Socket for Java

org.eclipse.dirigible:dirigible-components-security-oauth2
10.6.48
Live on maven
Blocked by Socket
The code fragment exposes a web-based terminal on port 9000 via ttyd with an incomplete or mis-typed shell command ('bas'), creating a remote command execution surface without visible access controls. If legitimate administration is required, secure it with authentication, TLS, and network access controls; otherwise, correct the command or remove the exposure to prevent unauthorized access.
io.github.tanin47:backdoor
2.6.0-rc2
Live on maven
Blocked by Socket
The analyzed fragment exhibits backdoor-like characteristics embedded in a configuration-loading utility. It actively discovers resources from multiple external paths (system properties, environment, user directories, and remote URLs), parses and translates configuration data, and logs sensitive decisions. While some components may be legitimate for flexible config resolution, the combination of tainted package naming, broad resource access, and dynamic code patterns constitutes a strong security risk in a supply-chain setting and warrants thorough provenance and access-control scrutiny before adoption.
com.webforj:webforj-engine
25.11
Live on maven
Blocked by Socket
The class exhibits obfuscated, dynamic command construction that culminates in Runtime.exec, enabling external process execution based on user context, inputs, and runtime-decoded constants. While there may be legitimate use cases in controlled environments, the combination of heavy obfuscation, privilege gating, and unvalidated input contributing to a critical sink represents a meaningful security risk. It is advisable to redesign to a explicit, validated subprocess model, remove or minimize dynamic command assembly from untrusted inputs, and provide clear documentation of intended behavior. Thorough auditing of all inputs affecting command construction is essential.
org/mvnpm:sweetalert2
11.17.2
Live on maven
Blocked by Socket
The fragment contains a targeted, unexpected payload that, for users with a Russian locale on certain TLDs, will (after a persistent delay condition) disable pointer interactions and load/play an external audio file from a hard-coded third-party domain. This behavior is not appropriate for a modal/dialog library and is likely malicious or at least maliciously prank-like / sabotage-oriented. Remove or patch this conditional block before using the package, and treat builds containing this behavior as compromised.
io.github.jprocms:cp-core
2.2.0
Live on maven
Blocked by Socket
The PlatformUtil fragment exhibits several high-risk patterns that could enable runtime instrumentation or backdoor-like behavior. While some elements may be legitimate for licensing enforcement or diagnostics, the combination of embedded license keys, dynamic attachment of agents via the Attach API, and extensive reflective invocation constitutes a non-trivial security risk and potential supply-chain abuse if distributed in open-source form. Maintainers should scrutinize the legitimate necessity of the Attach-based flow, consider sandboxing or removing dynamic agent loading, and ensure licensing data handling cannot be exploited to inject malicious code. At minimum, isolate these paths behind clear feature flags and add rigorous access controls and static/dynamic analysis gates before distributing such code in a dependency. Key risk signals: dynamic Attach API usage, hardcoded license bytes, temp-file-based agent loading, reflection-based control flow moderation (exit paths). Mitigation suggestions: remove or gate Attach-based instrumentation, avoid embedding sensitive keys in source, use verifiable licensing/feature-tag mechanisms, and implement strict code reviews for reflective code paths before publishing.
org.apache.nifi:nifi-python-test-extensions
2.1.0
Live on maven
Blocked by Socket
This processor contains explicit, intentional destructive behavior: after four invocations it forcefully kills its hosting process using an OS kill command (SIGKILL). That behavior causes denial-of-service for the NiFi worker or interpreter hosting the transform. There is no evidence of data exfiltration or credential theft in this fragment, but the unconditional self-termination makes the code unsafe for production and a high security risk. Remove or disable this code, or replace with non-destructive diagnostic behavior and implement safe guards (config flags, admin opt-in, non-global state). The documented dependency on pandas is unnecessary in the shown code and should be removed to reduce supply-chain surface.
io.github.reajason:generator
2.6.1
Live on maven
Blocked by Socket
This class is a memshell/backdoor that activates on a covert HTTP header and implements arbitrary proxying/port-forwarding and HTTP redirecting to attacker-controlled hosts. It disables TLS validation, uses reflection to hide behavior, persists streams in a static context for later reuse, and marshals data with XOR obfuscation. This is malicious by design and should be treated as a serious supply-chain/backdoor compromise: remove and investigate where it originated.
