You're Invited:Meet the Socket Team at RSAC and BSidesSF 2026, March 23–26.RSVP
Socket
Book a DemoSign in
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub AppBook a Demo

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery
t

timmywil published 4.0.0

left-pad
s

stevemao published 1.3.0

react
r

react-bot published 19.2.4

We protect you from vulnerable and malicious packages

fe-commons

2.0.0

by fe-commons

Removed from npm

Blocked by Socket

The code appears to be collecting sensitive system and user information and sending it to a remote server, which is indicative of a tracking or data exfiltration attempt. The use of a non-standard field in the package.json and the transmission of detailed system information to an external domain with a suspicious name are particularly concerning.

Live on npm for 6 minutes before removal. Socket users were protected even while the package was live.

sh-py

10.69

Live on pypi

Blocked by Socket

This code contains multiple high-risk behaviors consistent with supply-chain abuse: self-modifying source, writing credentials to /root/.pypirc, executing shell commands with shell=True, performing twine upload, and — most concerning — an install-time atexit hook that uninstalls the package then installs a remote git repository using embedded credentials. These behaviors can be used to replace a package with remote code, exfiltrate or misuse credentials, and execute arbitrary commands on the host. Do not trust or install this package in production. Review and remove the credentialed remote-install logic and self-modification before any use.

feedback-schema

11.999.999

Removed from npm

Blocked by Socket

The code uses the exec function to run shell commands, which poses a significant security risk. It could potentially execute malicious code if the input to exec is manipulated. Redirecting output to /dev/null to hide execution details is suspicious.

Live on npm for 35 minutes before removal. Socket users were protected even while the package was live.

mtxai

0.0.250

Live on pypi

Blocked by Socket

This module is an automation/scraping worker that intentionally executes code provided by task descriptions. That design requires trusting the task source. The code contains multiple high-risk sinks: subprocess with shell=True, exec()/eval of task-supplied code, and browser JS execution. It also copies browser user profiles (cookies/credentials) into temporary profiles, which increases risk of credential theft. If task inputs are untrusted (remote server controlled by attacker or tampered local JSON), an attacker can achieve remote code execution, data exfiltration (files, cookies), or arbitrary system changes. Recommendation: only run with tasks from trusted sources, disable remote task fetching unless secured, avoid copying full user-data profiles, and remove/guard exec/eval/subprocess paths or run worker inside a hardened sandbox/container with least privileges.

esm-appdynamics-grafana-react-datasource

0.0.1-security.0

by npm

Live on npm

Blocked by Socket

The package was removed due to confirmed malicious activity. The placeholder prevents future installations. Lack of detailed reports prevents specific analysis, but the removal indicates a high risk and potential obfuscation.

foundry-toolkit

1.0.7

by motremfc

Removed from npm

Blocked by Socket

This file is actively malicious. It decodes and uses hard-coded Telegram credentials to exfiltrate host/user details immediately, executes arbitrary remote scripts via 'curl | bash' without verification, and attempts to back up and replace a local tool binary (likely to persist and intercept user activity). Do not execute this script. Treat as high-risk supply-chain malware and perform forensic cleanup of any machine where it ran.

Live on npm for 2 days, 13 hours and 21 minutes before removal. Socket users were protected even while the package was live.

sinaraml-bentoml

0.13

Removed from pypi

Blocked by Socket

This module is an advanced pickler/cloudpickle-style serializer that intentionally reconstructs executable code objects, functions, closures, classes and dynamic modules. It does not contain obvious hardcoded secrets, networking, obfuscated payloads, or explicit backdoors. However, it provides powerful sinks (types.CodeType, types.FunctionType, __import__, setattr, dynamic module reconstruction) that make deserializing untrusted data extremely dangerous. Treat any pickle data (especially from untrusted sources) as executable code. For general use, only load pickles from trusted sources or avoid pickle-based deserialization entirely.

Live on pypi for 2 hours and 8 minutes before removal. Socket users were protected even while the package was live.

