{"id":"MAL-2026-3620","summary":"Malicious code in github.com/BufferZoneCorp/config-loader (Go)","details":"\n---\n_-= Per source details. Do not edit below this line.=-_\n\n## Source: google-open-source-security (a4e4f74e90479d472a307d311d48214827e21cf93ecf9b0b62ff2cb72adb2c9e)\nThis package is a malicious packages part of the Go BufferZoneCorp and RubyGems knot-theory clusters.\nThe packages in this cluster steal credentials, set up ssh access and tamper with build/workflow environmetn variables.\n","modified":"2026-05-13T04:16:43.993422Z","published":"2026-05-13T03:09:00Z","database_specific":{"malicious-packages-origins":[{"ranges":[{"events":[{"introduced":"0"}],"type":"SEMVER"}],"modified_time":"2026-05-13T03:51:44Z","sha256":"a4e4f74e90479d472a307d311d48214827e21cf93ecf9b0b62ff2cb72adb2c9e","source":"google-open-source-security","import_time":"2026-05-13T03:53:19.895958Z"}],"iocs":{"urls":["https://webhook.site/49c21843-c27c-4a1b-b1f6-037c3998055f"]}},"references":[{"type":"ARTICLE","url":"https://socket.dev/blog/malicious-ruby-gems-and-go-modules-steal-secrets-poison-ci"}],"affected":[{"package":{"name":"github.com/BufferZoneCorp/config-loader","ecosystem":"Go","purl":"pkg:golang/github.com/BufferZoneCorp/config-loader"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"}]}],"database_specific":{"source":"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/go/github.com/bufferzonecorp/config-loader/MAL-2026-3620.json"}}],"schema_version":"1.7.5"}