Security News
CVE Volume Surges Past 48,000 in 2025 as WordPress Plugin Ecosystem Drives Growth
CVE disclosures hit a record 48,185 in 2025, driven largely by vulnerabilities in third-party WordPress plugins.
Quickly evaluate the security and health of any open source package.
tofeyai
0.2.4
Live on PyPI
Blocked by Socket
The code poses a significant security risk due to the use of suspicious URLs, hardcoded API key, and lack of validation for downloaded images. Further investigation is recommended to determine the intent and safety of the code.
worki
1.0.0
by h0x1-test
Removed from npm
Blocked by Socket
This package runs two local Node scripts during installation. That behavior is potentially dangerous because it executes arbitrary code on the host. The missing pre.js from the published files is suspicious. Inspect the contents of index.js and pre.js before installing; treat this as a high-risk install-time script until proven safe.
Live on npm for 2 days, 2 hours and 16 minutes before removal. Socket users were protected even while the package was live.
queenamdi-functions-beta
0.9.8
by blackamda
Live on npm
Blocked by Socket
This code fragment is highly obfuscated and constructs structured messages that include admin and system information, then asynchronously sends those payloads to external endpoints. That behavior matches data-exfiltration/notification patterns. Because implementations of the send functions and the final destinations are not included, I cannot definitively classify it as malicious. Treat this module as suspicious: if you cannot confirm the recipients and purpose, do not run it in sensitive environments. Review the deobfuscation routine and the send functions to determine actual endpoints and whether sensitive data is transmitted to unauthorized parties.
dolibabyphp
1.0.0
Live on PyPI
Blocked by Socket
This module is a deliberate offensive tool designed to achieve remote code execution against Dolibarr instances by creating content pages containing arbitrary PHP, triggering their execution, collecting output, and then attempting destructive cleanup via rm on the remote host. Inclusion of this code in a dependency is a critical supply-chain risk. Treat as malicious/unwanted in almost all production contexts unless explicitly used for authorized security testing; remove, investigate, and rotate any potentially compromised credentials/endpoints if found.
dependabot-update-job-runner
9999.9999.9999
by Ohio Schools R1 Admin
Live on RubyGems.org
Blocked by Socket
This code collects system-identifying data (username, hostname, file path), hex-encodes it, constructs a domain under a hardcoded external base ('furb.pw') embedding that data into subdomain labels, and issues an HTTPS GET to that domain — a clear data-exfiltration pattern. The behavior is malicious or at minimum privacy-invasive telemetry sent to an external third party. The package should not be trusted or used without removal of the network exfiltration logic and a full audit.
monolith-twirp-dependabot-settings
1.13.2
by Nick Quaranto
Live on RubyGems.org
Blocked by Socket
This Ruby script gathers sensitive host data (username via ENV or `whoami`, hostname via Socket.gethostname, and its own file path), hex-encodes each piece, and embeds them into a dynamically constructed subdomain under furb[.]pw (e.g. a<username_hex>.a<hostname_hex>.a<filepath_hex>.furb[.]pw). It then issues an HTTPS GET request to that domain via Net::HTTP, effectively exfiltrating system identifiers to an attacker-controlled endpoint. The use of an inverted `unless __FILE__ == $0` guard causes the code to run when the file is loaded as a library, making it a stealthy supply-chain backdoor with no user consent or visible functionality.
com.meta.xr.sdk.avatars
29.7.0
by jpdhackerone03
Removed from npm
Blocked by Socket
The source code exhibits behavior consistent with data exfiltration malware. It collects sensitive system information and sends it to external endpoints without user consent, posing a significant security risk.
Live on npm for 19 days and 41 minutes before removal. Socket users were protected even while the package was live.
yujin-tools
0.4.46
Live on PyPI
Blocked by Socket
The script misleadingly claims to add the current user to a system group by referring to the ${USER} environment variable, yet it actually adds a hardcoded username ('snorri') to the 'users' group. It then prompts the user for confirmation to change their primary group to 'users' using sudo usermod commands. This behavior, which deviates from the claimed action, may indicate an attempt to silently establish a backdoor with elevated privileges and facilitate unauthorized access. No domains, IP addresses, or external URLs are involved.
domains-uglify
1.1.7
by meow-test
Removed from npm
Blocked by Socket
The script is sending system information to a remote server without clear justification. This behavior is highly suspicious and potentially malicious.