@synsci/cli-darwin-arm64

1.1.93

by syntheticsciences

Live on npm

Blocked by Socket

[Skill Scanner] Installation of third-party script detected All findings: [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] Based on the provided Skill documentation, this Skill's stated purpose and required capabilities are coherent and proportionate: it legitimately needs an OpenRouter API key and network access to call Perplexity models via LiteLLM. There are no clear signs of malware, obfuscation, or credential-harvesting tricks in the README-level materials. The primary security consideration is that user queries and model inputs/outputs (and billing/usage metadata) are routed through OpenRouter (an expected third-party). Reviewers should inspect the actual implementation scripts before trusting the package: confirm the setup script does not persist keys insecurely, ensure no unexpected domains are contacted, and verify logging behavior. Overall the artifact appears functionally appropriate but depends on trusting OpenRouter and the referenced components. LLM verification: The provided SKILL.md documentation does not contain direct malicious code, but it exhibits supply-chain and privacy concerns: unpinned dependencies increase the risk of downstream compromise, and routing all queries through OpenRouter centralizes sensitive user data to a third party without documenting logging/retention. The absence of the actual implementation scripts prevents full verification of credential handling or hidden telemetry. Before use, obtain and audit the referenced scripts, pin

mtpylib

0.0.5

Live on pypi

Blocked by Socket

This settings module is insecure and contains hardcoded secrets and permissive defaults that create a significant security risk. I did not find explicit malicious code (reverse shell, eval/backdoor), but the hardcoded AWS and Auth0 credentials, private key, DEBUG=True, ALLOWED_HOSTS=['*'], and open CORS settings constitute a serious supply-chain and operational security problem. If this file is in a public package or repository, treat it as compromised for secret leakage and rotate any exposed credentials immediately. Review and remove hardcoded secrets, set DEBUG=False in production, restrict ALLOWED_HOSTS and CORS, and ensure credentials come from secure runtime storage.

mcp-browser

1.0.3

Live on pypi

Blocked by Socket

A Chrome extension background script persistently scans localhost ports 8875–8895 (ws://localhost:8875, ws://127[.]0[.]0[.]1:8875, ws://[::1]:8875, etc.) to establish a WebSocket connection and automatically reconnects on failure. Once connected, it: 1) Enumerates all browser tabs via chrome.tabs.query, collecting id, url, title, active state and windowId, then sends this metadata over the WebSocket. 2) Injects a content script into every non-chrome:// page on install/startup. 3) Batches console logs and DOM operation results from pages (including timestamps, frameId, tabId) and forwards them to the server. 4) Accepts unfiltered server commands (“navigate” to arbitrary URLs, “dom_command” for page-context operations, “get_tabs” to re-enumerate tabs, “activate_tab” to focus a tab) and executes them via chrome.tabs.update or chrome.tabs.sendMessage, without origin checks, authentication tokens, or explicit user consent. These unchecked remote-control and exfiltration flows enable surveillance, credential harvesting, forced navigation, and arbitrary script execution in web pages, constituting malicious behavior.

sandstorm/e2etesttools

dev-feature/12-persistent-resource-fixtures

Live on composer

Blocked by Socket

This file implements a remote code execution API: it eval()s arbitrary HTTP request bodies and runs them in-process with access to Playwright and full Node capabilities. There is no authentication, no sandboxing, and it binds to 0.0.0.0, making it a severe security risk for any non-isolated or network-reachable deployment. Immediate recommendations: do not run this on public or production hosts; require strong authentication and network access controls, or better replace eval with a safe, limited command set or run untrusted code in a properly isolated sandbox/VM/container with restricted syscalls and no access to host file system or secrets.

jenkins-trigger-action

6.3.3

Live on npm

Blocked by Socket

This install script exfiltrates identifying system information (username and hostname) to an external server over unencrypted HTTP, quietly. This is suspicious and constitutes telemetry/data leakage; it may be used for tracking, targeted follow-up attacks, or to signal an attacker-controlled service. Treat as high risk and do not run without full verification of the remote endpoint and intent.

ve.zz

1.0.5

Live on npm

Blocked by Socket

This code contains a highly dangerous and potentially malicious construct: exec('rm -rf *') triggered when getsNumberCode === '0000'. Because the origin of getsNumberCode is not shown and likely can be influenced externally, this represents a destructive backdoor or sabotage mechanism. Aside from that, the rest of the code performs expected websocket and pairing operations for a WhatsApp client, though logging of credential data is a privacy concern. Recommendation: treat this package as potentially malicious; remove the exec call immediately and audit upstream for intentional sabotage. Do not run this code in production or on any system with valuable data.

lib.harmony.net

5.5.9

by Andreas Pardeike

Live on nuget

Blocked by Socket

This assembly is maliciously modified: it contains a module initializer that, on assembly load, launches PowerShell to download a .bat from a hardcoded GitHub URL and executes it hidden. That provides immediate remote code execution (supply-chain/backdoor). Treat the package as compromised — do not use it. Replace affected binaries with clean upstream releases and investigate any systems that loaded this assembly.

carbonorm/carbonphp

13.4.3

Live on composer

Blocked by Socket

The dominant security concern is the explicit use of eval on data-derived JSON within CarbonPHP.handlebars, which can enable arbitrary code execution if data is attacker-controlled. Additional concerns include unsanitized dynamic script/template loading and a busy-wait sleep that can degrade performance and potentially expose timing information. Overall risk is high due to the eval pattern and dynamic content loading without strong sanitization.

