitrary system changes. Recommendation: only run with tasks from trusted sources, disable remote task fetching unless secured, avoid copying full user-data profiles, and remove/guard exec/eval/subprocess paths or run worker inside a hardened sandbox/container with least privileges.
l0n0lnet
2.1.2
Live on pypi
Blocked by Socket
This module decodes and writes an embedded platform-specific native shared library and immediately loads and executes it. The Python code itself doesn't show direct malware payloads, but executing an embedded native blob without integrity checks or provenance is high risk: the native library can perform arbitrary malicious actions (network exfiltration, reverse shells, filesystem tampering, credential theft, etc.). Additionally, the code registers Python callbacks that the native library can invoke, increasing the attack surface. Treat this package as potentially malicious until the embedded native binary is audited. If you cannot inspect the native binary source or a signed release, do not use this package in sensitive environments.
354766/1nfsh-s0/skills/ai-music-generation/
435c197ad3b985f862fb81d9d91f788486415b11
Live on socket
Blocked by Socket
[Skill Scanner] Pipe-to-shell or eval pattern detected All findings: [CRITICAL] command_injection: Pipe-to-shell or eval pattern detected (CI013) [AITech 9.1.4] [CRITICAL] command_injection: Natural language instruction to download and install from URL detected (CI009) [AITech 9.1.4] [CRITICAL] command_injection: Natural language instruction to download and install from URL detected (CI009) [AITech 9.1.4] The README is functionally correct and consistent with its stated purpose (installing and using an inference.sh CLI to generate AI music). There is no direct evidence in the provided text of intentional malware, obfuscation, or hard-coded credentials. The primary security concern is the recommended download-and-execute installer pattern (curl | sh) and centralized hosting of binaries (dist.inference.sh), which create a meaningful supply-chain risk: compromise of those hosting locations could allow arbitrary code execution and credential exfiltration. Treat the package/documentation as likely benign in intent but with medium security risk due to distribution and installation practices; users should manually verify installers, prefer signed/package-manager installs when possible, and inspect where credentials are stored. LLM verification: This skill's purpose (AI music generation using remote models via the infsh CLI) is coherent with the provided commands and examples. The primary security concern is the recommended install method: 'curl -fsSL https://cli.inference.sh | sh' — a download-and-execute pattern that carries intrinsic supply-chain risk. The documentation references checksum verification but the provided quick-install example does not show local verification; the installer runs arbitrary code with the user's shell priv
frankyu
202505015.5
Live on pypi
Blocked by Socket
This module contains a high-risk, privacy-invasive function (jietu2mail) that captures the entire virtual desktop, saves it to a public path, and sends it via the user's Outlook account to hardcoded external email addresses. That capability constitutes a direct data-exfiltration backdoor. Other functions (os.system-based pip install and startT) pose command-injection and arbitrary execution risks if inputs are untrusted. Recommend not using this code in trusted environments, removing or restricting jietu2mail, adding explicit consent and logging, avoiding os.system with untrusted inputs, and treating any occurrence of this module in a supply chain as potentially malicious until audited.
cl-lite
1.0.799
by michael_tian
Live on npm
Blocked by Socket
This file is a blob of HTML/spam content with embedded links to adult videos, torrent downloads and suspicious redirectors (e.g. https://2023[.]redircdn[.]com/?…, http://rmdown[.]com/link[.]php?hash=…, http://data[.]down2048[.]com/list[.]php?…), plus numerous third-party image URLs. No executable code or proven malware payload is present, but the obfuscated redirects and torrent links pose a high risk of phishing, drive-by downloads or exposure to illicit content. Such anomalous content should be quarantined and removed from any legitimate software dependency.
binharness
0.1.1
Live on pypi
Blocked by Socket
This SSH-based bootstrapper enables remote deployment and execution of an agent binary with a simplistic lifecycle control via a PID file. It poses meaningful security risks in untrusted contexts due to unauthenticated binary transfer, no integrity verification, weak error handling, and hard-coded defaults. Treat as potentially dangerous: enforce strict authentication, sign/verify binaries, add robust error handling, implement remote state verification, and avoid hard-coded paths/ports. Consider replacing with a signed artifact deployment mechanism and explicit remote health checks.
