Socket for Java

io.gitee.pucong:crab-ai-engine
1.1.7.snapshot
Live on maven
Blocked by Socket
High security concern. This module implements a persistent interactive OS shell and executes arbitrary text commands supplied to executeCommand/runSkillBash, including a Windows path that invokes PowerShell with -ExecutionPolicy Bypass. It also stages resource contents to disk before executing the provided shell content. This is consistent with malicious command execution/backdoor tooling or extremely dangerous “command runner” infrastructure. Immediate review/containment and removal of this behavior are recommended if this is a third-party dependency.
org.jeecgframework.jimureport:jimubi-spring-boot-starter
2.3.2
Live on maven
Blocked by Socket
This fragment contains a high-risk capability to execute arbitrary JavaScript sourced from configuration via new Function('params', l.jsConfig), which is consistent with backdoor-like behavior when configuration can be influenced. It further increases risk by opening external URLs with weak validation and by collecting configuration-provided icon/script URLs into a loader mechanism elsewhere in the bundle, enabling potential remote asset/script injection and supply-chain style compromise. Given these strong indicators, the module should be treated as security-critical and reviewed for strict configuration integrity and removal/containment of dynamic code execution.
com.github.xujiaji.erupt:erupt-web
1.14.1
Live on maven
Blocked by Socket
This code fragment contains a high-confidence, explicitly malicious supply-chain/tenant takeover primitive: it fetches tenant configuration over HTTP and executes tenant-provided JavaScript at runtime via new Function(...)(...) in the browser context. It additionally supports tenant-controlled CSS injection and includes Angular sanitizer bypasses for HTML and resource URLs, further increasing impact if untrusted data is rendered. Treat the dependency/module as dangerous and require strong controls (authenticated endpoints, integrity validation, CSP, and removal/disablement of runtime remote JS execution).
io.github.reajason:generator
2.7.0
Live on maven
Blocked by Socket
This code is a deliberate webshell/memshell providing an HTTP-based covert channel and TCP/HTTP proxying capabilities. It accepts specially crafted requests (via header marker and base64-framed payloads), establishes outbound connections to arbitrary hosts/ports, spawns threads to forward data, and stores persistent tunnel state in a shared context. It also disables SSL verification for HTTPS connections. This is malicious functionality (remote access/tunneling/backdoor) and should be considered highly dangerous and removed from any production environment.
org.cometd.javascript:cometd-javascript-dojo
6.0.18
Live on maven
Blocked by Socket
The code implements a cross-context VBScript evaluation bridge that allows executing dynamic code via VBScript’s ExecuteGlobal from JavaScript inside a hidden iframe. This introduces a high-risk dynamic code execution vector, especially if untrusted input can reach vbEval/vb_global_eval or construct. While the snippet may be part of a legitimate cross-language interop mechanism, its exposure to external input constitutes a plausible malware/supply-chain risk in that it can facilitate arbitrary code execution, data leakage, or sandbox circumventing. Treat as a potential high-risk pattern needing strict input validation, context isolation, and removal or replacement with safer interop mechanisms.
io.acryl:datahub-custom-plugin-lib
1.5.0.11rc2
Live on maven
Blocked by Socket
The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.
io.github.reajason:generator
2.7.0
Live on maven
Blocked by Socket
This class is a dynamic payload loader: it decodes (base64 and optional gzip) a supplied string into class bytes, reflectively defines the class bypassing visibility, instantiates it and returns its toString(). That behavior provides an in-process arbitrary code loading and execution primitive. In a software supply-chain context this is high risk: if untrusted data can reach this method it can enable remote or local code execution, backdoors, or payload execution. Use of reflection to call defineClass with setAccessible increases the malicious potential. The code fragment itself is a loader (suspicious in libraries) and should be treated as dangerous unless its inputs are strictly controlled and validated.
org.eclipse.jetty.demos:jetty-servlet4-demo-jetty-webapp
12.1.5
Live on maven
Blocked by Socket
Conclusion: The servlet fragment contains severe security risks in a software supply chain context. The most critical risk is pathInfo-driven reflection that can load arbitrary classes and instantiate/throw them, enabling remote code execution or destabilizing behavior. Additional risks include input echoing in verbose HTML, input-driven delays (sleep), redirects, and broad exposure of internal state via diagnostics output. Immediate remediation should include: eliminating or strictly sanitizing the reflection path (do not load arbitrary classes from user input), validating and constraining allowed path/info inputs, removing or gating sleep-based delays, sanitizing all echoed data, removing sensitive diagnostics output, and ensuring proper access controls so that only trusted clients can trigger any potentially dangerous logic. Prefer a minimal, well-audited implementation with deterministic responses and no reflective behavior driven by untrusted inputs.