org/mvnpm:sweetalert2
11.15.10
Live on maven
Blocked by Socket
This SweetAlert2 code fragment contains a malicious, targeted payload: for Russian-language browsers on hosts matching Russian/former-Soviet TLDs, it persists a timestamp in localStorage and (after a 3+ day condition) disables page pointer events and injects/auto-plays a hardcoded external audio file (flag-gimn.ru). This behavior is unrelated to a UI/dialog library, is intrusive, leaks network requests to a third party, and should be treated as a supply-chain compromise. Do not use this package version; remove or revert to a vetted upstream release and perform a full repository/release audit.
io.github.reajason:generator
2.4.0
Live on maven
Blocked by Socket
This class is a malicious webshell/backdoor designed to receive an encrypted, base64-encoded payload via HTTP (header + parameter), decrypt it with a hardcoded AES key, define and load the payload class in memory using Unsafe/defineClass, execute it, and return encoded results to the requester. It provides remote code execution capabilities inside the JVM and should be treated as highly dangerous. Remove and investigate any systems containing this class and rotate secrets/keys and credentials that may have been exposed.
org/mvnpm:sweetalert2
11.22.2
Live on maven
Blocked by Socket
The SweetAlert2 library code is generally safe and well-written for its intended purpose of displaying modal dialogs. However, it contains a malicious political prank targeting Russian users on Russian domains by disabling pointer events and playing an audio file without consent. This prank constitutes unwanted and malicious behavior embedded in the supply chain, posing a moderate security risk and malware concern. Users should be cautious using this version due to this embedded prank. No other malware or obfuscation is present.
org.webjars.npm:sweetalert2
11.22.3
Live on maven
Blocked by Socket
This file contains a malicious, out-of-scope code block that targets Russian-language visitors on Russian TLDs: it records an initial timestamp in localStorage, waits more than 3 days, then disables all pointer interactions on the page and injects/attempts to autoplay an externally hosted audio file (Ukrainian anthem) from a hardcoded third-party domain. This is supply-chain sabotage / politically targeted malicious code embedded inside a UI library. Remove or revert this change, audit the package source and distribution, and treat the package as compromised.
org/mvnpm:sweetalert2
11.17.2
Live on maven
Blocked by Socket
The package contains a hidden payload that targets Russian language users visiting Russian and Belarusian sites. For those users, it will disable user interaction and play a looping audio of the Ukrainian anthem after 3 days. This behavior is not disclosed in any documentation of the package and seriously disrupts user experience.
io.github.reajason:generator
2.4.1
Live on maven
Blocked by Socket
This class is a malicious/memshell backdoor used to proxy and tunnel arbitrary network traffic via servlet request/response objects. It implements reflective access to container request/response, a custom RPC/binary protocol, dynamic outbound TCP and HTTP(S) connections, and disables TLS verification. It provides persistent in-process state (ctx) and facilities to create/forward/delete sessions and data, enabling remote control and data exfiltration. It should be treated as a high-risk backdoor and removed; any systems where this component is present should be considered compromised and investigated.
com.alibaba.ververica:ververica-connector-mongodb
1.17-vvr-8.0.11-1
Live on maven
Blocked by Socket
The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.
io.github.reajason:generator
2.6.1
Live on maven
Blocked by Socket
This class is a malicious/memshell backdoor used to proxy and tunnel arbitrary network traffic via servlet request/response objects. It implements reflective access to container request/response, a custom RPC/binary protocol, dynamic outbound TCP and HTTP(S) connections, and disables TLS verification. It provides persistent in-process state (ctx) and facilities to create/forward/delete sessions and data, enabling remote control and data exfiltration. It should be treated as a high-risk backdoor and removed; any systems where this component is present should be considered compromised and investigated.
io.github.reajason:generator
2.4.2
Live on maven
Blocked by Socket
This class is a covert Tomcat memshell/backdoor implementing a network tunneling/proxy mechanism triggered by a special HTTP header and encoded payloads. It supports creating bidirectional sockets, relaying data via HTTP responses, redirecting payloads to arbitrary URLs, disabling SSL verification, and persisting tunnel state in-process. This is malicious behavior for almost all production deployments and should be treated as a high-risk backdoor. Remove and investigate any systems where this code is present; treat any credentials or secrets in the environment as potentially compromised.