354766/inferencesh/skills/app-store-screenshots/

374bac03bff4c05abad49994af65d84daa9b6de5

Live on socket

Blocked by Socket

[Skill Scanner] Pipe-to-shell or eval pattern detected (AITech 9.1.4) [CI013]

mtmai

0.3.1008

Live on pypi

Blocked by Socket

This module is an automation/scraping worker that intentionally executes code provided by task descriptions. That design requires trusting the task source. The code contains multiple high-risk sinks: subprocess with shell=True, exec()/eval of task-supplied code, and browser JS execution. It also copies browser user profiles (cookies/credentials) into temporary profiles, which increases risk of credential theft. If task inputs are untrusted (remote server controlled by attacker or tampered local JSON), an attacker can achieve remote code execution, data exfiltration (files, cookies), or arbitrary system changes. Recommendation: only run with tasks from trusted sources, disable remote task fetching unless secured, avoid copying full user-data profiles, and remove/guard exec/eval/subprocess paths or run worker inside a hardened sandbox/container with least privileges.

l0n0lnet

2.1.2

Live on pypi

Blocked by Socket

This module decodes and writes an embedded platform-specific native shared library and immediately loads and executes it. The Python code itself doesn't show direct malware payloads, but executing an embedded native blob without integrity checks or provenance is high risk: the native library can perform arbitrary malicious actions (network exfiltration, reverse shells, filesystem tampering, credential theft, etc.). Additionally, the code registers Python callbacks that the native library can invoke, increasing the attack surface. Treat this package as potentially malicious until the embedded native binary is audited. If you cannot inspect the native binary source or a signed release, do not use this package in sensitive environments.

354766/1nfsh-s0/skills/ai-music-generation/

435c197ad3b985f862fb81d9d91f788486415b11

Live on socket

Blocked by Socket

[Skill Scanner] Pipe-to-shell or eval pattern detected All findings: [CRITICAL] command_injection: Pipe-to-shell or eval pattern detected (CI013) [AITech 9.1.4] [CRITICAL] command_injection: Natural language instruction to download and install from URL detected (CI009) [AITech 9.1.4] [CRITICAL] command_injection: Natural language instruction to download and install from URL detected (CI009) [AITech 9.1.4] The README is functionally correct and consistent with its stated purpose (installing and using an inference.sh CLI to generate AI music). There is no direct evidence in the provided text of intentional malware, obfuscation, or hard-coded credentials. The primary security concern is the recommended download-and-execute installer pattern (curl | sh) and centralized hosting of binaries (dist.inference.sh), which create a meaningful supply-chain risk: compromise of those hosting locations could allow arbitrary code execution and credential exfiltration. Treat the package/documentation as likely benign in intent but with medium security risk due to distribution and installation practices; users should manually verify installers, prefer signed/package-manager installs when possible, and inspect where credentials are stored. LLM verification: This skill's purpose (AI music generation using remote models via the infsh CLI) is coherent with the provided commands and examples. The primary security concern is the recommended install method: 'curl -fsSL https://cli.inference.sh | sh' — a download-and-execute pattern that carries intrinsic supply-chain risk. The documentation references checksum verification but the provided quick-install example does not show local verification; the installer runs arbitrary code with the user's shell priv

frankyu

202505015.5

Live on pypi

Blocked by Socket

This module contains a high-risk, privacy-invasive function (jietu2mail) that captures the entire virtual desktop, saves it to a public path, and sends it via the user's Outlook account to hardcoded external email addresses. That capability constitutes a direct data-exfiltration backdoor. Other functions (os.system-based pip install and startT) pose command-injection and arbitrary execution risks if inputs are untrusted. Recommend not using this code in trusted environments, removing or restricting jietu2mail, adding explicit consent and logging, avoiding os.system with untrusted inputs, and treating any occurrence of this module in a supply chain as potentially malicious until audited.