io.acryl:datahub-custom-plugin-lib
1.5.0.11
Live on maven
Blocked by Socket
The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.
com.xnx3.util:xnx3-util
1.36
Live on maven
Blocked by Socket
FileUtil contains legitimate IO utilities but embeds significant security weaknesses: TLS trust verification bypass, hardcoded logging paths, and opaque error messages. In a supply-chain context, including such code as a dependency poses medium-to-high risk of data leakage, MITM exposure, or unwanted disk writes if abused or misconfigured. Recommend removing the SSL bypass components, eliminating hardcoded paths, adding input validation, and ensuring secure defaults before reuse or publishing.
org.eclipse.jetty.demos:jetty-servlet4-demo-jetty-webapp
12.1.4
Live on maven
Blocked by Socket
Conclusion: The servlet fragment contains severe security risks in a software supply chain context. The most critical risk is pathInfo-driven reflection that can load arbitrary classes and instantiate/throw them, enabling remote code execution or destabilizing behavior. Additional risks include input echoing in verbose HTML, input-driven delays (sleep), redirects, and broad exposure of internal state via diagnostics output. Immediate remediation should include: eliminating or strictly sanitizing the reflection path (do not load arbitrary classes from user input), validating and constraining allowed path/info inputs, removing or gating sleep-based delays, sanitizing all echoed data, removing sensitive diagnostics output, and ensuring proper access controls so that only trusted clients can trigger any potentially dangerous logic. Prefer a minimal, well-audited implementation with deterministic responses and no reflective behavior driven by untrusted inputs.
io.acryl:datahub-custom-plugin-lib
1.5.0.14
Live on maven
Blocked by Socket
The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.
io.gitee.pucong:crab-ai-engine
1.1.8.snapshot
Live on maven
Blocked by Socket
This module is a high-risk local tool execution component that starts a persistent OS shell (bash or Windows cmd/powershell) and injects caller-controlled commands directly into the shell stdin, then returns/parses shell output. It also provides arbitrary file read/write by caller-controlled paths. The presence of a PowerShell execution-policy bypass on Windows and the lack of visible path confinement/sandboxing in the shown fragment make the overall security posture dangerous; if inputs are not strictly trusted, the capability set aligns with command-execution and local data access/backdoor-like behavior.
io.acryl:datahub-custom-plugin-lib
1.3.1.1.post1
Live on maven
Blocked by Socket
The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.
io.github.reajason:packer
2.7.0
Live on maven
Blocked by Socket
This class constructs a known deserialization gadget chain: it creates/loads a TemplatesImpl containing arbitrary class bytes and embeds it into a PriorityQueue wired with a modified BeanComparator using ByteBuddy and reflective field mutation. The final object graph is sent to a generator that produces a serialized payload string. This is an explicit exploit-construction utility (not benign). It enables creation of payloads that can trigger arbitrary bytecode execution when fed to vulnerable deserializers (TemplatesImpl gadget). Use of this code represents a high security risk and should be treated as malicious in the context of producing exploitation payloads.
io.acryl:datahub-custom-plugin-lib
1.2.0.11rc1.post1
Live on maven
Blocked by Socket
The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.
org.apache.karaf.webconsole:org.apache.karaf.webconsole.gogo
2.2.11
Live on maven
Blocked by Socket
The code demonstrates deliberate keystroke capture with normalization and encoding, directed toward a queue-based sink that is likely transmitted over the network. This pattern aligns with keystroke logging or input exfiltration risks. While not conclusively malicious in isolation, the data flow warrants careful review of the surrounding code, the queue() implementation, and the actual network endpoints to ensure user consent, destination trust, and minimized data exposure.