Live on npm for 31 days, 21 hours and 46 minutes before removal. Socket users were protected even while the package was live.
exp10it
2.5.46
Live on PyPI
Blocked by Socket
This file is offensive/exploit tooling: it performs automated reconnaissance, crafts and sends SQLi and PHP eval payloads against Joomla sites, extracts credentials/session data, and attempts to install a PHP webshell for persistence. Those behaviors constitute malicious activity (unauthorized access, credential theft, backdoor installation). Treat this code as malicious/exploitative; do not include it in trusted dependencies or run it on networks you do not own/authorize. The snippet contains some syntactic errors suggesting a truncated copy, but intent and many operational parts are explicit.
label-merge-conflicts-action
9.9.9
by dextester123456
Removed from npm
Blocked by Socket
The script is designed to send sensitive information from the system to an external server, which is malicious behavior and poses a severe security risk.
Live on npm for 13 days, 22 hours and 42 minutes before removal. Socket users were protected even while the package was live.
pyatp
1.2.8
Live on PyPI
Blocked by Socket
This script contains high-risk behaviors. The most critical issues are: (1) unconditional torch.load() of discovered .pt files (pickle deserialization) which can execute arbitrary code if a checkpoint is malicious, and (2) constructing and executing shell commands via os.system with unsanitized path insertion (shell injection risk). Additionally, it will recursively search and resume many checkpoints, launching silent background processes that can exhaust resources. If this code runs in environments where attacker-controlled files or paths exist (typical in shared CI runners, build hosts, or during dependency installation), it is dangerous and should not be used without strict file trust guarantees and proper sanitization/quoting. Recommended fixes: avoid loading untrusted checkpoints; validate and strictly control checkpoint sources; use torch.load with appropriate map_location and safer deserialization patterns (avoid pickle when possible); avoid os.system with untrusted interpolated values — use subprocess with args list and proper quoting; do not background/redirect silently.
atalasoft.dotimage.pdfdoc.barcodewriting.x86
11.5.0.8329
by Atalasoft
Live on NuGet
Blocked by Socket
This file mixes legitimate barcode->PDF rendering classes with a large, intentionally obfuscated runtime component that decrypts embedded resources and exposes low-level native APIs (VirtualAlloc, WriteProcessMemory, OpenProcess, GetProcAddress, etc.) and performs runtime code generation. Those behaviors are strong indicators of malicious/suspicious capability (code injection, executing decrypted payloads, runtime hooking). Even if the barcode functionality is benign, the obfuscated runtime provides all primitives needed for in-memory payload execution and process manipulation. I assess this as high risk — treat the package as potentially malicious and do not use it without thorough auditing and removal of the obfuscated/decryption/native parts.
burplabs
0.2.3
Live on PyPI
Blocked by Socket
This code constructs and delivers a CSRF exploit page intended to change a victim's email address — it is explicitly an offensive action. It contains unsafe networking practices (verify=False, suppressed warnings) and a hard-coded CSRF token. The snippet is incomplete and syntactically broken here, but the intent is malicious: the module is an exploit helper for delivering CSRF payloads. Treat this code as potentially harmful; do not run it against real systems without explicit authorization (only use in controlled lab or testing environments).
x-mroy-1046
0.1.9
Live on PyPI
Blocked by Socket
This module exposes a UDP remote-control interface that can execute system-level operations, reinstall packages via shell commands, and exfiltrate local files. The dynamic invocation of Os/ProxyCircle methods from untrusted UDP input, file upload capability, and use of os.popen for package uninstallation/installation are high-risk behaviors consistent with a backdoor or remote administration tool. If deployed on untrusted networks or without strict cryptographic authentication in the referenced libs, it poses a severe supply-chain and system compromise risk. Recommend treating this package as dangerous until shown otherwise and auditing related modules (pubip_rsa, oscmd, FileHandle, Format/deFormat) for authentication and unsafe behavior.
jupiter-opensdk
5.999.0
by officeathand
Removed from npm
Blocked by Socket
This code contains highly malicious behavior, it collects sensitive system information and sends it to a remote server. It's strongly recommended not to use this code.