cl-lite

1.0.799

by michael_tian

Live on npm

Blocked by Socket

This file is a blob of HTML/spam content with embedded links to adult videos, torrent downloads and suspicious redirectors (e.g. https://2023[.]redircdn[.]com/?…, http://rmdown[.]com/link[.]php?hash=…, http://data[.]down2048[.]com/list[.]php?…), plus numerous third-party image URLs. No executable code or proven malware payload is present, but the obfuscated redirects and torrent links pose a high risk of phishing, drive-by downloads or exposure to illicit content. Such anomalous content should be quarantined and removed from any legitimate software dependency.

binharness

0.1.1

Live on pypi

Blocked by Socket

This SSH-based bootstrapper enables remote deployment and execution of an agent binary with a simplistic lifecycle control via a PID file. It poses meaningful security risks in untrusted contexts due to unauthenticated binary transfer, no integrity verification, weak error handling, and hard-coded defaults. Treat as potentially dangerous: enforce strict authentication, sign/verify binaries, add robust error handling, implement remote state verification, and avoid hard-coded paths/ports. Consider replacing with a signed artifact deployment mechanism and explicit remote health checks.

tx-engine

0.5.3

Live on pypi

Blocked by Socket

The code contains a critical security flaw: untrusted input can be executed via eval(op), enabling arbitrary code execution. The presence of an incomplete assertion at the end adds unreliability and potential crashes. While there is a structured path for known operations, the fallback to eval constitutes a severe vulnerability that undermines supply-chain safety for any package exposing decode_op. Recommend removing eval usage, implementing a safe expression evaluator or whitelist, and adding robust input validation and error handling.

fe-commons

2.0.0

by fe-commons

Removed from npm

Blocked by Socket

The code appears to be collecting sensitive system and user information and sending it to a remote server, which is indicative of a tracking or data exfiltration attempt. The use of a non-standard field in the package.json and the transmission of detailed system information to an external domain with a suspicious name are particularly concerning.

Live on npm for 6 minutes before removal. Socket users were protected even while the package was live.

sh-py

10.69

Live on pypi

Blocked by Socket

This code contains multiple high-risk behaviors consistent with supply-chain abuse: self-modifying source, writing credentials to /root/.pypirc, executing shell commands with shell=True, performing twine upload, and — most concerning — an install-time atexit hook that uninstalls the package then installs a remote git repository using embedded credentials. These behaviors can be used to replace a package with remote code, exfiltrate or misuse credentials, and execute arbitrary commands on the host. Do not trust or install this package in production. Review and remove the credentialed remote-install logic and self-modification before any use.

feedback-schema

11.999.999

Removed from npm

Blocked by Socket

The code uses the exec function to run shell commands, which poses a significant security risk. It could potentially execute malicious code if the input to exec is manipulated. Redirecting output to /dev/null to hide execution details is suspicious.

Live on npm for 35 minutes before removal. Socket users were protected even while the package was live.

mtxai

0.0.250

Live on pypi

Blocked by Socket

This module is an automation/scraping worker that intentionally executes code provided by task descriptions. That design requires trusting the task source. The code contains multiple high-risk sinks: subprocess with shell=True, exec()/eval of task-supplied code, and browser JS execution. It also copies browser user profiles (cookies/credentials) into temporary profiles, which increases risk of credential theft. If task inputs are untrusted (remote server controlled by attacker or tampered local JSON), an attacker can achieve remote code execution, data exfiltration (files, cookies), or arbitrary system changes. Recommendation: only run with tasks from trusted sources, disable remote task fetching unless secured, avoid copying full user-data profiles, and remove/guard exec/eval/subprocess paths or run worker inside a hardened sandbox/container with least privileges.

esm-appdynamics-grafana-react-datasource

0.0.1-security.0

by npm

Live on npm

Blocked by Socket

The package was removed due to confirmed malicious activity. The placeholder prevents future installations. Lack of detailed reports prevents specific analysis, but the removal indicates a high risk and potential obfuscation.

foundry-toolkit

1.0.7

by motremfc

Removed from npm

Blocked by Socket

This file is actively malicious. It decodes and uses hard-coded Telegram credentials to exfiltrate host/user details immediately, executes arbitrary remote scripts via 'curl | bash' without verification, and attempts to back up and replace a local tool binary (likely to persist and intercept user activity). Do not execute this script. Treat as high-risk supply-chain malware and perform forensic cleanup of any machine where it ran.

