{"id":"MAL-2025-1008","summary":"Malicious code in wr-test (PyPI)","details":"\n---\n_-= Per source details. Do not edit below this line.=-_\n\n## Source: kam193 (3e752a2e84135761f1cf5319ed23d3a78b994ea011df850c87938442ad249180)\nInstalling the package or importing the module exfiltrates basic information about the host, and the package has no other purpose.\n\n\n---\n\nCategory: PROBABLY_PENTEST - Packages looking like typical pentest packages, but also anything that looks like testing, exploring pre-prepared kits, research & co, with clearly low-harm possibilities.\n\n\nCampaign: GENERIC-standard-pypi-install-pentest\n\n\nReasons (based on the campaign):\n\n\n - The package contains code to exfiltrate basic data from the system, like IP or username. It has a limited risk.\n\n\n - The package overrides the install command in setup.py to execute malicious code during installation.\n","modified":"2026-03-19T12:37:09.796175Z","published":"2024-07-26T16:53:30Z","database_specific":{"malicious-packages-origins":[{"id":"RLMA-2025-00549","modified_time":"2025-02-03T17:08:06Z","versions":["100.1337","101.1337"],"source":"reversing-labs","import_time":"2025-02-03T18:38:10.535784555Z","sha256":"0f881f015eb09cdd8461fccdfca701638e1e39b121eb08d119c1b0a712965355"},{"id":"pypi/GENERIC-standard-pypi-install-pentest/wr-test","modified_time":"2024-07-26T16:53:30Z","ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"source":"kam193","import_time":"2025-12-02T22:30:56.512708087Z","sha256":"0226ba113a95eba5c5935a4c65548e0441a4ff9385d42362c54d871f397713fa"},{"id":"pypi/GENERIC-standard-pypi-install-pentest/wr-test","modified_time":"2024-07-26T16:53:30Z","ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"source":"kam193","import_time":"2025-12-02T23:07:19.696529786Z","sha256":"3e752a2e84135761f1cf5319ed23d3a78b994ea011df850c87938442ad249180"},{"id":"pypi/GENERIC-standard-pypi-install-pentest/wr-test","modified_time":"2024-07-26T16:53:30Z","versions":["100.1337","101.1337"],"source":"kam193","import_time":"2025-12-10T21:38:58.784155887Z","sha256":"b13d01b97f0197912cf29a7d1f210944139caceda9baa44300aef27ed97d521e"},{"id":"RLUA-2026-00935","modified_time":"2026-03-18T12:20:40Z","source":"reversing-labs","import_time":"2026-03-19T12:20:44.774169811Z","sha256":"4bc3598747ad0c008d3a5753e061b282d03f93c7969e144b1a8b1303f62fef97"}]},"references":[{"type":"WEB","url":"https://bad-packages.kam193.eu/pypi/package/wr-test"}],"affected":[{"package":{"name":"wr-test","ecosystem":"PyPI","purl":"pkg:pypi/wr-test"},"versions":["100.1337","101.1337"],"database_specific":{"source":"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/wr-test/MAL-2025-1008.json"}}],"schema_version":"1.7.5","credits":[{"name":"Kamil Mańkowski (kam193)","contact":["https://github.com/kam193","https://bad-packages.kam193.eu/"]},{"name":"Kamil Mańkowski (kam193)","contact":["https://github.com/kam193","https://bad-packages.kam193.eu/"],"type":"REPORTER"},{"name":"ReversingLabs","contact":["https://www.reversinglabs.com"],"type":"FINDER"}]}