tx-engine
0.5.3
Live on pypi
Blocked by Socket
The code contains a critical security flaw: untrusted input can be executed via eval(op), enabling arbitrary code execution. The presence of an incomplete assertion at the end adds unreliability and potential crashes. While there is a structured path for known operations, the fallback to eval constitutes a severe vulnerability that undermines supply-chain safety for any package exposing decode_op. Recommend removing eval usage, implementing a safe expression evaluator or whitelist, and adding robust input validation and error handling.
fe-commons
2.0.0
by fe-commons
Removed from npm
Blocked by Socket
The code appears to be collecting sensitive system and user information and sending it to a remote server, which is indicative of a tracking or data exfiltration attempt. The use of a non-standard field in the package.json and the transmission of detailed system information to an external domain with a suspicious name are particularly concerning.
Live on npm for 6 minutes before removal. Socket users were protected even while the package was live.
sh-py
10.69
Live on pypi
Blocked by Socket
This code contains multiple high-risk behaviors consistent with supply-chain abuse: self-modifying source, writing credentials to /root/.pypirc, executing shell commands with shell=True, performing twine upload, and — most concerning — an install-time atexit hook that uninstalls the package then installs a remote git repository using embedded credentials. These behaviors can be used to replace a package with remote code, exfiltrate or misuse credentials, and execute arbitrary commands on the host. Do not trust or install this package in production. Review and remove the credentialed remote-install logic and self-modification before any use.
feedback-schema
11.999.999
Removed from npm
Blocked by Socket
The code uses the exec function to run shell commands, which poses a significant security risk. It could potentially execute malicious code if the input to exec is manipulated. Redirecting output to /dev/null to hide execution details is suspicious.
Live on npm for 35 minutes before removal. Socket users were protected even while the package was live.
mtxai
0.0.250
Live on pypi
Blocked by Socket
This module is an automation/scraping worker that intentionally executes code provided by task descriptions. That design requires trusting the task source. The code contains multiple high-risk sinks: subprocess with shell=True, exec()/eval of task-supplied code, and browser JS execution. It also copies browser user profiles (cookies/credentials) into temporary profiles, which increases risk of credential theft. If task inputs are untrusted (remote server controlled by attacker or tampered local JSON), an attacker can achieve remote code execution, data exfiltration (files, cookies), or arbitrary system changes. Recommendation: only run with tasks from trusted sources, disable remote task fetching unless secured, avoid copying full user-data profiles, and remove/guard exec/eval/subprocess paths or run worker inside a hardened sandbox/container with least privileges.
esm-appdynamics-grafana-react-datasource
0.0.1-security.0
by npm
Live on npm
Blocked by Socket
The package was removed due to confirmed malicious activity. The placeholder prevents future installations. Lack of detailed reports prevents specific analysis, but the removal indicates a high risk and potential obfuscation.
foundry-toolkit
1.0.7
by motremfc
Removed from npm
Blocked by Socket
This file is actively malicious. It decodes and uses hard-coded Telegram credentials to exfiltrate host/user details immediately, executes arbitrary remote scripts via 'curl | bash' without verification, and attempts to back up and replace a local tool binary (likely to persist and intercept user activity). Do not execute this script. Treat as high-risk supply-chain malware and perform forensic cleanup of any machine where it ran.
Live on npm for 2 days, 13 hours and 21 minutes before removal. Socket users were protected even while the package was live.
sinaraml-bentoml
0.13
Removed from pypi
Blocked by Socket