org/apache/druid:druid-core
0.14.2-incubating
Live on maven
Blocked by Socket
This file contains a compromised compression utility with embedded malicious functionality alongside legitimate Apache Druid compression operations. The code includes a 'makeEvilZip' method that deliberately creates zip files containing directory traversal attack payloads using the path '../../../../../../../../../../../../../../../tmp/evil.txt' to escape directory boundaries and write 'evil text' content to arbitrary filesystem locations. This represents a classic zip slip attack implementation that could allow attackers to overwrite system files, create backdoors, or compromise system integrity. While the code also includes 'validateZipOutputFile' security measures to prevent such attacks in normal operations, the presence of explicit attack code indicates malicious intent and represents a serious supply chain security threat.
org.netbeans.html:browser
1.8.1
Live on maven
Blocked by Socket
This module emits a browser polling script that retrieves /command.js?id=... and executes the returned response body as JavaScript via eval. It also injects parts of the response into the DOM via innerHTML. The server-side command handler is selected using a client-controlled 'id' parameter. Even if intended for legitimate automation/debugging, the design constitutes a high-risk remote command/code execution channel in the browser and should be treated as a potential backdoor/C2-like behavior requiring strict access controls and removal/containment of eval-driven execution. Malware intent (beyond dangerous capability) cannot be proven from this fragment alone, but the security risk is very high.
com.airbnb.viaduct:runtime
0.22.0
Live on maven
Blocked by Socket
The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.
org.eclipse.dirigible:dirigible-components-security-oauth2
11.1.1
Live on maven
Blocked by Socket
The code fragment exposes a web-based terminal on port 9000 via ttyd with an incomplete or mis-typed shell command ('bas'), creating a remote command execution surface without visible access controls. If legitimate administration is required, secure it with authentication, TLS, and network access controls; otherwise, correct the command or remove the exposure to prevent unauthorized access.
io.acryl:datahub-custom-plugin-lib
1.3.1.7rc1
Live on maven
Blocked by Socket
The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.
io.github.tanin47:backdoor
2.1.0
Live on maven
Blocked by Socket
Functionally, this is a BaseDataSource implementation compatible with PostgreSQL JDBC usage: it stores config, builds/parses URLs, and obtains Connections. The code fragment itself does not show active exfiltration or command-execution primitives, but the package and driver class names include 'tanin.backdoor.org' and 'backdoor', which strongly indicate a trojanized or typosquatted package intended to masquerade as the official driver. Given that the class processes and holds sensitive credentials and will initiate DB connections, this artifact represents a high supply-chain risk. Full rejection/forensic review is advised until provenance and all related classes (notably the Driver in that namespace) are validated.
org.eclipse.jetty.demos:jetty-servlet4-demo-jetty-webapp
12.1.3
Live on maven
Blocked by Socket
Conclusion: The servlet fragment contains severe security risks in a software supply chain context. The most critical risk is pathInfo-driven reflection that can load arbitrary classes and instantiate/throw them, enabling remote code execution or destabilizing behavior. Additional risks include input echoing in verbose HTML, input-driven delays (sleep), redirects, and broad exposure of internal state via diagnostics output. Immediate remediation should include: eliminating or strictly sanitizing the reflection path (do not load arbitrary classes from user input), validating and constraining allowed path/info inputs, removing or gating sleep-based delays, sanitizing all echoed data, removing sensitive diagnostics output, and ensuring proper access controls so that only trusted clients can trigger any potentially dangerous logic. Prefer a minimal, well-audited implementation with deterministic responses and no reflective behavior driven by untrusted inputs.
ai.databand:dbnd-agent
1.0.27.10
Live on maven
Blocked by Socket
The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.
org/mvnpm:sweetalert2
11.22.1
Live on maven
Blocked by Socket
This package is a UI modal/dialog library whose core functionality is benign. However, the supplied file contains a clearly inappropriate and targeted payload: when a user's browser locale begins with 'ru' and the hostname matches certain Russian TLDs, the library may disable page pointer interactions and inject+autoplay an MP3 from a hardcoded external domain (flag-gimn.ru), using localStorage to gate timing. This behavior is unrelated to the library's purpose and is malicious/abusive in a supply‑chain context. Treat this version as compromised: do not use it in production, remove or patch the injected conditional/audio logic, audit package integrity and upstream commits, and rotate any deployment artifacts that included the compromised version.