Live on npm for 21 days, 3 hours and 49 minutes before removal. Socket users were protected even while the package was live.
bapy
0.2.168
Live on PyPI
Blocked by Socket
Malicious bash initialization script that performs destructive filesystem operations on macOS systems. When the external helper script 'isuserdarwin.sh' returns true, the script silently executes 'sudo rm -rf' to delete critical user directories including ~/Applications, ~/Movies, ~/Music, ~/Pictures, ~/Public, and ~/Sites without user confirmation. It also removes the macOS sleepimage file at /private/var/vm/sleepimage. The script modifies SSH directory permissions using 'sudo chmod -R go-rw' which can break SSH access or expose credentials. All destructive operations have their output suppressed with '>/dev/null 2>&1' to hide failures and make the actions stealthy. The script uses eval to execute the output of /usr/bin/dircolors, creating a command injection risk if the binary is compromised. It depends on external scripts (paper.sh, isuserdarwin.sh, debug.sh) whose contents are unknown and could execute arbitrary code. The destructive operations are embedded within what appears to be routine shell configuration code, likely to disguise the malicious intent.
myvaroniswebapp
100.0.5
by johndoe666
Removed from npm
Blocked by Socket
The code is exfiltrating sensitive system information to an external server without user consent, which is a clear malicious activity. This poses a significant security risk.
Live on npm for 2 days, 13 hours and 23 minutes before removal. Socket users were protected even while the package was live.
ip-report
0.0.29
Live on npm
Blocked by Socket
This module is a remote agent that creates a persistent outbound WebSocket connection to a (default) remote server and exposes powerful remote capabilities: arbitrary shell execution, file reading, process management, desktop screenshotting, and simulated input (mouse/keyboard). The network protocol uses a weak custom encryption scheme and sends a client key in clear. The code can be legitimately used for remote support/administration, but it also has all the capabilities of a Remote Access Trojan (RAT). If this package is included in software without explicit, audited user consent and server control, it poses a high supply-chain risk. Use only with full knowledge of the server endpoint and after security review.
mcp-proxy-execute
0.1.0
Removed from PyPI
Blocked by Socket
The code is a cross-server tool orchestrator with nested invocation support. The primary security risk stems from evaluating transform expressions via eval, which could enable arbitrary code execution if untrusted inputs are supplied. While there are safeguards (identifier checks, limited builtins), the approach remains risky for open-source or supply chain contexts. The incomplete main block hints at potential syntax issues or truncation. Overall, moderate risk with a notable high-risk vector (transform expression evaluation) that warrants safer evaluation or formal sandboxing before deployment.
Live on PyPI for 2 minutes before removal. Socket users were protected even while the package was live.
meutils
2025.4.19.14.50.54
Live on PyPI
Blocked by Socket
The code sends sensitive credentials from environment variables over an unencrypted HTTP connection to an external API service at api[.]sqhyw[.]net:90. It authenticates using username/password from the YEZI_USER environment variable, retrieves access tokens, and automates the process of obtaining mobile phone numbers and SMS verification codes. This behavior poses significant supply chain security risks through: (1) leakage of environment variable credentials over unencrypted HTTP, (2) interaction with a suspicious external domain on a non-standard port, (3) logging of potentially sensitive API responses including tokens and SMS codes, and (4) facilitation of SMS verification bypass which could enable fraudulent account creation or spam activities. The code continuously polls the external API for up to 120 seconds to retrieve SMS codes, creating additional operational risks. While not containing traditional malware payloads, the credential exfiltration and suspicious external communication patterns justify classification as malware due to the significant security risks posed to systems that deploy this code.
ocean-karma-faj575
1.0.0
by afifaljafari112
Removed from npm
Blocked by Socket
The provided code imports several modules with unusual naming conventions and calls a method `functame` on each. The purpose and behavior of the code are unclear, and the naming conventions suggest potential obfuscation. However, without more context or additional code, it is difficult to definitively identify any malicious behavior.
Live on npm for 57 days, 7 hours and 31 minutes before removal. Socket users were protected even while the package was live.
durex-app
1.0.0
by nguyenthuwann
Removed from npm
Blocked by Socket
The code contains suspicious elements like hard-coded hex strings, dynamic execution, and conditional sending of data to external servers, which could indicate potential malicious intent or data exfiltration.