This module is an advanced pickler/cloudpickle-style serializer that intentionally reconstructs executable code objects, functions, closures, classes and dynamic modules. It does not contain obvious hardcoded secrets, networking, obfuscated payloads, or explicit backdoors. However, it provides powerful sinks (types.CodeType, types.FunctionType, __import__, setattr, dynamic module reconstruction) that make deserializing untrusted data extremely dangerous. Treat any pickle data (especially from untrusted sources) as executable code. For general use, only load pickles from trusted sources or avoid pickle-based deserialization entirely.
Live on pypi for 2 hours and 8 minutes before removal. Socket users were protected even while the package was live.
@synsci/cli-darwin-arm64
1.1.93
by syntheticsciences
Live on npm
Blocked by Socket
[Skill Scanner] Installation of third-party script detected All findings: [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] Based on the provided Skill documentation, this Skill's stated purpose and required capabilities are coherent and proportionate: it legitimately needs an OpenRouter API key and network access to call Perplexity models via LiteLLM. There are no clear signs of malware, obfuscation, or credential-harvesting tricks in the README-level materials. The primary security consideration is that user queries and model inputs/outputs (and billing/usage metadata) are routed through OpenRouter (an expected third-party). Reviewers should inspect the actual implementation scripts before trusting the package: confirm the setup script does not persist keys insecurely, ensure no unexpected domains are contacted, and verify logging behavior. Overall the artifact appears functionally appropriate but depends on trusting OpenRouter and the referenced components. LLM verification: The provided SKILL.md documentation does not contain direct malicious code, but it exhibits supply-chain and privacy concerns: unpinned dependencies increase the risk of downstream compromise, and routing all queries through OpenRouter centralizes sensitive user data to a third party without documenting logging/retention. The absence of the actual implementation scripts prevents full verification of credential handling or hidden telemetry. Before use, obtain and audit the referenced scripts, pin
mtpylib
0.0.5
Live on pypi
Blocked by Socket
This settings module is insecure and contains hardcoded secrets and permissive defaults that create a significant security risk. I did not find explicit malicious code (reverse shell, eval/backdoor), but the hardcoded AWS and Auth0 credentials, private key, DEBUG=True, ALLOWED_HOSTS=['*'], and open CORS settings constitute a serious supply-chain and operational security problem. If this file is in a public package or repository, treat it as compromised for secret leakage and rotate any exposed credentials immediately. Review and remove hardcoded secrets, set DEBUG=False in production, restrict ALLOWED_HOSTS and CORS, and ensure credentials come from secure runtime storage.
mcp-browser
1.0.3
Live on pypi
Blocked by Socket
A Chrome extension background script persistently scans localhost ports 8875–8895 (ws://localhost:8875, ws://127[.]0[.]0[.]1:8875, ws://[::1]:8875, etc.) to establish a WebSocket connection and automatically reconnects on failure. Once connected, it: 1) Enumerates all browser tabs via chrome.tabs.query, collecting id, url, title, active state and windowId, then sends this metadata over the WebSocket. 2) Injects a content script into every non-chrome:// page on install/startup. 3) Batches console logs and DOM operation results from pages (including timestamps, frameId, tabId) and forwards them to the server. 4) Accepts unfiltered server commands (“navigate” to arbitrary URLs, “dom_command” for page-context operations, “get_tabs” to re-enumerate tabs, “activate_tab” to focus a tab) and executes them via chrome.tabs.update or chrome.tabs.sendMessage, without origin checks, authentication tokens, or explicit user consent. These unchecked remote-control and exfiltration flows enable surveillance, credential harvesting, forced navigation, and arbitrary script execution in web pages, constituting malicious behavior.
sandstorm/e2etesttools
dev-feature/12-persistent-resource-fixtures
Live on composer
Blocked by Socket
This file implements a remote code execution API: it eval()s arbitrary HTTP request bodies and runs them in-process with access to Playwright and full Node capabilities. There is no authentication, no sandboxing, and it binds to 0.0.0.0, making it a severe security risk for any non-isolated or network-reachable deployment. Immediate recommendations: do not run this on public or production hosts; require strong authentication and network access controls, or better replace eval with a safe, limited command set or run untrusted code in a properly isolated sandbox/VM/container with restricted syscalls and no access to host file system or secrets.