org.eclipse.dirigible:dirigible-components-security-oauth2
10.6.48
Live on maven
Blocked by Socket
The code fragment exposes a web-based terminal on port 9000 via ttyd with an incomplete or mis-typed shell command ('bas'), creating a remote command execution surface without visible access controls. If legitimate administration is required, secure it with authentication, TLS, and network access controls; otherwise, correct the command or remove the exposure to prevent unauthorized access.
io.github.tanin47:backdoor
2.6.0-rc2
Live on maven
Blocked by Socket
The analyzed fragment exhibits backdoor-like characteristics embedded in a configuration-loading utility. It actively discovers resources from multiple external paths (system properties, environment, user directories, and remote URLs), parses and translates configuration data, and logs sensitive decisions. While some components may be legitimate for flexible config resolution, the combination of tainted package naming, broad resource access, and dynamic code patterns constitutes a strong security risk in a supply-chain setting and warrants thorough provenance and access-control scrutiny before adoption.
com.webforj:webforj-engine
25.11
Live on maven
Blocked by Socket
The class exhibits obfuscated, dynamic command construction that culminates in Runtime.exec, enabling external process execution based on user context, inputs, and runtime-decoded constants. While there may be legitimate use cases in controlled environments, the combination of heavy obfuscation, privilege gating, and unvalidated input contributing to a critical sink represents a meaningful security risk. It is advisable to redesign to a explicit, validated subprocess model, remove or minimize dynamic command assembly from untrusted inputs, and provide clear documentation of intended behavior. Thorough auditing of all inputs affecting command construction is essential.
org/mvnpm:sweetalert2
11.17.2
Live on maven
Blocked by Socket
The fragment contains a targeted, unexpected payload that, for users with a Russian locale on certain TLDs, will (after a persistent delay condition) disable pointer interactions and load/play an external audio file from a hard-coded third-party domain. This behavior is not appropriate for a modal/dialog library and is likely malicious or at least maliciously prank-like / sabotage-oriented. Remove or patch this conditional block before using the package, and treat builds containing this behavior as compromised.
io.github.jprocms:cp-core
2.2.0
Live on maven
Blocked by Socket
The PlatformUtil fragment exhibits several high-risk patterns that could enable runtime instrumentation or backdoor-like behavior. While some elements may be legitimate for licensing enforcement or diagnostics, the combination of embedded license keys, dynamic attachment of agents via the Attach API, and extensive reflective invocation constitutes a non-trivial security risk and potential supply-chain abuse if distributed in open-source form. Maintainers should scrutinize the legitimate necessity of the Attach-based flow, consider sandboxing or removing dynamic agent loading, and ensure licensing data handling cannot be exploited to inject malicious code. At minimum, isolate these paths behind clear feature flags and add rigorous access controls and static/dynamic analysis gates before distributing such code in a dependency. Key risk signals: dynamic Attach API usage, hardcoded license bytes, temp-file-based agent loading, reflection-based control flow moderation (exit paths). Mitigation suggestions: remove or gate Attach-based instrumentation, avoid embedding sensitive keys in source, use verifiable licensing/feature-tag mechanisms, and implement strict code reviews for reflective code paths before publishing.
org.apache.nifi:nifi-python-test-extensions
2.1.0
Live on maven
Blocked by Socket
This processor contains explicit, intentional destructive behavior: after four invocations it forcefully kills its hosting process using an OS kill command (SIGKILL). That behavior causes denial-of-service for the NiFi worker or interpreter hosting the transform. There is no evidence of data exfiltration or credential theft in this fragment, but the unconditional self-termination makes the code unsafe for production and a high security risk. Remove or disable this code, or replace with non-destructive diagnostic behavior and implement safe guards (config flags, admin opt-in, non-global state). The documented dependency on pandas is unnecessary in the shown code and should be removed to reduce supply-chain surface.
io.github.reajason:generator
2.6.1
Live on maven
Blocked by Socket
This class is a memshell/backdoor that activates on a covert HTTP header and implements arbitrary proxying/port-forwarding and HTTP redirecting to attacker-controlled hosts. It disables TLS validation, uses reflection to hide behavior, persists streams in a static context for later reuse, and marshals data with XOR obfuscation. This is malicious by design and should be treated as a serious supply-chain/backdoor compromise: remove and investigate where it originated.
