{"id":"MAL-2025-3600","summary":"Malicious code in hello-wordl (PyPI)","details":"\n---\n_-= Per source details. Do not edit below this line.=-_\n\n## Source: kam193 (238c137f1939d99c855ef5fedf6f16b67ac8fcd9087d80270475d3eeff8e8c65)\nInstalling the package or importing the module exfiltrates basic information about the host, and the package has no other purpose.\n\n\n---\n\nCategory: PROBABLY_PENTEST - Packages looking like typical pentest packages, but also anything that looks like testing, exploring pre-prepared kits, research & co, with clearly low-harm possibilities.\n\n\nCampaign: GENERIC-standard-pypi-install-pentest\n\n\nReasons (based on the campaign):\n\n\n - The package contains code to exfiltrate basic data from the system, like IP or username. It has a limited risk.\n\n\n - The package overrides the install command in setup.py to execute malicious code during installation.\n\n## Source: ossf-package-analysis (130b3663b76a97ade6e8b4ac7fd68832b2d953067f5c9f251198e5eca48461e2)\nThe OpenSSF Package Analysis project identified 'hello-wordl' @ 0.2.0 (pypi) as malicious.\n\nIt is considered malicious because:\n\n- The package communicates with a domain associated with malicious activity.\n","modified":"2025-12-12T20:39:56.381242Z","published":"2024-07-26T16:53:30Z","database_specific":{"malicious-packages-origins":[{"source":"ossf-package-analysis","sha256":"130b3663b76a97ade6e8b4ac7fd68832b2d953067f5c9f251198e5eca48461e2","versions":["0.2.0"],"modified_time":"2025-05-05T13:40:56Z","import_time":"2025-05-05T14:06:13.854479122Z"},{"source":"kam193","id":"pypi/GENERIC-standard-pypi-install-pentest/hello-wordl","ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"modified_time":"2024-07-26T16:53:30Z","import_time":"2025-12-02T22:30:56.091684352Z","sha256":"d3ea1c780c53f42386d526814ec348487c0c266852a0978b7ec8acc281fe29b3"},{"source":"kam193","id":"pypi/GENERIC-standard-pypi-install-pentest/hello-wordl","ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"modified_time":"2024-07-26T16:53:30Z","import_time":"2025-12-02T23:07:19.280341304Z","sha256":"238c137f1939d99c855ef5fedf6f16b67ac8fcd9087d80270475d3eeff8e8c65"},{"source":"kam193","id":"pypi/GENERIC-standard-pypi-install-pentest/hello-wordl","versions":["0.2.0"],"modified_time":"2024-07-26T16:53:30Z","import_time":"2025-12-10T21:38:58.417397551Z","sha256":"c38b6f059994bf42ed0a0a58d3e6071ef4fca6891e3bea183fb4110810c20133"}]},"references":[{"type":"WEB","url":"https://bad-packages.kam193.eu/pypi/package/hello-wordl"}],"affected":[{"package":{"name":"hello-wordl","ecosystem":"PyPI","purl":"pkg:pypi/hello-wordl"},"versions":["0.2.0"],"database_specific":{"source":"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/hello-wordl/MAL-2025-3600.json"}}],"schema_version":"1.7.3","credits":[{"name":"Kamil Mańkowski (kam193)","contact":["https://github.com/kam193","https://bad-packages.kam193.eu/"]},{"name":"Kamil Mańkowski (kam193)","contact":["https://github.com/kam193","https://bad-packages.kam193.eu/"],"type":"ANALYST"},{"name":"OpenSSF: Package Analysis","contact":["https://github.com/ossf/package-analysis","https://openssf.slack.com/channels/package_analysis"],"type":"FINDER"}]}