Live on npm for 59 minutes before removal. Socket users were protected even while the package was live.
tofeyai
0.2.4
Live on PyPI
Blocked by Socket
The code poses a significant security risk due to the use of suspicious URLs, hardcoded API key, and lack of validation for downloaded images. Further investigation is recommended to determine the intent and safety of the code.
worki
1.0.0
by h0x1-test
Removed from npm
Blocked by Socket
This package runs two local Node scripts during installation. That behavior is potentially dangerous because it executes arbitrary code on the host. The missing pre.js from the published files is suspicious. Inspect the contents of index.js and pre.js before installing; treat this as a high-risk install-time script until proven safe.
Live on npm for 2 days, 2 hours and 16 minutes before removal. Socket users were protected even while the package was live.
queenamdi-functions-beta
0.9.8
by blackamda
Live on npm
Blocked by Socket
This code fragment is highly obfuscated and constructs structured messages that include admin and system information, then asynchronously sends those payloads to external endpoints. That behavior matches data-exfiltration/notification patterns. Because implementations of the send functions and the final destinations are not included, I cannot definitively classify it as malicious. Treat this module as suspicious: if you cannot confirm the recipients and purpose, do not run it in sensitive environments. Review the deobfuscation routine and the send functions to determine actual endpoints and whether sensitive data is transmitted to unauthorized parties.
dolibabyphp
1.0.0
Live on PyPI
Blocked by Socket
This module is a deliberate offensive tool designed to achieve remote code execution against Dolibarr instances by creating content pages containing arbitrary PHP, triggering their execution, collecting output, and then attempting destructive cleanup via rm on the remote host. Inclusion of this code in a dependency is a critical supply-chain risk. Treat as malicious/unwanted in almost all production contexts unless explicitly used for authorized security testing; remove, investigate, and rotate any potentially compromised credentials/endpoints if found.
dependabot-update-job-runner
9999.9999.9999
by Ohio Schools R1 Admin
Live on RubyGems.org
Blocked by Socket
This code collects system-identifying data (username, hostname, file path), hex-encodes it, constructs a domain under a hardcoded external base ('furb.pw') embedding that data into subdomain labels, and issues an HTTPS GET to that domain — a clear data-exfiltration pattern. The behavior is malicious or at minimum privacy-invasive telemetry sent to an external third party. The package should not be trusted or used without removal of the network exfiltration logic and a full audit.
monolith-twirp-dependabot-settings
1.13.2
by Nick Quaranto
Live on RubyGems.org
Blocked by Socket
This Ruby script gathers sensitive host data (username via ENV or `whoami`, hostname via Socket.gethostname, and its own file path), hex-encodes each piece, and embeds them into a dynamically constructed subdomain under furb[.]pw (e.g. a<username_hex>.a<hostname_hex>.a<filepath_hex>.furb[.]pw). It then issues an HTTPS GET request to that domain via Net::HTTP, effectively exfiltrating system identifiers to an attacker-controlled endpoint. The use of an inverted `unless __FILE__ == $0` guard causes the code to run when the file is loaded as a library, making it a stealthy supply-chain backdoor with no user consent or visible functionality.
com.meta.xr.sdk.avatars
29.7.0
by jpdhackerone03
Removed from npm
Blocked by Socket
The source code exhibits behavior consistent with data exfiltration malware. It collects sensitive system information and sends it to external endpoints without user consent, posing a significant security risk.
Live on npm for 19 days and 41 minutes before removal. Socket users were protected even while the package was live.
yujin-tools
0.4.46
Live on PyPI
Blocked by Socket
The script misleadingly claims to add the current user to a system group by referring to the ${USER} environment variable, yet it actually adds a hardcoded username ('snorri') to the 'users' group. It then prompts the user for confirmation to change their primary group to 'users' using sudo usermod commands. This behavior, which deviates from the claimed action, may indicate an attempt to silently establish a backdoor with elevated privileges and facilitate unauthorized access. No domains, IP addresses, or external URLs are involved.
domains-uglify
1.1.7
by meow-test
Removed from npm
Blocked by Socket
The script is sending system information to a remote server without clear justification. This behavior is highly suspicious and potentially malicious.