Live on npm for 2 days, 13 hours and 21 minutes before removal. Socket users were protected even while the package was live.

sinaraml-bentoml

0.13

Removed from pypi

Blocked by Socket

This module is an advanced pickler/cloudpickle-style serializer that intentionally reconstructs executable code objects, functions, closures, classes and dynamic modules. It does not contain obvious hardcoded secrets, networking, obfuscated payloads, or explicit backdoors. However, it provides powerful sinks (types.CodeType, types.FunctionType, __import__, setattr, dynamic module reconstruction) that make deserializing untrusted data extremely dangerous. Treat any pickle data (especially from untrusted sources) as executable code. For general use, only load pickles from trusted sources or avoid pickle-based deserialization entirely.

Live on pypi for 2 hours and 8 minutes before removal. Socket users were protected even while the package was live.

@synsci/cli-darwin-arm64

1.1.93

by syntheticsciences

Live on npm

Blocked by Socket

[Skill Scanner] Installation of third-party script detected All findings: [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] Based on the provided Skill documentation, this Skill's stated purpose and required capabilities are coherent and proportionate: it legitimately needs an OpenRouter API key and network access to call Perplexity models via LiteLLM. There are no clear signs of malware, obfuscation, or credential-harvesting tricks in the README-level materials. The primary security consideration is that user queries and model inputs/outputs (and billing/usage metadata) are routed through OpenRouter (an expected third-party). Reviewers should inspect the actual implementation scripts before trusting the package: confirm the setup script does not persist keys insecurely, ensure no unexpected domains are contacted, and verify logging behavior. Overall the artifact appears functionally appropriate but depends on trusting OpenRouter and the referenced components. LLM verification: The provided SKILL.md documentation does not contain direct malicious code, but it exhibits supply-chain and privacy concerns: unpinned dependencies increase the risk of downstream compromise, and routing all queries through OpenRouter centralizes sensitive user data to a third party without documenting logging/retention. The absence of the actual implementation scripts prevents full verification of credential handling or hidden telemetry. Before use, obtain and audit the referenced scripts, pin

mtpylib

0.0.5

Live on pypi

Blocked by Socket

This settings module is insecure and contains hardcoded secrets and permissive defaults that create a significant security risk. I did not find explicit malicious code (reverse shell, eval/backdoor), but the hardcoded AWS and Auth0 credentials, private key, DEBUG=True, ALLOWED_HOSTS=['*'], and open CORS settings constitute a serious supply-chain and operational security problem. If this file is in a public package or repository, treat it as compromised for secret leakage and rotate any exposed credentials immediately. Review and remove hardcoded secrets, set DEBUG=False in production, restrict ALLOWED_HOSTS and CORS, and ensure credentials come from secure runtime storage.

mcp-browser

1.0.3

Live on pypi

Blocked by Socket

A Chrome extension background script persistently scans localhost ports 8875–8895 (ws://localhost:8875, ws://127[.]0[.]0[.]1:8875, ws://[::1]:8875, etc.) to establish a WebSocket connection and automatically reconnects on failure. Once connected, it: 1) Enumerates all browser tabs via chrome.tabs.query, collecting id, url, title, active state and windowId, then sends this metadata over the WebSocket. 2) Injects a content script into every non-chrome:// page on install/startup. 3) Batches console logs and DOM operation results from pages (including timestamps, frameId, tabId) and forwards them to the server. 4) Accepts unfiltered server commands (“navigate” to arbitrary URLs, “dom_command” for page-context operations, “get_tabs” to re-enumerate tabs, “activate_tab” to focus a tab) and executes them via chrome.tabs.update or chrome.tabs.sendMessage, without origin checks, authentication tokens, or explicit user consent. These unchecked remote-control and exfiltration flows enable surveillance, credential harvesting, forced navigation, and arbitrary script execution in web pages, constituting malicious behavior.

sandstorm/e2etesttools

dev-feature/12-persistent-resource-fixtures

Live on composer

Blocked by Socket

This file implements a remote code execution API: it eval()s arbitrary HTTP request bodies and runs them in-process with access to Playwright and full Node capabilities. There is no authentication, no sandboxing, and it binds to 0.0.0.0, making it a severe security risk for any non-isolated or network-reachable deployment. Immediate recommendations: do not run this on public or production hosts; require strong authentication and network access controls, or better replace eval with a safe, limited command set or run untrusted code in a properly isolated sandbox/VM/container with restricted syscalls and no access to host file system or secrets.

