{"id":"MAL-2026-503","summary":"Malicious code in test-poc-package-for-session-2 (PyPI)","details":"\n---\n_-= Per source details. Do not edit below this line.=-_\n\n## Source: kam193 (0b7003b7bd9585bbb25ce1f957ffef83603883d550f07f77443780a7d47a7f20)\nPackages that might be part of testing for pentesting / malicious activity / joy, with suspicious activity that does not present any real harm.\n\n\n---\n\nCategory: PROBABLY_PENTEST - Packages looking like typical pentest packages, but also anything that looks like testing, exploring pre-prepared kits, research & co, with clearly low-harm possibilities.\n\n\nCampaign: GENERIC-simple-tests\n\n\nReasons (based on the campaign):\n\n\n - The package overrides the install command in setup.py to execute malicious code during installation.\n","modified":"2026-01-25T10:49:53.727821Z","published":"2026-01-25T10:04:44Z","database_specific":{"malicious-packages-origins":[{"source":"kam193","import_time":"2026-01-25T10:40:49.929057089Z","versions":["0.0.1"],"modified_time":"2026-01-25T10:04:44.820759Z","sha256":"0b7003b7bd9585bbb25ce1f957ffef83603883d550f07f77443780a7d47a7f20","id":"pypi/GENERIC-simple-tests/test-poc-package-for-session-2"}]},"references":[{"type":"WEB","url":"https://bad-packages.kam193.eu/pypi/package/test-poc-package-for-session-2"}],"affected":[{"package":{"name":"test-poc-package-for-session-2","ecosystem":"PyPI","purl":"pkg:pypi/test-poc-package-for-session-2"},"versions":["0.0.1"],"database_specific":{"source":"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/test-poc-package-for-session-2/MAL-2026-503.json"}}],"schema_version":"1.7.3","credits":[{"name":"Kamil Mańkowski (kam193)","contact":["https://github.com/kam193","https://bad-packages.kam193.eu/"],"type":"ANALYST"}]}