npm package discovery and stats viewer.

Discover Tips

  • General search

    [free text search, go nuts!]

  • Package details

    pkg:[package-name]

  • User packages

    @[username]

Sponsor

Optimize Toolset

I’ve always been into building performant and accessible sites, but lately I’ve been taking it extremely seriously. So much so that I’ve been building a tool to help me optimize and monitor the sites that I build to make sure that I’m making an attempt to offer the best experience to those who visit them. If you’re into performant, accessible and SEO friendly sites, you might like it too! You can check it out at Optimize Toolset.

About

Hi, 👋, I’m Ryan Hefner  and I built this site for me, and you! The goal of this site was to provide an easy way for me to check the stats on my npm packages, both for prioritizing issues and updates, and to give me a little kick in the pants to keep up on stuff.

As I was building it, I realized that I was actually using the tool to build the tool, and figured I might as well put this out there and hopefully others will find it to be a fast and useful way to search and browse npm packages as I have.

If you’re interested in other things I’m working on, follow me on Twitter or check out the open source projects I’ve been publishing on GitHub.

I am also working on a Twitter bot for this site to tweet the most popular, newest, random packages from npm. Please follow that account now and it will start sending out packages soon–ish.

Open Software & Tools

This site wouldn’t be possible without the immense generosity and tireless efforts from the people who make contributions to the world and share their work via open source initiatives. Thank you 🙏

© 2026 – Pkg Stats / Ryan Hefner

@georgegiosue/pzx

v0.2.0

Published

Find vulnerable npm packages

Readme

Package Zero-trust eXecute

Secure Javascript Ecosystem supply chain. Advanced SCA and isolated runtime validation.

License: MIT Bun Zero Dependencies codecov


Scans your filesystem, resolves real installed versions, checks OSV for CVEs, runs supply chain heuristics, performs AST analysis with Bun.Transpiler, and detonates suspicious packages in a sandboxed environment. Zero dependencies.

Usage

bunx @georgegiosue/pzx lodash
bunx @georgegiosue/pzx [package] [version] [--root <path>] [--home] [--lang <lang>] [--help]
bunx @georgegiosue/pzx                              # scan ALL installed packages
bunx @georgegiosue/pzx lodash 4.17.20               # check specific package
bunx @georgegiosue/pzx express --home               # scan from home directory
bunx @georgegiosue/pzx @babel/core -r ~/projects    # scan specific path
bunx @georgegiosue/pzx lodash --lang es             # output in Spanish

Without arguments, pzx enters full scan mode: discovers every installed package, runs static analysis locally, and only queries external APIs for packages flagged as suspicious.

Analysis Engines

| Engine | What it does | |--------|-------------| | OSV | Checks installed versions against known CVEs | | Registry | Detects abandonment, deprecation, quarantine, typosquatting | | Regex IoC | eval(), child_process, base64, IP URLs, env exfiltration | | AST | Bun.Transpiler import scanning for sensitive system modules | | Dep audit | Random names, URL/IP/file versions in sub-dependencies | | Sandbox | Detonates suspicious packages with intercepted fetch, fs, exec |

Sandbox

Packages flagged by static analysis are executed in a controlled environment:

  • Mock environment intercepts fetch, fs, child_process, http/https
  • Empty env — no AWS_SECRET_KEY, no NPM_TOKEN, nothing to steal
  • 1500ms timeout — kills the process if it blocks (C2 wait, infinite loop)
  • Violations are classified: NETWORK, EXEC, FS_READ

Exit Codes

0 no vulnerabilities | 1 error | 2 vulnerabilities found

License

MIT

Acknowledgements

Most (if not all) of this was built by AI xd