org.cometd.javascript:cometd-javascript-dojo
7.0.18
Live on maven
Blocked by Socket
The code implements a cross-context VBScript evaluation bridge that allows executing dynamic code via VBScript’s ExecuteGlobal from JavaScript inside a hidden iframe. This introduces a high-risk dynamic code execution vector, especially if untrusted input can reach vbEval/vb_global_eval or construct. While the snippet may be part of a legitimate cross-language interop mechanism, its exposure to external input constitutes a plausible malware/supply-chain risk in that it can facilitate arbitrary code execution, data leakage, or sandbox circumventing. Treat as a potential high-risk pattern needing strict input validation, context isolation, and removal or replacement with safer interop mechanisms.
org.apache.flink:flink-shaded-hadoop-2
2.6.5-9.0
Live on maven
Blocked by Socket
The module primarily implements standard HDFS DFS client behavior (NameNode RPC proxying, lease renewal, peer/network setup, and protobuf parsing). However, it contains a highly suspicious embedded fault-injection/sabotage mechanism: a configuration-controlled mode (dfs.client.test.drop.namenode.response.number) that logs the client as “hacked” and intentionally creates a lossy NameNode proxy handler to proactively drop responses. This can directly cause denial-of-service or correctness/availability degradation if the configuration is enabled or attacker-influenced. No explicit exfiltration, backdoor, or system/credential theft is evident in the provided fragment; the dominant risk is deliberate availability/correctness impairment of NameNode communications.
org.mvnpm.at.ithaka:pharos
14.23.0
Live on maven
Blocked by Socket
This fragment is best treated as a high-risk payload container: it is opaque, highly obfuscated/packed, and lacks visible executable logic. No concrete malicious actions (network/file/process/exfiltration) can be verified from this fragment alone, but the structure strongly suggests it is intended for runtime decoding and subsequent malicious behavior. Full review of the surrounding decoder/entry points is required before trusting the dependency.
io.acryl:datahub-custom-plugin-lib
1.5.0.4rc1
Live on maven
Blocked by Socket
The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.
org.jboss.pnc.npm-manipulator:npm-manipulator-cli
1.3.3
Live on maven
Blocked by Socket
This module provides a clear, high-risk capability for user-driven remote script execution: preScript/postScript values from CLI -D are treated as URL/path specifiers, downloaded (when non-file), written to an executable temp file, and then executed via subprocess spawning. There is no visible allowlisting or validation in this fragment, making abuse plausible if an attacker can influence CLI properties and/or the execution environment. OpenTelemetry exporter activation via environment variables adds an additional potential egress channel. While intent cannot be proven from this fragment alone, the behavior is sufficiently dangerous to treat as a major supply-chain execution risk requiring strict controls (disabling/allowlisting pre/post scripts, enforcing trusted domains/schemes, verifying content, and constraining process execution).
org.gov4j.govway:govway-monitor-ui-api
20260424
Live on maven
Blocked by Socket
The code exhibits high-risk, dynamic code execution paths that can be triggered by untrusted input. The reliance on script injection and eval-based transformation of event handlers makes it unsuitable for a secure JSON parsing utility. Replace with a standards-compliant, strictly JSON.parse-based flow, remove dynamic evaluation, and prohibit transforming strings into executable code. In a supply-chain context, this code poses significant security risk and should be deprecated or heavily sandboxed.
love.yinlin.platform.os:auto-update
3.6.0
Live on maven
Blocked by Socket
This module implements a high-impact self-update/unzip-and-replace routine: it extracts attacker-controlled archive contents onto disk (with overwrite), then executes OS shell commands that delete and replace the application directory ('app'), and finally exits the current process. Path traversal into locations outside the target directory is partially mitigated, but there is no visible authenticity/integrity verification of the update archive within this code. Overall, the combination of archive-to-disk writing plus destructive shell execution is a strong supply-chain execution risk and consistent with malware/sabotage staging if the ZIP can be influenced.
com.github.axet:android-library
1.14.29
Live on maven
Blocked by Socket
High-risk client-side request interception. This code globally overrides form submission and XMLHttpRequest methods to capture submitted form fields, XHR destination/metadata, credentials passed to XHR.open (user/pass), and request headers/payload. It forwards the collected data to an external interception object and fabricates successful XHR responses to hide interception from application logic. Treat as malicious/surveillance-capable unless proven otherwise by reviewing the interception.customSubmit/customAjax implementations and their destinations/behavior.