Live on npm for 31 days, 21 hours and 46 minutes before removal. Socket users were protected even while the package was live.
exp10it
2.5.46
Live on PyPI
Blocked by Socket
This file is offensive/exploit tooling: it performs automated reconnaissance, crafts and sends SQLi and PHP eval payloads against Joomla sites, extracts credentials/session data, and attempts to install a PHP webshell for persistence. Those behaviors constitute malicious activity (unauthorized access, credential theft, backdoor installation). Treat this code as malicious/exploitative; do not include it in trusted dependencies or run it on networks you do not own/authorize. The snippet contains some syntactic errors suggesting a truncated copy, but intent and many operational parts are explicit.
label-merge-conflicts-action
9.9.9
by dextester123456
Removed from npm
Blocked by Socket
The script is designed to send sensitive information from the system to an external server, which is malicious behavior and poses a severe security risk.
Live on npm for 13 days, 22 hours and 42 minutes before removal. Socket users were protected even while the package was live.
pyatp
1.2.8
Live on PyPI
Blocked by Socket
This script contains high-risk behaviors. The most critical issues are: (1) unconditional torch.load() of discovered .pt files (pickle deserialization) which can execute arbitrary code if a checkpoint is malicious, and (2) constructing and executing shell commands via os.system with unsanitized path insertion (shell injection risk). Additionally, it will recursively search and resume many checkpoints, launching silent background processes that can exhaust resources. If this code runs in environments where attacker-controlled files or paths exist (typical in shared CI runners, build hosts, or during dependency installation), it is dangerous and should not be used without strict file trust guarantees and proper sanitization/quoting. Recommended fixes: avoid loading untrusted checkpoints; validate and strictly control checkpoint sources; use torch.load with appropriate map_location and safer deserialization patterns (avoid pickle when possible); avoid os.system with untrusted interpolated values — use subprocess with args list and proper quoting; do not background/redirect silently.
atalasoft.dotimage.pdfdoc.barcodewriting.x86
11.5.0.8329
by Atalasoft
Live on NuGet
Blocked by Socket
This file mixes legitimate barcode->PDF rendering classes with a large, intentionally obfuscated runtime component that decrypts embedded resources and exposes low-level native APIs (VirtualAlloc, WriteProcessMemory, OpenProcess, GetProcAddress, etc.) and performs runtime code generation. Those behaviors are strong indicators of malicious/suspicious capability (code injection, executing decrypted payloads, runtime hooking). Even if the barcode functionality is benign, the obfuscated runtime provides all primitives needed for in-memory payload execution and process manipulation. I assess this as high risk — treat the package as potentially malicious and do not use it without thorough auditing and removal of the obfuscated/decryption/native parts.
burplabs
0.2.3
Live on PyPI
Blocked by Socket
This code constructs and delivers a CSRF exploit page intended to change a victim's email address — it is explicitly an offensive action. It contains unsafe networking practices (verify=False, suppressed warnings) and a hard-coded CSRF token. The snippet is incomplete and syntactically broken here, but the intent is malicious: the module is an exploit helper for delivering CSRF payloads. Treat this code as potentially harmful; do not run it against real systems without explicit authorization (only use in controlled lab or testing environments).
x-mroy-1046
0.1.9
Live on PyPI
Blocked by Socket
This module exposes a UDP remote-control interface that can execute system-level operations, reinstall packages via shell commands, and exfiltrate local files. The dynamic invocation of Os/ProxyCircle methods from untrusted UDP input, file upload capability, and use of os.popen for package uninstallation/installation are high-risk behaviors consistent with a backdoor or remote administration tool. If deployed on untrusted networks or without strict cryptographic authentication in the referenced libs, it poses a severe supply-chain and system compromise risk. Recommend treating this package as dangerous until shown otherwise and auditing related modules (pubip_rsa, oscmd, FileHandle, Format/deFormat) for authentication and unsafe behavior.
jupiter-opensdk
5.999.0
by officeathand
Removed from npm
Blocked by Socket
This code contains highly malicious behavior, it collects sensitive system information and sends it to a remote server. It's strongly recommended not to use this code.