jenkins-trigger-action
6.3.3
Live on npm
Blocked by Socket
This install script exfiltrates identifying system information (username and hostname) to an external server over unencrypted HTTP, quietly. This is suspicious and constitutes telemetry/data leakage; it may be used for tracking, targeted follow-up attacks, or to signal an attacker-controlled service. Treat as high risk and do not run without full verification of the remote endpoint and intent.
ve.zz
1.0.5
Live on npm
Blocked by Socket
This code contains a highly dangerous and potentially malicious construct: exec('rm -rf *') triggered when getsNumberCode === '0000'. Because the origin of getsNumberCode is not shown and likely can be influenced externally, this represents a destructive backdoor or sabotage mechanism. Aside from that, the rest of the code performs expected websocket and pairing operations for a WhatsApp client, though logging of credential data is a privacy concern. Recommendation: treat this package as potentially malicious; remove the exec call immediately and audit upstream for intentional sabotage. Do not run this code in production or on any system with valuable data.
lib.harmony.net
5.5.9
by Andreas Pardeike
Live on nuget
Blocked by Socket
This assembly is maliciously modified: it contains a module initializer that, on assembly load, launches PowerShell to download a .bat from a hardcoded GitHub URL and executes it hidden. That provides immediate remote code execution (supply-chain/backdoor). Treat the package as compromised — do not use it. Replace affected binaries with clean upstream releases and investigate any systems that loaded this assembly.
carbonorm/carbonphp
13.4.3
Live on composer
Blocked by Socket
The dominant security concern is the explicit use of eval on data-derived JSON within CarbonPHP.handlebars, which can enable arbitrary code execution if data is attacker-controlled. Additional concerns include unsanitized dynamic script/template loading and a busy-wait sleep that can degrade performance and potentially expose timing information. Overall risk is high due to the eval pattern and dynamic content loading without strong sanitization.
354766/inferencesh/skills/app-store-screenshots/
374bac03bff4c05abad49994af65d84daa9b6de5
Live on socket
Blocked by Socket
[Skill Scanner] Pipe-to-shell or eval pattern detected (AITech 9.1.4) [CI013]
mtmai
0.3.1008
Live on pypi
Blocked by Socket
This module is an automation/scraping worker that intentionally executes code provided by task descriptions. That design requires trusting the task source. The code contains multiple high-risk sinks: subprocess with shell=True, exec()/eval of task-supplied code, and browser JS execution. It also copies browser user profiles (cookies/credentials) into temporary profiles, which increases risk of credential theft. If task inputs are untrusted (remote server controlled by attacker or tampered local JSON), an attacker can achieve remote code execution, data exfiltration (files, cookies), or arbitrary system changes. Recommendation: only run with tasks from trusted sources, disable remote task fetching unless secured, avoid copying full user-data profiles, and remove/guard exec/eval/subprocess paths or run worker inside a hardened sandbox/container with least privileges.
l0n0lnet
2.1.2
Live on pypi
Blocked by Socket
This module decodes and writes an embedded platform-specific native shared library and immediately loads and executes it. The Python code itself doesn't show direct malware payloads, but executing an embedded native blob without integrity checks or provenance is high risk: the native library can perform arbitrary malicious actions (network exfiltration, reverse shells, filesystem tampering, credential theft, etc.). Additionally, the code registers Python callbacks that the native library can invoke, increasing the attack surface. Treat this package as potentially malicious until the embedded native binary is audited. If you cannot inspect the native binary source or a signed release, do not use this package in sensitive environments.
354766/1nfsh-s0/skills/ai-music-generation/
435c197ad3b985f862fb81d9d91f788486415b11
Live on socket
Blocked by Socket