io.gitee.pucong:crab-ai-engine
1.1.7.snapshot
Live on maven
Blocked by Socket
High security concern. This module implements a persistent interactive OS shell and executes arbitrary text commands supplied to executeCommand/runSkillBash, including a Windows path that invokes PowerShell with -ExecutionPolicy Bypass. It also stages resource contents to disk before executing the provided shell content. This is consistent with malicious command execution/backdoor tooling or extremely dangerous “command runner” infrastructure. Immediate review/containment and removal of this behavior are recommended if this is a third-party dependency.
org.jeecgframework.jimureport:jimubi-spring-boot-starter
2.3.2
Live on maven
Blocked by Socket
This fragment contains a high-risk capability to execute arbitrary JavaScript sourced from configuration via new Function('params', l.jsConfig), which is consistent with backdoor-like behavior when configuration can be influenced. It further increases risk by opening external URLs with weak validation and by collecting configuration-provided icon/script URLs into a loader mechanism elsewhere in the bundle, enabling potential remote asset/script injection and supply-chain style compromise. Given these strong indicators, the module should be treated as security-critical and reviewed for strict configuration integrity and removal/containment of dynamic code execution.
com.github.xujiaji.erupt:erupt-web
1.14.1
Live on maven
Blocked by Socket
This code fragment contains a high-confidence, explicitly malicious supply-chain/tenant takeover primitive: it fetches tenant configuration over HTTP and executes tenant-provided JavaScript at runtime via new Function(...)(...) in the browser context. It additionally supports tenant-controlled CSS injection and includes Angular sanitizer bypasses for HTML and resource URLs, further increasing impact if untrusted data is rendered. Treat the dependency/module as dangerous and require strong controls (authenticated endpoints, integrity validation, CSP, and removal/disablement of runtime remote JS execution).
io.github.reajason:generator
2.7.0
Live on maven
Blocked by Socket
This code is a deliberate webshell/memshell providing an HTTP-based covert channel and TCP/HTTP proxying capabilities. It accepts specially crafted requests (via header marker and base64-framed payloads), establishes outbound connections to arbitrary hosts/ports, spawns threads to forward data, and stores persistent tunnel state in a shared context. It also disables SSL verification for HTTPS connections. This is malicious functionality (remote access/tunneling/backdoor) and should be considered highly dangerous and removed from any production environment.
org.cometd.javascript:cometd-javascript-dojo
6.0.18
Live on maven
Blocked by Socket
The code implements a cross-context VBScript evaluation bridge that allows executing dynamic code via VBScript’s ExecuteGlobal from JavaScript inside a hidden iframe. This introduces a high-risk dynamic code execution vector, especially if untrusted input can reach vbEval/vb_global_eval or construct. While the snippet may be part of a legitimate cross-language interop mechanism, its exposure to external input constitutes a plausible malware/supply-chain risk in that it can facilitate arbitrary code execution, data leakage, or sandbox circumventing. Treat as a potential high-risk pattern needing strict input validation, context isolation, and removal or replacement with safer interop mechanisms.
io.acryl:datahub-custom-plugin-lib
1.5.0.11rc2
Live on maven
Blocked by Socket
The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.
io.github.reajason:generator
2.7.0
Live on maven
Blocked by Socket
This class is a dynamic payload loader: it decodes (base64 and optional gzip) a supplied string into class bytes, reflectively defines the class bypassing visibility, instantiates it and returns its toString(). That behavior provides an in-process arbitrary code loading and execution primitive. In a software supply-chain context this is high risk: if untrusted data can reach this method it can enable remote or local code execution, backdoors, or payload execution. Use of reflection to call defineClass with setAccessible increases the malicious potential. The code fragment itself is a loader (suspicious in libraries) and should be treated as dangerous unless its inputs are strictly controlled and validated.
org.eclipse.jetty.demos:jetty-servlet4-demo-jetty-webapp
12.1.5
Live on maven
Blocked by Socket
Conclusion: The servlet fragment contains severe security risks in a software supply chain context. The most critical risk is pathInfo-driven reflection that can load arbitrary classes and instantiate/throw them, enabling remote code execution or destabilizing behavior. Additional risks include input echoing in verbose HTML, input-driven delays (sleep), redirects, and broad exposure of internal state via diagnostics output. Immediate remediation should include: eliminating or strictly sanitizing the reflection path (do not load arbitrary classes from user input), validating and constraining allowed path/info inputs, removing or gating sleep-based delays, sanitizing all echoed data, removing sensitive diagnostics output, and ensuring proper access controls so that only trusted clients can trigger any potentially dangerous logic. Prefer a minimal, well-audited implementation with deterministic responses and no reflective behavior driven by untrusted inputs.