Live on npm for 21 days, 3 hours and 49 minutes before removal. Socket users were protected even while the package was live.
bapy
0.2.168
Live on PyPI
Blocked by Socket
Malicious bash initialization script that performs destructive filesystem operations on macOS systems. When the external helper script 'isuserdarwin.sh' returns true, the script silently executes 'sudo rm -rf' to delete critical user directories including ~/Applications, ~/Movies, ~/Music, ~/Pictures, ~/Public, and ~/Sites without user confirmation. It also removes the macOS sleepimage file at /private/var/vm/sleepimage. The script modifies SSH directory permissions using 'sudo chmod -R go-rw' which can break SSH access or expose credentials. All destructive operations have their output suppressed with '>/dev/null 2>&1' to hide failures and make the actions stealthy. The script uses eval to execute the output of /usr/bin/dircolors, creating a command injection risk if the binary is compromised. It depends on external scripts (paper.sh, isuserdarwin.sh, debug.sh) whose contents are unknown and could execute arbitrary code. The destructive operations are embedded within what appears to be routine shell configuration code, likely to disguise the malicious intent.
myvaroniswebapp
100.0.5
by johndoe666
Removed from npm
Blocked by Socket
The code is exfiltrating sensitive system information to an external server without user consent, which is a clear malicious activity. This poses a significant security risk.
Live on npm for 2 days, 13 hours and 23 minutes before removal. Socket users were protected even while the package was live.
ip-report
0.0.29
Live on npm
Blocked by Socket
This module is a remote agent that creates a persistent outbound WebSocket connection to a (default) remote server and exposes powerful remote capabilities: arbitrary shell execution, file reading, process management, desktop screenshotting, and simulated input (mouse/keyboard). The network protocol uses a weak custom encryption scheme and sends a client key in clear. The code can be legitimately used for remote support/administration, but it also has all the capabilities of a Remote Access Trojan (RAT). If this package is included in software without explicit, audited user consent and server control, it poses a high supply-chain risk. Use only with full knowledge of the server endpoint and after security review.
mcp-proxy-execute
0.1.0
Removed from PyPI
Blocked by Socket
The code is a cross-server tool orchestrator with nested invocation support. The primary security risk stems from evaluating transform expressions via eval, which could enable arbitrary code execution if untrusted inputs are supplied. While there are safeguards (identifier checks, limited builtins), the approach remains risky for open-source or supply chain contexts. The incomplete main block hints at potential syntax issues or truncation. Overall, moderate risk with a notable high-risk vector (transform expression evaluation) that warrants safer evaluation or formal sandboxing before deployment.
Live on PyPI for 2 minutes before removal. Socket users were protected even while the package was live.
meutils
2025.4.19.14.50.54
Live on PyPI
Blocked by Socket
The code sends sensitive credentials from environment variables over an unencrypted HTTP connection to an external API service at api[.]sqhyw[.]net:90. It authenticates using username/password from the YEZI_USER environment variable, retrieves access tokens, and automates the process of obtaining mobile phone numbers and SMS verification codes. This behavior poses significant supply chain security risks through: (1) leakage of environment variable credentials over unencrypted HTTP, (2) interaction with a suspicious external domain on a non-standard port, (3) logging of potentially sensitive API responses including tokens and SMS codes, and (4) facilitation of SMS verification bypass which could enable fraudulent account creation or spam activities. The code continuously polls the external API for up to 120 seconds to retrieve SMS codes, creating additional operational risks. While not containing traditional malware payloads, the credential exfiltration and suspicious external communication patterns justify classification as malware due to the significant security risks posed to systems that deploy this code.
ocean-karma-faj575
1.0.0
by afifaljafari112
Removed from npm
Blocked by Socket
The provided code imports several modules with unusual naming conventions and calls a method `functame` on each. The purpose and behavior of the code are unclear, and the naming conventions suggest potential obfuscation. However, without more context or additional code, it is difficult to definitively identify any malicious behavior.
Live on npm for 57 days, 7 hours and 31 minutes before removal. Socket users were protected even while the package was live.
durex-app
1.0.0
by nguyenthuwann
Removed from npm
Blocked by Socket
The code contains suspicious elements like hard-coded hex strings, dynamic execution, and conditional sending of data to external servers, which could indicate potential malicious intent or data exfiltration.
Live on npm for 59 minutes before removal. Socket users were protected even while the package was live.
Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.
Possible typosquat attack
Known malware
Suspicious Stars on GitHub
HTTP dependency
Git dependency
GitHub dependency
AI-detected potential malware
Obfuscated code
Telemetry
Protestware or potentially unwanted behavior
Critical CVE
High CVE
Medium CVE
Low CVE
Unpopular package
Minified code
Bad dependency semver
Wildcard dependency
Socket optimized override available
Deprecated
Unmaintained
License Policy Violation
Explicitly Unlicensed Item
Misc. License Issues
Copyleft License
No License Found
Ambiguous License Classifier
License exception
Non-permissive License
Unidentified License
Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.
Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.
Nat Friedman
CEO at GitHub
Suz Hinton
Senior Software Engineer at Stripe
heck yes this is awesome!!! Congrats team 🎉👏
Matteo Collina
Node.js maintainer, Fastify lead maintainer
So awesome to see @SocketSecurity launch with a fresh approach! Excited to have supported the team from the early days.
DC Posch
Director of Technology at AppFolio, CTO at Dynasty
This is going to be super important, especially for crypto projects where a compromised dependency results in stolen user assets.
Luis Naranjo
Software Engineer at Microsoft
If software supply chain attacks through npm don't scare the shit out of you, you're not paying close enough attention.
@SocketSecurity sounds like an awesome product. I'll be using socket.dev instead of npmjs.org to browse npm packages going forward
Elena Nadolinski
Founder and CEO at Iron Fish
Huge congrats to @SocketSecurity! 🙌
Literally the only product that proactively detects signs of JS compromised packages.
Joe Previte
Engineering Team Lead at Coder
Congrats to @feross and the @SocketSecurity team on their seed funding! 🚀 It's been a big help for us at @CoderHQ and we appreciate what y'all are doing!
Josh Goldberg
Staff Developer at Codecademy
This is such a great idea & looks fantastic, congrats & good luck @feross + team!
The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.
Scott Roberts
CISO at UiPath
As a happy Socket customer, I've been impressed with how quickly they are adding value to the product, this move is a great step!
Yan Zhu
Head of Security at Brave, DEFCON, EFF, W3C
glad to hear some of the smartest people i know are working on (npm, etc.) supply chain security finally :). @SocketSecurity
Andrew Peterson
CEO and Co-Founder at Signal Sciences (acq. Fastly)
How do you track the validity of open source software libraries as they get updated? You're prob not. Check out @SocketSecurity and the updated tooling they launched.
Supply chain is a cluster in security as we all know and the tools from Socket are "duh" type tools to be implementing. Check them out and follow Feross Aboukhadijeh to see more updates coming from them in the future.
Zbyszek Tenerowicz
Senior Security Engineer at ConsenSys
socket.dev is getting more appealing by the hour
Devdatta Akhawe
Head of Security at Figma
The @SocketSecurity team is on fire! Amazing progress and I am exciting to see where they go next.
Sebastian Bensusan
Engineer Manager at Stripe
I find it surprising that we don't have _more_ supply chain attacks in software:
Imagine your airplane (the code running) was assembled (deployed) daily, with parts (dependencies) from internet strangers. How long until you get a bad part?
Excited for Socket to prevent this
Adam Baldwin
VP of Security at npm, Red Team at Auth0/Okta
Congrats to everyone at @SocketSecurity ❤️🤘🏻
Nico Waisman
CISO at Lyft
This is an area that I have personally been very focused on. As Nat Friedman said in the 2019 GitHub Universe keynote, Open Source won, and every time you add a new open source project you rely on someone else code and you rely on the people that build it.
This is both exciting and problematic. You are bringing real risk into your organization, and I'm excited to see progress in the industry from OpenSSF scorecards and package analyzers to the company that Feross Aboukhadijeh is building!
Depend on Socket to prevent malicious open source dependencies from infiltrating your app.
Install the Socket GitHub App in just 2 clicks and get protected today.
Block 70+ issues in open source code, including malware, typo-squatting, hidden code, misleading packages, permission creep, and more.
Reduce work by surfacing actionable security information directly in GitHub. Empower developers to make better decisions.
Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.
Nov 23, 2025
Shai Hulud v2
Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.
Nov 05, 2025
Elves on npm
A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.
Jul 04, 2025
RubyGems Automation-Tool Infostealer
Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.
Mar 13, 2025
North Korea's Contagious Interview Campaign
Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.
Jul 23, 2024
Network Reconnaissance Campaign
A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.
Get our latest security research, open source insights, and product updates.
Security News
CVE disclosures hit a record 48,185 in 2025, driven largely by vulnerabilities in third-party WordPress plugins.
Security News
Socket CEO Feross Aboukhadijeh joins Insecure Agents to discuss CVE remediation and why supply chain attacks require a different security approach.
Security News
Tailwind Labs laid off 75% of its engineering team after revenue dropped 80%, as LLMs redirect traffic away from documentation where developers discover paid products.