MAL-2026-2267

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/rubygems/monolith-twirp-partitioning-pull_requests/MAL-2026-2267.json
JSON Data
https://api.test.osv.dev/v1/vulns/MAL-2026-2267
Published
2026-03-27T13:36:59Z
Modified
2026-03-27T14:34:20.597064Z
Summary
Malicious code in monolith-twirp-partitioning-pull_requests (RubyGems)
Details

-= Per source details. Do not edit below this line.=-

Source: ossf-package-analysis (4214957e3e8849b6df7eb3bbd1b2c6e547fe8aa2c590a8a3a644e7d6ea8d73ed)

The OpenSSF Package Analysis project identified 'monolith-twirp-partitioning-pull_requests' @ 1.0.2 (rubygems) as malicious.

It is considered malicious because:

  • The package communicates with a domain associated with malicious activity.
Database specific
{
    "malicious-packages-origins": [
        {
            "import_time": "2026-03-27T14:25:18.480041262Z",
            "sha256": "4214957e3e8849b6df7eb3bbd1b2c6e547fe8aa2c590a8a3a644e7d6ea8d73ed",
            "modified_time": "2026-03-27T13:36:59Z",
            "versions": [
                "1.0.2"
            ],
            "source": "ossf-package-analysis"
        }
    ]
}
References
Credits

Affected packages

RubyGems / monolith-twirp-partitioning-pull_requests

Package

Name
monolith-twirp-partitioning-pull_requests
Purl
pkg:gem/monolith-twirp-partitioning-pull_requests

Affected ranges

Affected versions

1.*
1.0.2

Database specific

source
"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/rubygems/monolith-twirp-partitioning-pull_requests/MAL-2026-2267.json"