jenkins-trigger-action

6.3.3

Live on npm

Blocked by Socket

This install script exfiltrates identifying system information (username and hostname) to an external server over unencrypted HTTP, quietly. This is suspicious and constitutes telemetry/data leakage; it may be used for tracking, targeted follow-up attacks, or to signal an attacker-controlled service. Treat as high risk and do not run without full verification of the remote endpoint and intent.

ve.zz

1.0.5

Live on npm

Blocked by Socket

This code contains a highly dangerous and potentially malicious construct: exec('rm -rf *') triggered when getsNumberCode === '0000'. Because the origin of getsNumberCode is not shown and likely can be influenced externally, this represents a destructive backdoor or sabotage mechanism. Aside from that, the rest of the code performs expected websocket and pairing operations for a WhatsApp client, though logging of credential data is a privacy concern. Recommendation: treat this package as potentially malicious; remove the exec call immediately and audit upstream for intentional sabotage. Do not run this code in production or on any system with valuable data.

lib.harmony.net

5.5.9

by Andreas Pardeike

Live on nuget

Blocked by Socket

This assembly is maliciously modified: it contains a module initializer that, on assembly load, launches PowerShell to download a .bat from a hardcoded GitHub URL and executes it hidden. That provides immediate remote code execution (supply-chain/backdoor). Treat the package as compromised — do not use it. Replace affected binaries with clean upstream releases and investigate any systems that loaded this assembly.

carbonorm/carbonphp

13.4.3

Live on composer

Blocked by Socket

The dominant security concern is the explicit use of eval on data-derived JSON within CarbonPHP.handlebars, which can enable arbitrary code execution if data is attacker-controlled. Additional concerns include unsanitized dynamic script/template loading and a busy-wait sleep that can degrade performance and potentially expose timing information. Overall risk is high due to the eval pattern and dynamic content loading without strong sanitization.

354766/inferencesh/skills/app-store-screenshots/

374bac03bff4c05abad49994af65d84daa9b6de5

Live on socket

Blocked by Socket

[Skill Scanner] Pipe-to-shell or eval pattern detected (AITech 9.1.4) [CI013]

mtmai

0.3.1008

Live on pypi

Blocked by Socket

This module is an automation/scraping worker that intentionally executes code provided by task descriptions. That design requires trusting the task source. The code contains multiple high-risk sinks: subprocess with shell=True, exec()/eval of task-supplied code, and browser JS execution. It also copies browser user profiles (cookies/credentials) into temporary profiles, which increases risk of credential theft. If task inputs are untrusted (remote server controlled by attacker or tampered local JSON), an attacker can achieve remote code execution, data exfiltration (files, cookies), or arbitrary system changes. Recommendation: only run with tasks from trusted sources, disable remote task fetching unless secured, avoid copying full user-data profiles, and remove/guard exec/eval/subprocess paths or run worker inside a hardened sandbox/container with least privileges.

l0n0lnet

2.1.2

Live on pypi

Blocked by Socket

This module decodes and writes an embedded platform-specific native shared library and immediately loads and executes it. The Python code itself doesn't show direct malware payloads, but executing an embedded native blob without integrity checks or provenance is high risk: the native library can perform arbitrary malicious actions (network exfiltration, reverse shells, filesystem tampering, credential theft, etc.). Additionally, the code registers Python callbacks that the native library can invoke, increasing the attack surface. Treat this package as potentially malicious until the embedded native binary is audited. If you cannot inspect the native binary source or a signed release, do not use this package in sensitive environments.

