This package version is identified as malware. It has been flagged either by Socket's AI scanner and confirmed by our threat research team, or is listed as malicious in security databases and other sources.
Contains a dependency which resolves to a remote git URL. Dependencies fetched from git URLs are not immutable and can be used to inject untrusted code or reduce the likelihood of a reproducible install.
Contains a dependency which resolves to a GitHub URL. Dependencies fetched from GitHub specifiers are not immutable can be used to inject untrusted code or reduce the likelihood of a reproducible install.
Contains a dependency which resolves to a remote HTTP URL which could be used to inject untrusted code and reduce overall package reliability.
Obfuscated files are intentionally packed to hide their behavior. This could be a sign of malware.
Suspicious Stars on GitHub The GitHub repository of this package may have been artificially inflated with stars (from bots, crowdsourcing, etc.).
This package contains telemetry which tracks how it is used.
A new collaborator has begun publishing package versions. Package stability and security risk may be elevated.
This module accesses the network.
Package uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
AI-detected possible typosquat AI has identified this package as a potential typosquat of a more popular package. This suggests that the package may be intentionally mimicking another package's name, description, or other metadata.
Initial human review suggests the presence of a vulnerability in this package. It is pending further analysis and confirmation.
According to your configuration, this artifact has been recently published, which could increase supply chain risk.
This module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Packages less than 10 lines of code are easily copied into your own project and may not warrant the additional supply chain risk of an external dependency.
Contains native code (e.g., compiled binaries or shared libraries). Including native code can obscure malicious behavior.
The package was published by an npm account that no longer exists.
Accesses the file system, and could potentially read sensitive data.
Contains high entropy strings. This could be a sign of encrypted data, leaked secrets or obfuscated code.
A new npm collaborator published a version of the package for the first time. New collaborators are usually benign additions to a project, but do indicate a change to the security surface area of a package.
Package contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Ecosystem-Specific Alerts
Chrome Extensions
This Chrome extension requests permissions to access browser APIs, user data, or system features.
This Chrome extension includes content scripts that execute JavaScript on specified websites.
This Chrome extension requests host permissions to access specific websites or domains.
GitHub Actions
NPM
Package contains a shrinkwrap file. This may allow the package to bypass normal install procedures.
Install scripts are run when the package is installed or built. Malicious packages often use scripts that run automatically to execute payloads or fetch additional code.
This package has inconsistent metadata. This could be malicious or caused by an error when publishing the package.
Dynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Uses debug, reflection and dynamic code execution features.
Agent Skills
AI agent skill contains shell command execution, pipe-to-shell patterns, or download-and-execute sequences that could allow arbitrary code execution.
AI agent skill accesses sensitive data such as environment variables, credentials, or home directory files and may transmit them to external endpoints.
AI agent skill contains hardcoded API keys, tokens, private keys, or other credentials that could be exploited if the skill is distributed.
AI agent skill attempts to override AI safety guidelines through instruction override, role reassignment, jailbreak attempts, or system prompt manipulation.
Skill: Tool chaining attack AI agent skill chains multiple tools or capabilities together in a way that could amplify a security breach beyond any single tool's access.
AI agent skill uses hex encoding, Unicode escapes, compressed payloads, or encrypted archives to hide its true behavior from review.
AI agent skill contains patterns that could exhaust system resources such as fork bombs, memory exhaustion, or large file creation.
AI agent skill installs unpinned dependencies, references external scripts, or directs agents to download software from untrusted sources.
AI agent skill performs broad file system manipulation, network scanning, or system registry modification beyond what its stated purpose requires.
Skill: Transitive trust abuse AI agent skill loads or invokes other external skills, creating a chain of trust that could introduce untrusted code or behavior.
AI agent skill exhibits excessive autonomy patterns such as unbounded loops, self-modification, or remote instruction fetching that could lead to uncontrolled behavior.
AI agent skill attempts to enumerate agent capabilities or extract system prompts, which could aid an attacker in planning further exploits.
VS Code Extensions
This extension packs other extensions.