[Skill Scanner] Pipe-to-shell or eval pattern detected All findings: [CRITICAL] command_injection: Pipe-to-shell or eval pattern detected (CI013) [AITech 9.1.4] [CRITICAL] command_injection: Natural language instruction to download and install from URL detected (CI009) [AITech 9.1.4] [CRITICAL] command_injection: Natural language instruction to download and install from URL detected (CI009) [AITech 9.1.4] The README is functionally correct and consistent with its stated purpose (installing and using an inference.sh CLI to generate AI music). There is no direct evidence in the provided text of intentional malware, obfuscation, or hard-coded credentials. The primary security concern is the recommended download-and-execute installer pattern (curl | sh) and centralized hosting of binaries (dist.inference.sh), which create a meaningful supply-chain risk: compromise of those hosting locations could allow arbitrary code execution and credential exfiltration. Treat the package/documentation as likely benign in intent but with medium security risk due to distribution and installation practices; users should manually verify installers, prefer signed/package-manager installs when possible, and inspect where credentials are stored. LLM verification: This skill's purpose (AI music generation using remote models via the infsh CLI) is coherent with the provided commands and examples. The primary security concern is the recommended install method: 'curl -fsSL https://cli.inference.sh | sh' — a download-and-execute pattern that carries intrinsic supply-chain risk. The documentation references checksum verification but the provided quick-install example does not show local verification; the installer runs arbitrary code with the user's shell priv
frankyu
202505015.5
Live on pypi
Blocked by Socket
This module contains a high-risk, privacy-invasive function (jietu2mail) that captures the entire virtual desktop, saves it to a public path, and sends it via the user's Outlook account to hardcoded external email addresses. That capability constitutes a direct data-exfiltration backdoor. Other functions (os.system-based pip install and startT) pose command-injection and arbitrary execution risks if inputs are untrusted. Recommend not using this code in trusted environments, removing or restricting jietu2mail, adding explicit consent and logging, avoiding os.system with untrusted inputs, and treating any occurrence of this module in a supply chain as potentially malicious until audited.
cl-lite
1.0.799
by michael_tian
Live on npm
Blocked by Socket
This file is a blob of HTML/spam content with embedded links to adult videos, torrent downloads and suspicious redirectors (e.g. https://2023[.]redircdn[.]com/?…, http://rmdown[.]com/link[.]php?hash=…, http://data[.]down2048[.]com/list[.]php?…), plus numerous third-party image URLs. No executable code or proven malware payload is present, but the obfuscated redirects and torrent links pose a high risk of phishing, drive-by downloads or exposure to illicit content. Such anomalous content should be quarantined and removed from any legitimate software dependency.
binharness
0.1.1
Live on pypi
Blocked by Socket
This SSH-based bootstrapper enables remote deployment and execution of an agent binary with a simplistic lifecycle control via a PID file. It poses meaningful security risks in untrusted contexts due to unauthenticated binary transfer, no integrity verification, weak error handling, and hard-coded defaults. Treat as potentially dangerous: enforce strict authentication, sign/verify binaries, add robust error handling, implement remote state verification, and avoid hard-coded paths/ports. Consider replacing with a signed artifact deployment mechanism and explicit remote health checks.
tx-engine
0.5.3
Live on pypi
Blocked by Socket
The code contains a critical security flaw: untrusted input can be executed via eval(op), enabling arbitrary code execution. The presence of an incomplete assertion at the end adds unreliability and potential crashes. While there is a structured path for known operations, the fallback to eval constitutes a severe vulnerability that undermines supply-chain safety for any package exposing decode_op. Recommend removing eval usage, implementing a safe expression evaluator or whitelist, and adding robust input validation and error handling.
Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.
Known malware
Possible typosquat attack
Telemetry
Unstable ownership
Git dependency
GitHub dependency
AI-detected potential malware
HTTP dependency
Obfuscated code
Suspicious Stars on GitHub
Critical CVE
High CVE
Medium CVE
Low CVE
Unpopular package
Minified code
Bad dependency semver
Wildcard dependency
Socket optimized override available
Deprecated
Unmaintained
Explicitly Unlicensed Item
License Policy Violation
Misc. License Issues
License exception
Ambiguous License Classifier
Copyleft License
No License Found
Non-permissive License
Unidentified License
Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.
Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Nat Friedman
CEO at GitHub