io.acryl:datahub-custom-plugin-lib
1.5.0.11
Live on maven
Blocked by Socket
The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.
com.xnx3.util:xnx3-util
1.36
Live on maven
Blocked by Socket
FileUtil contains legitimate IO utilities but embeds significant security weaknesses: TLS trust verification bypass, hardcoded logging paths, and opaque error messages. In a supply-chain context, including such code as a dependency poses medium-to-high risk of data leakage, MITM exposure, or unwanted disk writes if abused or misconfigured. Recommend removing the SSL bypass components, eliminating hardcoded paths, adding input validation, and ensuring secure defaults before reuse or publishing.
org.eclipse.jetty.demos:jetty-servlet4-demo-jetty-webapp
12.1.4
Live on maven
Blocked by Socket
Conclusion: The servlet fragment contains severe security risks in a software supply chain context. The most critical risk is pathInfo-driven reflection that can load arbitrary classes and instantiate/throw them, enabling remote code execution or destabilizing behavior. Additional risks include input echoing in verbose HTML, input-driven delays (sleep), redirects, and broad exposure of internal state via diagnostics output. Immediate remediation should include: eliminating or strictly sanitizing the reflection path (do not load arbitrary classes from user input), validating and constraining allowed path/info inputs, removing or gating sleep-based delays, sanitizing all echoed data, removing sensitive diagnostics output, and ensuring proper access controls so that only trusted clients can trigger any potentially dangerous logic. Prefer a minimal, well-audited implementation with deterministic responses and no reflective behavior driven by untrusted inputs.
io.acryl:datahub-custom-plugin-lib
1.5.0.14
Live on maven
Blocked by Socket
The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.
io.gitee.pucong:crab-ai-engine
1.1.8.snapshot
Live on maven
Blocked by Socket
This module is a high-risk local tool execution component that starts a persistent OS shell (bash or Windows cmd/powershell) and injects caller-controlled commands directly into the shell stdin, then returns/parses shell output. It also provides arbitrary file read/write by caller-controlled paths. The presence of a PowerShell execution-policy bypass on Windows and the lack of visible path confinement/sandboxing in the shown fragment make the overall security posture dangerous; if inputs are not strictly trusted, the capability set aligns with command-execution and local data access/backdoor-like behavior.
io.acryl:datahub-custom-plugin-lib
1.3.1.1.post1
Live on maven
Blocked by Socket
The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.
io.github.reajason:packer
2.7.0
Live on maven
Blocked by Socket
This class constructs a known deserialization gadget chain: it creates/loads a TemplatesImpl containing arbitrary class bytes and embeds it into a PriorityQueue wired with a modified BeanComparator using ByteBuddy and reflective field mutation. The final object graph is sent to a generator that produces a serialized payload string. This is an explicit exploit-construction utility (not benign). It enables creation of payloads that can trigger arbitrary bytecode execution when fed to vulnerable deserializers (TemplatesImpl gadget). Use of this code represents a high security risk and should be treated as malicious in the context of producing exploitation payloads.
io.acryl:datahub-custom-plugin-lib
1.2.0.11rc1.post1
Live on maven
Blocked by Socket
The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.
org.apache.karaf.webconsole:org.apache.karaf.webconsole.gogo
2.2.11
Live on maven
Blocked by Socket
The code demonstrates deliberate keystroke capture with normalization and encoding, directed toward a queue-based sink that is likely transmitted over the network. This pattern aligns with keystroke logging or input exfiltration risks. While not conclusively malicious in isolation, the data flow warrants careful review of the surrounding code, the queue() implementation, and the actual network endpoints to ensure user consent, destination trust, and minimized data exposure.
