{"id":"MAL-2023-1375","summary":"Malicious code in libtpu-nightly (PyPI)","details":"\n---\n_-= Per source details. Do not edit below this line.=-_\n\n## Source: ossf-package-analysis (4710fdb2d58063f6a640883c2617fc154d074a9122c261111dd2e2b10a1e9552)\nThe OpenSSF Package Analysis project identified 'libtpu-nightly' @ 0.1.dev20230207 (pypi) as malicious.\n\nIt is considered malicious because:\n- The package communicates with a domain associated with malicious activity.\n","modified":"2023-05-03T04:09:26Z","published":"2023-05-03T04:09:26Z","database_specific":{"malicious-packages-origins":[{"source":"ossf-package-analysis","modified_time":"2023-05-03T04:09:26.013920759Z","sha256":"4710fdb2d58063f6a640883c2617fc154d074a9122c261111dd2e2b10a1e9552","versions":["0.1.dev20230207"],"import_time":"2023-08-10T06:15:35.714331539Z"}]},"affected":[{"package":{"name":"libtpu-nightly","ecosystem":"PyPI","purl":"pkg:pypi/libtpu-nightly"},"versions":["0.1.dev20230207"],"database_specific":{"source":"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/libtpu-nightly/MAL-2023-1375.json"}}],"schema_version":"1.7.3","credits":[{"name":"OpenSSF: Package Analysis","contact":["https://github.com/ossf/package-analysis","https://openssf.slack.com/channels/package_analysis"],"type":"FINDER"}]}