-= Per source details. Do not edit below this line.=-
Installing the package or importing the module exfiltrates basic information about the host, and the package has no other purpose.
Category: PROBABLY_PENTEST - Packages looking like typical pentest packages, but also anything that looks like testing, exploring pre-prepared kits, research & co, with clearly low-harm possibilities.
Campaign: GENERIC-standard-pypi-install-pentest
Reasons (based on the campaign):
The package contains code to exfiltrate basic data from the system, like IP or username. It has a limited risk.
The package overrides the install command in setup.py to execute malicious code during installation.
{
"malicious-packages-origins": [
{
"import_time": "2025-12-09T19:35:12.241031488Z",
"sha256": "33176e85f6e5dce44273ddbf5be45cf64ddd36db281b50a5868851a32fb19d0c",
"versions": [
"0.1.1"
],
"modified_time": "2025-12-09T18:38:25.402617Z",
"id": "pypi/GENERIC-standard-pypi-install-pentest/ctosec-appsec-wb-xray-adapter",
"source": "kam193"
},
{
"import_time": "2025-12-09T21:38:23.459850414Z",
"sha256": "f3b9c89a55e1c016e40734b85584bc4784e2291baec85915553a4549d84f7282",
"versions": [
"0.1.1",
"0.2.0"
],
"modified_time": "2025-12-09T20:36:49.207313Z",
"id": "pypi/GENERIC-standard-pypi-install-pentest/ctosec-appsec-wb-xray-adapter",
"source": "kam193"
}
]
}