org.cometd.javascript:cometd-javascript-dojo
7.0.18
Live on maven
Blocked by Socket
The code implements a cross-context VBScript evaluation bridge that allows executing dynamic code via VBScript’s ExecuteGlobal from JavaScript inside a hidden iframe. This introduces a high-risk dynamic code execution vector, especially if untrusted input can reach vbEval/vb_global_eval or construct. While the snippet may be part of a legitimate cross-language interop mechanism, its exposure to external input constitutes a plausible malware/supply-chain risk in that it can facilitate arbitrary code execution, data leakage, or sandbox circumventing. Treat as a potential high-risk pattern needing strict input validation, context isolation, and removal or replacement with safer interop mechanisms.
org.apache.flink:flink-shaded-hadoop-2
2.6.5-9.0
Live on maven
Blocked by Socket
The module primarily implements standard HDFS DFS client behavior (NameNode RPC proxying, lease renewal, peer/network setup, and protobuf parsing). However, it contains a highly suspicious embedded fault-injection/sabotage mechanism: a configuration-controlled mode (dfs.client.test.drop.namenode.response.number) that logs the client as “hacked” and intentionally creates a lossy NameNode proxy handler to proactively drop responses. This can directly cause denial-of-service or correctness/availability degradation if the configuration is enabled or attacker-influenced. No explicit exfiltration, backdoor, or system/credential theft is evident in the provided fragment; the dominant risk is deliberate availability/correctness impairment of NameNode communications.
org.mvnpm.at.ithaka:pharos
14.23.0
Live on maven
Blocked by Socket
This fragment is best treated as a high-risk payload container: it is opaque, highly obfuscated/packed, and lacks visible executable logic. No concrete malicious actions (network/file/process/exfiltration) can be verified from this fragment alone, but the structure strongly suggests it is intended for runtime decoding and subsequent malicious behavior. Full review of the surrounding decoder/entry points is required before trusting the dependency.
io.acryl:datahub-custom-plugin-lib
1.5.0.4rc1
Live on maven
Blocked by Socket
The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.
org.jboss.pnc.npm-manipulator:npm-manipulator-cli
1.3.3
Live on maven
Blocked by Socket
This module provides a clear, high-risk capability for user-driven remote script execution: preScript/postScript values from CLI -D are treated as URL/path specifiers, downloaded (when non-file), written to an executable temp file, and then executed via subprocess spawning. There is no visible allowlisting or validation in this fragment, making abuse plausible if an attacker can influence CLI properties and/or the execution environment. OpenTelemetry exporter activation via environment variables adds an additional potential egress channel. While intent cannot be proven from this fragment alone, the behavior is sufficiently dangerous to treat as a major supply-chain execution risk requiring strict controls (disabling/allowlisting pre/post scripts, enforcing trusted domains/schemes, verifying content, and constraining process execution).
org.gov4j.govway:govway-monitor-ui-api
20260424
Live on maven
Blocked by Socket
The code exhibits high-risk, dynamic code execution paths that can be triggered by untrusted input. The reliance on script injection and eval-based transformation of event handlers makes it unsuitable for a secure JSON parsing utility. Replace with a standards-compliant, strictly JSON.parse-based flow, remove dynamic evaluation, and prohibit transforming strings into executable code. In a supply-chain context, this code poses significant security risk and should be deprecated or heavily sandboxed.
love.yinlin.platform.os:auto-update
3.6.0
Live on maven
Blocked by Socket
This module implements a high-impact self-update/unzip-and-replace routine: it extracts attacker-controlled archive contents onto disk (with overwrite), then executes OS shell commands that delete and replace the application directory ('app'), and finally exits the current process. Path traversal into locations outside the target directory is partially mitigated, but there is no visible authenticity/integrity verification of the update archive within this code. Overall, the combination of archive-to-disk writing plus destructive shell execution is a strong supply-chain execution risk and consistent with malware/sabotage staging if the ZIP can be influenced.
com.github.axet:android-library
1.14.29
Live on maven
Blocked by Socket
High-risk client-side request interception. This code globally overrides form submission and XMLHttpRequest methods to capture submitted form fields, XHR destination/metadata, credentials passed to XHR.open (user/pass), and request headers/payload. It forwards the collected data to an external interception object and fabricates successful XHR responses to hide interception from application logic. Treat as malicious/surveillance-capable unless proven otherwise by reviewing the interception.customSubmit/customAjax implementations and their destinations/behavior.
Not using GitHub? Generate reports next to your tests with our CLI
We help security teams work more efficiently
Get actionable alerts for the supply chain risks that matter. Socket highlights risky dependencies directly within the developer workflow.