{"id":"MAL-2025-6007","summary":"Malicious code in groq-mcp (PyPI)","details":"\n---\n_-= Per source details. Do not edit below this line.=-_\n\n## Source: kam193 (f310f1669db9ce74e36d92085a6a67098f7c0ee086d8da5998b709d565a3fe12)\nInstalling the package or importing the module exfiltrates basic information about the host, and the package has no other purpose.\n\n\n---\n\nCategory: PROBABLY_PENTEST - Packages looking like typical pentest packages, but also anything that looks like testing, exploring pre-prepared kits, research & co, with clearly low-harm possibilities.\n\n\nCampaign: GENERIC-standard-pypi-install-pentest\n\n\nReasons (based on the campaign):\n\n\n - The package contains code to exfiltrate basic data from the system, like IP or username. It has a limited risk.\n\n\n - The package overrides the install command in setup.py to execute malicious code during installation.\n\n## Source: ossf-package-analysis (b7952d7703221f736f36b232e942803539ca0ebf66b1c2aaec2ab61ea6322a3c)\nThe OpenSSF Package Analysis project identified 'groq-mcp' @ 9.9.9 (pypi) as malicious.\n\nIt is considered malicious because:\n\n- The package communicates with a domain associated with malicious activity.\n","modified":"2025-12-12T20:39:51.003385Z","published":"2025-07-18T12:26:01Z","database_specific":{"malicious-packages-origins":[{"sha256":"b7952d7703221f736f36b232e942803539ca0ebf66b1c2aaec2ab61ea6322a3c","import_time":"2025-07-18T12:47:58.289528651Z","versions":["9.9.9"],"source":"ossf-package-analysis","modified_time":"2025-07-18T12:26:01Z"},{"sha256":"fc413b596aae50402d046f5c014166dcdf6224cbd1e0747f115afabf40ba9aa0","import_time":"2025-07-18T12:47:58.397259178Z","versions":["0.0.1"],"source":"ossf-package-analysis","modified_time":"2025-07-18T12:26:08Z"},{"sha256":"3bce71434ebf3069c03ca9d1ec208c7a2a59c434ba1a3eff63d31a60cbf32c71","import_time":"2025-12-02T22:30:56.077558232Z","id":"pypi/GENERIC-standard-pypi-install-pentest/groq-mcp","source":"kam193","ranges":[{"events":[{"introduced":"0"}],"type":"ECOSYSTEM"}],"modified_time":"2025-07-18T12:52:34.204769Z"},{"sha256":"f310f1669db9ce74e36d92085a6a67098f7c0ee086d8da5998b709d565a3fe12","import_time":"2025-12-02T23:07:19.267256899Z","id":"pypi/GENERIC-standard-pypi-install-pentest/groq-mcp","source":"kam193","ranges":[{"events":[{"introduced":"0"}],"type":"ECOSYSTEM"}],"modified_time":"2025-07-18T12:52:34.204769Z"},{"sha256":"8a06702c9112febb789f6b893da3c506199aadc17eefb5b9ee940ebde77c751c","import_time":"2025-12-10T21:38:58.407191749Z","id":"pypi/GENERIC-standard-pypi-install-pentest/groq-mcp","versions":["0.0.1","9.9.9"],"source":"kam193","modified_time":"2025-07-18T12:52:34.204769Z"}]},"references":[{"type":"WEB","url":"https://bad-packages.kam193.eu/pypi/package/groq-mcp"}],"affected":[{"package":{"name":"groq-mcp","ecosystem":"PyPI","purl":"pkg:pypi/groq-mcp"},"versions":["9.9.9","0.0.1"],"database_specific":{"source":"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/groq-mcp/MAL-2025-6007.json"}}],"schema_version":"1.7.3","credits":[{"name":"Kamil Mańkowski (kam193)","contact":["https://github.com/kam193","https://bad-packages.kam193.eu/"]},{"name":"Kamil Mańkowski (kam193)","contact":["https://github.com/kam193","https://bad-packages.kam193.eu/"],"type":"ANALYST"},{"name":"OpenSSF: Package Analysis","contact":["https://github.com/ossf/package-analysis","https://openssf.slack.com/channels/package_analysis"],"type":"FINDER"}]}