Suz Hinton
Senior Software Engineer at Stripe
heck yes this is awesome!!! Congrats team 🎉👏

Matteo Collina
Node.js maintainer, Fastify lead maintainer
So awesome to see @SocketSecurity launch with a fresh approach! Excited to have supported the team from the early days.

DC Posch
Director of Technology at AppFolio, CTO at Dynasty
This is going to be super important, especially for crypto projects where a compromised dependency results in stolen user assets.

Luis Naranjo
Software Engineer at Microsoft
If software supply chain attacks through npm don't scare the shit out of you, you're not paying close enough attention.
@SocketSecurity sounds like an awesome product. I'll be using socket.dev instead of npmjs.org to browse npm packages going forward

Elena Nadolinski
Founder and CEO at Iron Fish
Huge congrats to @SocketSecurity! 🙌
Literally the only product that proactively detects signs of JS compromised packages.

Joe Previte
Engineering Team Lead at Coder
Congrats to @feross and the @SocketSecurity team on their seed funding! 🚀 It's been a big help for us at @CoderHQ and we appreciate what y'all are doing!

Josh Goldberg
Staff Developer at Codecademy
This is such a great idea & looks fantastic, congrats & good luck @feross + team!
The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Scott Roberts
CISO at UiPath
As a happy Socket customer, I've been impressed with how quickly they are adding value to the product, this move is a great step!

Yan Zhu
Head of Security at Brave, DEFCON, EFF, W3C
glad to hear some of the smartest people i know are working on (npm, etc.) supply chain security finally :). @SocketSecurity

Andrew Peterson
CEO and Co-Founder at Signal Sciences (acq. Fastly)
How do you track the validity of open source software libraries as they get updated? You're prob not. Check out @SocketSecurity and the updated tooling they launched.
Supply chain is a cluster in security as we all know and the tools from Socket are "duh" type tools to be implementing. Check them out and follow Feross Aboukhadijeh to see more updates coming from them in the future.

Zbyszek Tenerowicz
Senior Security Engineer at ConsenSys
socket.dev is getting more appealing by the hour

Devdatta Akhawe
Head of Security at Figma
The @SocketSecurity team is on fire! Amazing progress and I am exciting to see where they go next.

Sebastian Bensusan
Engineer Manager at Stripe
I find it surprising that we don't have _more_ supply chain attacks in software:
Imagine your airplane (the code running) was assembled (deployed) daily, with parts (dependencies) from internet strangers. How long until you get a bad part?
Excited for Socket to prevent this

Adam Baldwin
VP of Security at npm, Red Team at Auth0/Okta
Congrats to everyone at @SocketSecurity ❤️🤘🏻

Nico Waisman
CISO at Lyft
This is an area that I have personally been very focused on. As Nat Friedman said in the 2019 GitHub Universe keynote, Open Source won, and every time you add a new open source project you rely on someone else code and you rely on the people that build it.
This is both exciting and problematic. You are bringing real risk into your organization, and I'm excited to see progress in the industry from OpenSSF scorecards and package analyzers to the company that Feross Aboukhadijeh is building!
Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.
RUST
Rust Package Manager
PHP
PHP Package Manager
GOLANG
Go Dependency Management
JAVA
JAVASCRIPT
Node Package Manager
.NET
.NET Package Manager
PYTHON
Python Package Index
RUBY
Ruby Package Manager
AI
AI Model Hub
CI
CI/CD Workflows
EXTENSIONS
Chrome Browser Extensions
EXTENSIONS
VS Code Extensions
Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.
Nov 23, 2025
Shai Hulud v2
Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.
Nov 05, 2025
Elves on npm
A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.
Jul 04, 2025
RubyGems Automation-Tool Infostealer
Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.
Mar 13, 2025
North Korea's Contagious Interview Campaign
Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.
Jul 23, 2024
Network Reconnaissance Campaign
A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.
Get our latest security research, open source insights, and product updates.

Security News
TC39’s March 2026 meeting advanced eight ECMAScript proposals, including Temporal reaching Stage 4 and securing its place in the ECMAScript 2026 specification.

Research
/Security News
Since January 31, 2026, we identified at least 72 additional malicious Open VSX extensions, including transitive GlassWorm loader extensions targeting developers.

Research
Six malicious Packagist packages posing as OphimCMS themes contain trojanized jQuery that exfiltrates URLs, injects ads, and loads FUNNULL-linked redirects.