{"id":"MAL-2024-5372","summary":"Malicious code in mnemonic-to-address (PyPI)","details":"\n---\n_-= Per source details. Do not edit below this line.=-_\n","modified":"2024-10-24T01:01:58Z","published":"2024-06-25T13:37:18Z","database_specific":{"malicious-packages-origins":[{"source":"reversing-labs","import_time":"2024-06-28T02:49:26.977114001Z","versions":["1.2.8","1.2.7","1.0.0"],"sha256":"970ee756a56a3f8bdbd88fa48f94b61456da06fc15fe128b8d42bfa67fe974fa","modified_time":"2024-06-25T13:37:18Z","id":"RLMA-2024-04154"},{"source":"reversing-labs","import_time":"2024-10-24T00:59:27.991084742Z","sha256":"e9db15683262980ce81b41fc7bb9b35d41bc44f610e7f2be7b369ca93654a38a","modified_time":"2024-10-16T14:43:47Z","id":"RLUA-2024-08525"}]},"references":[{"type":"ARTICLE","url":"https://www.reversinglabs.com/blog/bipclip-malicious-pypi-packages-target-crypto-wallet-recovery-passwords"}],"affected":[{"package":{"name":"mnemonic-to-address","ecosystem":"PyPI","purl":"pkg:pypi/mnemonic-to-address"},"versions":["1.2.8","1.2.7","1.0.0"],"database_specific":{"source":"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/mnemonic-to-address/MAL-2024-5372.json"}}],"schema_version":"1.7.3","credits":[{"name":"ReversingLabs","contact":["https://www.reversinglabs.com"],"type":"FINDER"}]}