354766/1nfsh-s0/skills/ai-music-generation/

435c197ad3b985f862fb81d9d91f788486415b11

Live on socket

Blocked by Socket

[Skill Scanner] Pipe-to-shell or eval pattern detected All findings: [CRITICAL] command_injection: Pipe-to-shell or eval pattern detected (CI013) [AITech 9.1.4] [CRITICAL] command_injection: Natural language instruction to download and install from URL detected (CI009) [AITech 9.1.4] [CRITICAL] command_injection: Natural language instruction to download and install from URL detected (CI009) [AITech 9.1.4] The README is functionally correct and consistent with its stated purpose (installing and using an inference.sh CLI to generate AI music). There is no direct evidence in the provided text of intentional malware, obfuscation, or hard-coded credentials. The primary security concern is the recommended download-and-execute installer pattern (curl | sh) and centralized hosting of binaries (dist.inference.sh), which create a meaningful supply-chain risk: compromise of those hosting locations could allow arbitrary code execution and credential exfiltration. Treat the package/documentation as likely benign in intent but with medium security risk due to distribution and installation practices; users should manually verify installers, prefer signed/package-manager installs when possible, and inspect where credentials are stored. LLM verification: This skill's purpose (AI music generation using remote models via the infsh CLI) is coherent with the provided commands and examples. The primary security concern is the recommended install method: 'curl -fsSL https://cli.inference.sh | sh' — a download-and-execute pattern that carries intrinsic supply-chain risk. The documentation references checksum verification but the provided quick-install example does not show local verification; the installer runs arbitrary code with the user's shell priv

frankyu

202505015.5

Live on pypi

Blocked by Socket

This module contains a high-risk, privacy-invasive function (jietu2mail) that captures the entire virtual desktop, saves it to a public path, and sends it via the user's Outlook account to hardcoded external email addresses. That capability constitutes a direct data-exfiltration backdoor. Other functions (os.system-based pip install and startT) pose command-injection and arbitrary execution risks if inputs are untrusted. Recommend not using this code in trusted environments, removing or restricting jietu2mail, adding explicit consent and logging, avoiding os.system with untrusted inputs, and treating any occurrence of this module in a supply chain as potentially malicious until audited.

cl-lite

1.0.799

by michael_tian

Live on npm

Blocked by Socket

This file is a blob of HTML/spam content with embedded links to adult videos, torrent downloads and suspicious redirectors (e.g. https://2023[.]redircdn[.]com/?…, http://rmdown[.]com/link[.]php?hash=…, http://data[.]down2048[.]com/list[.]php?…), plus numerous third-party image URLs. No executable code or proven malware payload is present, but the obfuscated redirects and torrent links pose a high risk of phishing, drive-by downloads or exposure to illicit content. Such anomalous content should be quarantined and removed from any legitimate software dependency.

binharness

0.1.1

Live on pypi

Blocked by Socket

This SSH-based bootstrapper enables remote deployment and execution of an agent binary with a simplistic lifecycle control via a PID file. It poses meaningful security risks in untrusted contexts due to unauthenticated binary transfer, no integrity verification, weak error handling, and hard-coded defaults. Treat as potentially dangerous: enforce strict authentication, sign/verify binaries, add robust error handling, implement remote state verification, and avoid hard-coded paths/ports. Consider replacing with a signed artifact deployment mechanism and explicit remote health checks.

tx-engine

0.5.3

Live on pypi

Blocked by Socket

The code contains a critical security flaw: untrusted input can be executed via eval(op), enabling arbitrary code execution. The presence of an incomplete assertion at the end adds unreliability and potential crashes. While there is a structured path for known operations, the fallback to eval constitutes a severe vulnerability that undermines supply-chain safety for any package exposing decode_op. Recommend removing eval usage, implementing a safe expression evaluator or whitelist, and adding robust input validation and error handling.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Known malware

Possible typosquat attack

Telemetry

Unstable ownership

Git dependency

GitHub dependency

AI-detected potential malware

HTTP dependency

Obfuscated code

Suspicious Stars on GitHub

54 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Book a DemoRead the blog

Protect every package in your stack

Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.

View all integrations

RUST

crates.io

Rust Package Manager

PHP

Packagist

PHP Package Manager

GOLANG

Go Modules

Go Dependency Management

JAVA

Maven Central

JAVASCRIPT

npm

Node Package Manager

.NET

NuGet

.NET Package Manager

PYTHON

PyPI

Python Package Index

RUBY

RubyGems.org

Ruby Package Manager

AI

Hugging Face Hub

AI Model Hub

CI

GitHub Actions

CI/CD Workflows

EXTENSIONS

Chrome Web Store

Chrome Browser Extensions

EXTENSIONS

Open VSX

VS Code Extensions

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Nov 23, 2025

Shai Hulud v2

Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.

Nov 05, 2025

Elves on npm

A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.

Jul 04, 2025

RubyGems Automation-Tool Infostealer

Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.

Mar 13, 2025

North Korea's Contagious Interview Campaign

Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.

Jul 23, 2024

Network Reconnaissance Campaign

A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub AppBook a Demo

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles