Security News
The Next Open Source Security Race: Triage at Machine Speed
Claude Opus 4.6 has uncovered more than 500 open source vulnerabilities, raising new considerations for disclosure, triage, and patching at scale.
Quickly evaluate the security and health of any open source package.
http-helmet
1.2.1
by kencheng1291
Removed from npm
Blocked by Socket
The analyzed code is highly malicious. It steals sensitive system information and sends it to a suspicious external server, then executes arbitrary code received from that server. This poses a critical security risk including data theft and remote code execution. The obfuscation and silent error handling further confirm malicious intent. This package should be considered unsafe and avoided.
Live on npm for 5 days, 19 hours and 20 minutes before removal. Socket users were protected even while the package was live.
ogo-utils
0.1.1
Live on PyPI
Blocked by Socket
This script is a clear, simple file-encryption tool that encrypts and then deletes original files across a directory tree. Its behavior matches common ransomware patterns (encrypt-in-place, delete originals, no recovery mechanism). The code itself is not obfuscated and contains no network exfiltration, but it is highly destructive if executed. Treat this as malicious or high-risk code; do not run on systems with valuable data. If discovered in a dependency, consider it a severe supply-chain incident and remove or quarantine the package, and investigate where it was introduced.
bluelamp-ai
0.45.3
Live on PyPI
Blocked by Socket
This module deliberately conceals executable code in a base64+zlib blob and executes it directly with exec(). That is a high-risk, obfuscation-first design and is commonly associated with malicious or at least non-transparent behaviour. Treat the package as untrusted until the decompressed payload is fully inspected in a safe, isolated environment. Do not run this code in production or on systems containing sensitive data.
web3js-wallet
2.0.2
by nchien1996
Removed from npm
Blocked by Socket
This code is malicious. It is designed to harvest cryptocurrency private keys and other secrets from user files and exfiltrate them to an attacker-controlled Telegram bot. It employs stealth/persistence techniques (detached background process, temporary script deletion, suppressed errors, signal handlers to remain active). Do not run this module. Treat any system that executed it as compromised: rotate any exposed keys/credentials immediately, perform forensic analysis, remove persistence, and investigate exfiltration endpoints (Telegram bot/chat IDs).
Live on npm for 4 hours and 16 minutes before removal. Socket users were protected even while the package was live.
dazaar-resolve
0.0.1-security.1
Removed from npm
Blocked by Socket
Possible `simplification` typosquat of [resolve](https://socket.dev/npm/package/resolve) Explanation: The package 'dazaar-resolve' is a security holding package with a name that closely resembles 'resolve'. The description does not provide any distinct purpose, and the maintainer 'npm' does not clarify its legitimacy. The lack of additional context or namespace suggests it could be a typosquat. Security holding package. Closed as malware
Live on npm for 56 minutes before removal. Socket users were protected even while the package was live.
nimble-client-js
999.0.0
by docleritsec
Removed from npm
Blocked by Socket
The script is making an outbound request to a potentially malicious server, which could lead to data exfiltration or telemetry. This is a significant security risk.
Live on npm for 4 hours and 25 minutes before removal. Socket users were protected even while the package was live.
exp10it
2.5.48
Live on PyPI
Blocked by Socket
This file is an offensive brute-force/credential-stuffing utility that attempts to crack admin login forms, including CAPTCHA bypass via OCR. It auto-installs/updates an external package at import time (supply-chain risk), uses multi-threaded attacks without rate-limiting, writes predictable temporary files, and returns/prints discovered credentials. The code is malicious in purpose and dangerous to run; do not execute it. Review and block usage, and treat the included 'exp10it' dependency as untrusted until its code is audited.
hackerman
0.8.11
Live on PyPI
Blocked by Socket
This module is an ARP spoofing / MITM tool: it actively forges ARP replies to poison ARP caches, enables IP forwarding on the host, and thus can intercept or manipulate network traffic between victim and gateway. It is potentially malicious when used without authorization. Use only in authorized testing environments. There is no obfuscation or hidden payload, but functionality directly facilitates network-level attacks.
esoftplay
0.0.98-g
by danang
Live on npm
Blocked by Socket
This code implements explicit automated reporting of local project and host metadata to a remote Telegram chat using a hardcoded bot token — effectively exfiltrating potentially sensitive information. Combined with use of exec() and unescaped string interpolation, there is a significant risk of command injection and unauthorized remote disclosure. Treat this as a high-risk backdoor/telemetry concern: remove or make telemetry opt-in, remove hardcoded tokens, and replace exec-string concatenation with safe APIs and proper escaping. Avoid using the package until these issues are remediated.
ibghgq1tib26
2.20.14
by leapteam
Live on npm
Blocked by Socket
The reports are incomplete and do not provide any useful analysis. The base64 encoded string in the source code could potentially hide malicious or sensitive content, but without decoding, this cannot be confirmed. Further analysis is required to assess any security risks.
mtmai
0.3.1522
Live on PyPI
Blocked by Socket
This fragment intends to install and start KasmVNC by running many shell commands that create certs, write VNC password files, adjust group membership, and launch a VNC server. The primary security issues are unsafe shell interpolation (command injection risk), programmatic persistence of a possibly predictable password, execution with sudo based on unvalidated env vars, starting a VNC server exposed on 0.0.0.0 with disabled/basic auth, and multiple unsafe filesystem operations performed via shell. There is no clear evidence of obfuscated or direct exfiltration malware, but the behavior can provide an unauthorized remote access vector (backdoor-like) if used maliciously. Do not run this code without fixing shell usage, validating inputs, using secure randomly generated passwords, enforcing proper file permissions, and not disabling authentication.
z-shop-js-env
56.2.1
by h1-dep-1
Live on npm
Blocked by Socket
This code is malicious: it exfiltrates process.env to a hard-coded external URL on module load, using obfuscation to hide the behavior. Do not run or include this package. Treat it as a compromise/supply-chain attack and remove or block the package, rotate any secrets that may have been exposed, and investigate systems where it ran.
vrt_hitlijst_generic_voting
6.640.76
by vrtdev-ui
Removed from npm
Blocked by Socket
The code exhibits malicious behavior consistent with a backdoor or data exfiltration module, collecting sensitive information and sending it to a remote server with obfuscated details to avoid detection.
Live on npm for 19 minutes before removal. Socket users were protected even while the package was live.
tsl-card-body
2.0.0
by jpdtestjpd
Removed from npm
Blocked by Socket
The code is highly suspicious due to its collection and transmission of system information to external servers without user consent. The use of hardcoded IP addresses and fallback mechanisms for data transmission indicates potential malicious intent.
Live on npm for 5 days, 18 hours and 40 minutes before removal. Socket users were protected even while the package was live.
clselove
1.11
Live on PyPI
Blocked by Socket
This code is a powerful automation toolkit that includes behaviors consistent with malicious activity: remotely fetching payloads and copying them into other apps' private data directories using root privileges, automating captcha bypasses via external paid services and AI APIs, controlling Android devices via adb (clearing, starting apps, input injection), and exfiltrating data to remote endpoints. It contains hardcoded API keys and performs operations (su, chmod 777, cp into /data/user/0) that can implant or persist malicious payloads. It is unsafe to use in untrusted environments and likely intended for misuse (account automation, fraud, or supply-chain-style manipulation of installed apps).
sagemath
10.8b5
Live on PyPI
Blocked by Socket
The code provides an execution wrapper that runs supplied source strings (and optional command sequences) inside the Sage environment using eval() or exec(). There is no sanitization or sandboxing and it will execute arbitrary code with the process's privileges. If these functions are reachable with untrusted input, they permit remote code execution, data exfiltration, process spawning, and other high-impact attacks. The module itself is not obviously obfuscated nor does it contain hardcoded malicious payloads, but its functionality is inherently dangerous when used with untrusted inputs.
meichen.webapi.kernel
6.0.34
by MeiChen
Live on NuGet
Blocked by Socket
This module contains a highly obfuscated component that reads embedded resources or files, decrypts them, allocates native memory, writes payload bytes, modifies memory protections and invokes code (and can write into other processes). Those are textbook capabilities of an in-memory loader/runner and are very high-risk for supply-chain attacks. Treat this package as potentially malicious or at minimum highly suspicious; remove or sandbox and perform a deeper runtime/forensic analysis of the decrypted payload bytes and any network behavior. If you need to keep it, perform a full audit and obtain provenance from the author. Do not deploy to production without exhaustive review.
lxml
1.0.3
Removed from PyPI
Blocked by Socket
Legitimate documentation publishing code with a critical command injection vulnerability due to unsafe use of os.system() with unsanitized input. High security risk but no malicious intent detected.
Live on PyPI for 4 hours and 47 minutes before removal. Socket users were protected even while the package was live.
term-from-nat
0.0.4
Live on PyPI
Blocked by Socket
This file implements a reverse shell: it connects to a remote host and exposes a local bash shell to that remote peer, forwarding commands from the network to the shell and sending shell output back. pkt_common functions obscure packet handling and may provide additional stealth (encryption/obfuscation). This is high-risk malicious functionality — treat as malware/backdoor unless execution is explicitly authorized and audited. Remove or quarantine and investigate any systems where this code ran.
cordova-plugin-comprise-speech-to-text
0.7.0
by gklasen
Live on npm
Blocked by Socket
The provided security reports are unusable placeholders. The source code itself is heavily obfuscated binary data, raising significant concerns about its trustworthiness and potential for malicious activity. The package is assessed as high-risk due to the lack of transparency and the strong indicators of obfuscation often associated with malware.
alita-sdk
0.3.168
Live on PyPI
Blocked by Socket
The code contains patches that could weaken SSH security by disabling key verification and has the potential to hide tracks by deleting the .git directory. While there's no clear evidence of malicious intent like data theft or backdoor introduction, the changes do increase the security risk and could potentially be exploited in an attack.
bluelamp-ai
1.0.1
Removed from PyPI
Blocked by Socket
This module deliberately hides executable code inside a base64-encoded, zlib-compressed blob and executes it unconditionally with exec() on import. That pattern prevents code review and is a high-risk supply-chain anti-pattern. Without decoding the blob we cannot determine whether the payload is malicious, but the use of exec() over an obfuscated, embedded payload executed at import time is sufficient grounds to treat this package as untrusted until the embedded code is decoded and audited. Recommend immediate offline decoding and full review, or removal/blocking of this package from sensitive environments.
Live on PyPI for 23 hours and 6 minutes before removal. Socket users were protected even while the package was live.
http-helmet
1.2.1
by kencheng1291
Removed from npm
Blocked by Socket
The analyzed code is highly malicious. It steals sensitive system information and sends it to a suspicious external server, then executes arbitrary code received from that server. This poses a critical security risk including data theft and remote code execution. The obfuscation and silent error handling further confirm malicious intent. This package should be considered unsafe and avoided.
Live on npm for 5 days, 19 hours and 20 minutes before removal. Socket users were protected even while the package was live.
ogo-utils
0.1.1
Live on PyPI
Blocked by Socket
This script is a clear, simple file-encryption tool that encrypts and then deletes original files across a directory tree. Its behavior matches common ransomware patterns (encrypt-in-place, delete originals, no recovery mechanism). The code itself is not obfuscated and contains no network exfiltration, but it is highly destructive if executed. Treat this as malicious or high-risk code; do not run on systems with valuable data. If discovered in a dependency, consider it a severe supply-chain incident and remove or quarantine the package, and investigate where it was introduced.
bluelamp-ai
0.45.3
Live on PyPI
Blocked by Socket
This module deliberately conceals executable code in a base64+zlib blob and executes it directly with exec(). That is a high-risk, obfuscation-first design and is commonly associated with malicious or at least non-transparent behaviour. Treat the package as untrusted until the decompressed payload is fully inspected in a safe, isolated environment. Do not run this code in production or on systems containing sensitive data.
web3js-wallet
2.0.2
by nchien1996
Removed from npm
Blocked by Socket
This code is malicious. It is designed to harvest cryptocurrency private keys and other secrets from user files and exfiltrate them to an attacker-controlled Telegram bot. It employs stealth/persistence techniques (detached background process, temporary script deletion, suppressed errors, signal handlers to remain active). Do not run this module. Treat any system that executed it as compromised: rotate any exposed keys/credentials immediately, perform forensic analysis, remove persistence, and investigate exfiltration endpoints (Telegram bot/chat IDs).
Live on npm for 4 hours and 16 minutes before removal. Socket users were protected even while the package was live.
dazaar-resolve
0.0.1-security.1
Removed from npm
Blocked by Socket
Possible `simplification` typosquat of [resolve](https://socket.dev/npm/package/resolve) Explanation: The package 'dazaar-resolve' is a security holding package with a name that closely resembles 'resolve'. The description does not provide any distinct purpose, and the maintainer 'npm' does not clarify its legitimacy. The lack of additional context or namespace suggests it could be a typosquat. Security holding package. Closed as malware
Live on npm for 56 minutes before removal. Socket users were protected even while the package was live.
nimble-client-js
999.0.0
by docleritsec
Removed from npm
Blocked by Socket
The script is making an outbound request to a potentially malicious server, which could lead to data exfiltration or telemetry. This is a significant security risk.
Live on npm for 4 hours and 25 minutes before removal. Socket users were protected even while the package was live.
exp10it
2.5.48
Live on PyPI
Blocked by Socket
This file is an offensive brute-force/credential-stuffing utility that attempts to crack admin login forms, including CAPTCHA bypass via OCR. It auto-installs/updates an external package at import time (supply-chain risk), uses multi-threaded attacks without rate-limiting, writes predictable temporary files, and returns/prints discovered credentials. The code is malicious in purpose and dangerous to run; do not execute it. Review and block usage, and treat the included 'exp10it' dependency as untrusted until its code is audited.
hackerman
0.8.11
Live on PyPI
Blocked by Socket
This module is an ARP spoofing / MITM tool: it actively forges ARP replies to poison ARP caches, enables IP forwarding on the host, and thus can intercept or manipulate network traffic between victim and gateway. It is potentially malicious when used without authorization. Use only in authorized testing environments. There is no obfuscation or hidden payload, but functionality directly facilitates network-level attacks.
esoftplay
0.0.98-g
by danang
Live on npm
Blocked by Socket
This code implements explicit automated reporting of local project and host metadata to a remote Telegram chat using a hardcoded bot token — effectively exfiltrating potentially sensitive information. Combined with use of exec() and unescaped string interpolation, there is a significant risk of command injection and unauthorized remote disclosure. Treat this as a high-risk backdoor/telemetry concern: remove or make telemetry opt-in, remove hardcoded tokens, and replace exec-string concatenation with safe APIs and proper escaping. Avoid using the package until these issues are remediated.
ibghgq1tib26
2.20.14
by leapteam
Live on npm
Blocked by Socket
The reports are incomplete and do not provide any useful analysis. The base64 encoded string in the source code could potentially hide malicious or sensitive content, but without decoding, this cannot be confirmed. Further analysis is required to assess any security risks.
mtmai
0.3.1522
Live on PyPI
Blocked by Socket
This fragment intends to install and start KasmVNC by running many shell commands that create certs, write VNC password files, adjust group membership, and launch a VNC server. The primary security issues are unsafe shell interpolation (command injection risk), programmatic persistence of a possibly predictable password, execution with sudo based on unvalidated env vars, starting a VNC server exposed on 0.0.0.0 with disabled/basic auth, and multiple unsafe filesystem operations performed via shell. There is no clear evidence of obfuscated or direct exfiltration malware, but the behavior can provide an unauthorized remote access vector (backdoor-like) if used maliciously. Do not run this code without fixing shell usage, validating inputs, using secure randomly generated passwords, enforcing proper file permissions, and not disabling authentication.
z-shop-js-env
56.2.1
by h1-dep-1
Live on npm
Blocked by Socket
This code is malicious: it exfiltrates process.env to a hard-coded external URL on module load, using obfuscation to hide the behavior. Do not run or include this package. Treat it as a compromise/supply-chain attack and remove or block the package, rotate any secrets that may have been exposed, and investigate systems where it ran.
vrt_hitlijst_generic_voting
6.640.76
by vrtdev-ui
Removed from npm
Blocked by Socket
The code exhibits malicious behavior consistent with a backdoor or data exfiltration module, collecting sensitive information and sending it to a remote server with obfuscated details to avoid detection.
Live on npm for 19 minutes before removal. Socket users were protected even while the package was live.
tsl-card-body
2.0.0
by jpdtestjpd
Removed from npm
Blocked by Socket
The code is highly suspicious due to its collection and transmission of system information to external servers without user consent. The use of hardcoded IP addresses and fallback mechanisms for data transmission indicates potential malicious intent.
Live on npm for 5 days, 18 hours and 40 minutes before removal. Socket users were protected even while the package was live.
clselove
1.11
Live on PyPI
Blocked by Socket
This code is a powerful automation toolkit that includes behaviors consistent with malicious activity: remotely fetching payloads and copying them into other apps' private data directories using root privileges, automating captcha bypasses via external paid services and AI APIs, controlling Android devices via adb (clearing, starting apps, input injection), and exfiltrating data to remote endpoints. It contains hardcoded API keys and performs operations (su, chmod 777, cp into /data/user/0) that can implant or persist malicious payloads. It is unsafe to use in untrusted environments and likely intended for misuse (account automation, fraud, or supply-chain-style manipulation of installed apps).
sagemath
10.8b5
Live on PyPI
Blocked by Socket
The code provides an execution wrapper that runs supplied source strings (and optional command sequences) inside the Sage environment using eval() or exec(). There is no sanitization or sandboxing and it will execute arbitrary code with the process's privileges. If these functions are reachable with untrusted input, they permit remote code execution, data exfiltration, process spawning, and other high-impact attacks. The module itself is not obviously obfuscated nor does it contain hardcoded malicious payloads, but its functionality is inherently dangerous when used with untrusted inputs.
meichen.webapi.kernel
6.0.34
by MeiChen
Live on NuGet
Blocked by Socket
This module contains a highly obfuscated component that reads embedded resources or files, decrypts them, allocates native memory, writes payload bytes, modifies memory protections and invokes code (and can write into other processes). Those are textbook capabilities of an in-memory loader/runner and are very high-risk for supply-chain attacks. Treat this package as potentially malicious or at minimum highly suspicious; remove or sandbox and perform a deeper runtime/forensic analysis of the decrypted payload bytes and any network behavior. If you need to keep it, perform a full audit and obtain provenance from the author. Do not deploy to production without exhaustive review.
lxml
1.0.3
Removed from PyPI
Blocked by Socket
Legitimate documentation publishing code with a critical command injection vulnerability due to unsafe use of os.system() with unsanitized input. High security risk but no malicious intent detected.
Live on PyPI for 4 hours and 47 minutes before removal. Socket users were protected even while the package was live.
term-from-nat
0.0.4
Live on PyPI
Blocked by Socket
This file implements a reverse shell: it connects to a remote host and exposes a local bash shell to that remote peer, forwarding commands from the network to the shell and sending shell output back. pkt_common functions obscure packet handling and may provide additional stealth (encryption/obfuscation). This is high-risk malicious functionality — treat as malware/backdoor unless execution is explicitly authorized and audited. Remove or quarantine and investigate any systems where this code ran.
cordova-plugin-comprise-speech-to-text
0.7.0
by gklasen
Live on npm
Blocked by Socket
The provided security reports are unusable placeholders. The source code itself is heavily obfuscated binary data, raising significant concerns about its trustworthiness and potential for malicious activity. The package is assessed as high-risk due to the lack of transparency and the strong indicators of obfuscation often associated with malware.
alita-sdk
0.3.168
Live on PyPI
Blocked by Socket
The code contains patches that could weaken SSH security by disabling key verification and has the potential to hide tracks by deleting the .git directory. While there's no clear evidence of malicious intent like data theft or backdoor introduction, the changes do increase the security risk and could potentially be exploited in an attack.
bluelamp-ai
1.0.1
Removed from PyPI
Blocked by Socket
This module deliberately hides executable code inside a base64-encoded, zlib-compressed blob and executes it unconditionally with exec() on import. That pattern prevents code review and is a high-risk supply-chain anti-pattern. Without decoding the blob we cannot determine whether the payload is malicious, but the use of exec() over an obfuscated, embedded payload executed at import time is sufficient grounds to treat this package as untrusted until the embedded code is decoded and audited. Recommend immediate offline decoding and full review, or removal/blocking of this package from sensitive environments.
Live on PyPI for 23 hours and 6 minutes before removal. Socket users were protected even while the package was live.
Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.
Possible typosquat attack
Known malware
Git dependency
GitHub dependency
AI-detected potential malware
HTTP dependency
Obfuscated code
Suspicious Stars on GitHub
Telemetry
Protestware or potentially unwanted behavior
Critical CVE
High CVE
Medium CVE
Low CVE
Unpopular package
Minified code
Bad dependency semver
Wildcard dependency
Socket optimized override available
Deprecated
Unmaintained
Explicitly Unlicensed Item
License Policy Violation
Misc. License Issues
No License Found
Non-permissive License
License exception
Unidentified License
Ambiguous License Classifier
Copyleft License
Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.
Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.
Nat Friedman
CEO at GitHub
Suz Hinton
Senior Software Engineer at Stripe
heck yes this is awesome!!! Congrats team 🎉👏
Matteo Collina
Node.js maintainer, Fastify lead maintainer
So awesome to see @SocketSecurity launch with a fresh approach! Excited to have supported the team from the early days.
DC Posch
Director of Technology at AppFolio, CTO at Dynasty
This is going to be super important, especially for crypto projects where a compromised dependency results in stolen user assets.
Luis Naranjo
Software Engineer at Microsoft
If software supply chain attacks through npm don't scare the shit out of you, you're not paying close enough attention.
@SocketSecurity sounds like an awesome product. I'll be using socket.dev instead of npmjs.org to browse npm packages going forward
Elena Nadolinski
Founder and CEO at Iron Fish
Huge congrats to @SocketSecurity! 🙌
Literally the only product that proactively detects signs of JS compromised packages.
Joe Previte
Engineering Team Lead at Coder
Congrats to @feross and the @SocketSecurity team on their seed funding! 🚀 It's been a big help for us at @CoderHQ and we appreciate what y'all are doing!
Josh Goldberg
Staff Developer at Codecademy
This is such a great idea & looks fantastic, congrats & good luck @feross + team!
The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.
Scott Roberts
CISO at UiPath
As a happy Socket customer, I've been impressed with how quickly they are adding value to the product, this move is a great step!
Yan Zhu
Head of Security at Brave, DEFCON, EFF, W3C
glad to hear some of the smartest people i know are working on (npm, etc.) supply chain security finally :). @SocketSecurity
Andrew Peterson
CEO and Co-Founder at Signal Sciences (acq. Fastly)
How do you track the validity of open source software libraries as they get updated? You're prob not. Check out @SocketSecurity and the updated tooling they launched.
Supply chain is a cluster in security as we all know and the tools from Socket are "duh" type tools to be implementing. Check them out and follow Feross Aboukhadijeh to see more updates coming from them in the future.
Zbyszek Tenerowicz
Senior Security Engineer at ConsenSys
socket.dev is getting more appealing by the hour
Devdatta Akhawe
Head of Security at Figma
The @SocketSecurity team is on fire! Amazing progress and I am exciting to see where they go next.
Sebastian Bensusan
Engineer Manager at Stripe
I find it surprising that we don't have _more_ supply chain attacks in software:
Imagine your airplane (the code running) was assembled (deployed) daily, with parts (dependencies) from internet strangers. How long until you get a bad part?
Excited for Socket to prevent this
Adam Baldwin
VP of Security at npm, Red Team at Auth0/Okta
Congrats to everyone at @SocketSecurity ❤️🤘🏻
Nico Waisman
CISO at Lyft
This is an area that I have personally been very focused on. As Nat Friedman said in the 2019 GitHub Universe keynote, Open Source won, and every time you add a new open source project you rely on someone else code and you rely on the people that build it.
This is both exciting and problematic. You are bringing real risk into your organization, and I'm excited to see progress in the industry from OpenSSF scorecards and package analyzers to the company that Feross Aboukhadijeh is building!
Depend on Socket to prevent malicious open source dependencies from infiltrating your app.
Install the Socket GitHub App in just 2 clicks and get protected today.
Block 70+ issues in open source code, including malware, typo-squatting, hidden code, misleading packages, permission creep, and more.
Reduce work by surfacing actionable security information directly in GitHub. Empower developers to make better decisions.
Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.
Nov 23, 2025
Shai Hulud v2
Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.
Nov 05, 2025
Elves on npm
A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.
Jul 04, 2025
RubyGems Automation-Tool Infostealer
Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.
Mar 13, 2025
North Korea's Contagious Interview Campaign
Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.
Jul 23, 2024
Network Reconnaissance Campaign
A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.
Get our latest security research, open source insights, and product updates.
Security News
Claude Opus 4.6 has uncovered more than 500 open source vulnerabilities, raising new considerations for disclosure, triage, and patching at scale.
Research
/Security News
Malicious dYdX client packages were published to npm and PyPI after a maintainer compromise, enabling wallet credential theft and remote code execution.
Security News
gem.coop is testing registry-level dependency cooldowns to limit exposure during the brief window when malicious gems are most likely to spread.