{"id":"MAL-2026-844","summary":"Malicious code in vllm-plugins (PyPI)","details":"\n---\n_-= Per source details. Do not edit below this line.=-_\n\n## Source: kam193 (4fa0706d497278a502d158c89d51645a6f4e8187ca325aacaa59facccf542a03)\nGeneric campaign for all (likely) research / pentests, where the amount or art of collected data raises questions about the privacy, security and ethical side.\n\n\n---\n\nCategory: MALICIOUS - The campaign has clearly malicious intent, like infostealers.\n\n\nCampaign: GENERIC-questionable-pentest\n\n\nReasons (based on the campaign):\n\n\n - exfiltration-env-variables\n\n\n - exfiltration-generic\n\n\n - The package overrides the install command in setup.py to execute malicious code during installation.\n\n\n - typosquatting\n","modified":"2026-02-10T20:14:00.928658Z","published":"2026-02-10T19:19:17Z","database_specific":{"malicious-packages-origins":[{"source":"kam193","import_time":"2026-02-10T19:54:11.777636522Z","modified_time":"2026-02-10T19:19:17.108017Z","sha256":"4fa0706d497278a502d158c89d51645a6f4e8187ca325aacaa59facccf542a03","versions":["99.99.99"],"id":"pypi/GENERIC-questionable-pentest/vllm-plugins"}]},"references":[{"type":"WEB","url":"https://bad-packages.kam193.eu/pypi/package/vllm-plugins"}],"affected":[{"package":{"name":"vllm-plugins","ecosystem":"PyPI","purl":"pkg:pypi/vllm-plugins"},"versions":["99.99.99"],"database_specific":{"source":"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/vllm-plugins/MAL-2026-844.json"}}],"schema_version":"1.7.3","credits":[{"name":"Kamil Mańkowski (kam193)","contact":["https://github.com/kam193","https://bad-packages.kam193.eu/"],"type":"REPORTER"}]}