org/mvnpm:sweetalert2
11.15.10
Live on maven
Blocked by Socket
This SweetAlert2 code fragment contains a malicious, targeted payload: for Russian-language browsers on hosts matching Russian/former-Soviet TLDs, it persists a timestamp in localStorage and (after a 3+ day condition) disables page pointer events and injects/auto-plays a hardcoded external audio file (flag-gimn.ru). This behavior is unrelated to a UI/dialog library, is intrusive, leaks network requests to a third party, and should be treated as a supply-chain compromise. Do not use this package version; remove or revert to a vetted upstream release and perform a full repository/release audit.
io.github.reajason:generator
2.4.0
Live on maven
Blocked by Socket
This class is a malicious webshell/backdoor designed to receive an encrypted, base64-encoded payload via HTTP (header + parameter), decrypt it with a hardcoded AES key, define and load the payload class in memory using Unsafe/defineClass, execute it, and return encoded results to the requester. It provides remote code execution capabilities inside the JVM and should be treated as highly dangerous. Remove and investigate any systems containing this class and rotate secrets/keys and credentials that may have been exposed.
org/mvnpm:sweetalert2
11.22.2
Live on maven
Blocked by Socket
The SweetAlert2 library code is generally safe and well-written for its intended purpose of displaying modal dialogs. However, it contains a malicious political prank targeting Russian users on Russian domains by disabling pointer events and playing an audio file without consent. This prank constitutes unwanted and malicious behavior embedded in the supply chain, posing a moderate security risk and malware concern. Users should be cautious using this version due to this embedded prank. No other malware or obfuscation is present.
org.webjars.npm:sweetalert2
11.22.3
Live on maven
Blocked by Socket
This file contains a malicious, out-of-scope code block that targets Russian-language visitors on Russian TLDs: it records an initial timestamp in localStorage, waits more than 3 days, then disables all pointer interactions on the page and injects/attempts to autoplay an externally hosted audio file (Ukrainian anthem) from a hardcoded third-party domain. This is supply-chain sabotage / politically targeted malicious code embedded inside a UI library. Remove or revert this change, audit the package source and distribution, and treat the package as compromised.
org/mvnpm:sweetalert2
11.17.2
Live on maven
Blocked by Socket
The package contains a hidden payload that targets Russian language users visiting Russian and Belarusian sites. For those users, it will disable user interaction and play a looping audio of the Ukrainian anthem after 3 days. This behavior is not disclosed in any documentation of the package and seriously disrupts user experience.
io.github.reajason:generator
2.4.1
Live on maven
Blocked by Socket
This class is a malicious/memshell backdoor used to proxy and tunnel arbitrary network traffic via servlet request/response objects. It implements reflective access to container request/response, a custom RPC/binary protocol, dynamic outbound TCP and HTTP(S) connections, and disables TLS verification. It provides persistent in-process state (ctx) and facilities to create/forward/delete sessions and data, enabling remote control and data exfiltration. It should be treated as a high-risk backdoor and removed; any systems where this component is present should be considered compromised and investigated.
com.alibaba.ververica:ververica-connector-mongodb
1.17-vvr-8.0.11-1
Live on maven
Blocked by Socket
The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.
io.github.reajason:generator
2.6.1
Live on maven
Blocked by Socket
This class is a malicious/memshell backdoor used to proxy and tunnel arbitrary network traffic via servlet request/response objects. It implements reflective access to container request/response, a custom RPC/binary protocol, dynamic outbound TCP and HTTP(S) connections, and disables TLS verification. It provides persistent in-process state (ctx) and facilities to create/forward/delete sessions and data, enabling remote control and data exfiltration. It should be treated as a high-risk backdoor and removed; any systems where this component is present should be considered compromised and investigated.
io.github.reajason:generator
2.4.2
Live on maven
Blocked by Socket
This class is a covert Tomcat memshell/backdoor implementing a network tunneling/proxy mechanism triggered by a special HTTP header and encoded payloads. It supports creating bidirectional sockets, relaying data via HTTP responses, redirecting payloads to arbitrary URLs, disabling SSL verification, and persisting tunnel state in-process. This is malicious behavior for almost all production deployments and should be treated as a high-risk backdoor. Remove and investigate any systems where this code is present; treat any credentials or secrets in the environment as potentially compromised.
org/apache/druid:druid-core
0.14.2-incubating
Live on maven
Blocked by Socket
This file contains a compromised compression utility with embedded malicious functionality alongside legitimate Apache Druid compression operations. The code includes a 'makeEvilZip' method that deliberately creates zip files containing directory traversal attack payloads using the path '../../../../../../../../../../../../../../../tmp/evil.txt' to escape directory boundaries and write 'evil text' content to arbitrary filesystem locations. This represents a classic zip slip attack implementation that could allow attackers to overwrite system files, create backdoors, or compromise system integrity. While the code also includes 'validateZipOutputFile' security measures to prevent such attacks in normal operations, the presence of explicit attack code indicates malicious intent and represents a serious supply chain security threat.
org.netbeans.html:browser
1.8.1
Live on maven
Blocked by Socket
This module emits a browser polling script that retrieves /command.js?id=... and executes the returned response body as JavaScript via eval. It also injects parts of the response into the DOM via innerHTML. The server-side command handler is selected using a client-controlled 'id' parameter. Even if intended for legitimate automation/debugging, the design constitutes a high-risk remote command/code execution channel in the browser and should be treated as a potential backdoor/C2-like behavior requiring strict access controls and removal/containment of eval-driven execution. Malware intent (beyond dangerous capability) cannot be proven from this fragment alone, but the security risk is very high.
com.airbnb.viaduct:runtime
0.22.0
Live on maven
Blocked by Socket
The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.
org.eclipse.dirigible:dirigible-components-security-oauth2
11.1.1
Live on maven
Blocked by Socket
The code fragment exposes a web-based terminal on port 9000 via ttyd with an incomplete or mis-typed shell command ('bas'), creating a remote command execution surface without visible access controls. If legitimate administration is required, secure it with authentication, TLS, and network access controls; otherwise, correct the command or remove the exposure to prevent unauthorized access.
io.acryl:datahub-custom-plugin-lib
1.3.1.7rc1
Live on maven
Blocked by Socket
The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.
io.github.tanin47:backdoor
2.1.0
Live on maven
Blocked by Socket
Functionally, this is a BaseDataSource implementation compatible with PostgreSQL JDBC usage: it stores config, builds/parses URLs, and obtains Connections. The code fragment itself does not show active exfiltration or command-execution primitives, but the package and driver class names include 'tanin.backdoor.org' and 'backdoor', which strongly indicate a trojanized or typosquatted package intended to masquerade as the official driver. Given that the class processes and holds sensitive credentials and will initiate DB connections, this artifact represents a high supply-chain risk. Full rejection/forensic review is advised until provenance and all related classes (notably the Driver in that namespace) are validated.
org.eclipse.jetty.demos:jetty-servlet4-demo-jetty-webapp
12.1.3
Live on maven
Blocked by Socket
Conclusion: The servlet fragment contains severe security risks in a software supply chain context. The most critical risk is pathInfo-driven reflection that can load arbitrary classes and instantiate/throw them, enabling remote code execution or destabilizing behavior. Additional risks include input echoing in verbose HTML, input-driven delays (sleep), redirects, and broad exposure of internal state via diagnostics output. Immediate remediation should include: eliminating or strictly sanitizing the reflection path (do not load arbitrary classes from user input), validating and constraining allowed path/info inputs, removing or gating sleep-based delays, sanitizing all echoed data, removing sensitive diagnostics output, and ensuring proper access controls so that only trusted clients can trigger any potentially dangerous logic. Prefer a minimal, well-audited implementation with deterministic responses and no reflective behavior driven by untrusted inputs.
ai.databand:dbnd-agent
1.0.27.10
Live on maven
Blocked by Socket
The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.
org/mvnpm:sweetalert2
11.22.1
Live on maven
Blocked by Socket
This package is a UI modal/dialog library whose core functionality is benign. However, the supplied file contains a clearly inappropriate and targeted payload: when a user's browser locale begins with 'ru' and the hostname matches certain Russian TLDs, the library may disable page pointer interactions and inject+autoplay an MP3 from a hardcoded external domain (flag-gimn.ru), using localStorage to gate timing. This behavior is unrelated to the library's purpose and is malicious/abusive in a supply‑chain context. Treat this version as compromised: do not use it in production, remove or patch the injected conditional/audio logic, audit package integrity and upstream commits, and rotate any deployment artifacts that included the compromised version.
Not using GitHub? Generate reports next to your tests with our CLI
We help security teams work more efficiently
Get actionable alerts for the supply chain risks that matter. Socket highlights risky dependencies directly within the developer workflow.