{"id":"MAL-2026-903","summary":"Malicious code in requests-toolkit (PyPI)","details":"\n---\n_-= Per source details. Do not edit below this line.=-_\n\n## Source: kam193 (ccf88804317b4caf9661eb94c320a521f7689c5cf26a8754ec219d268fc9c873)\nDuring import, package masquerade and starts an embedded executable. The executable has signs of infostealer activity\n\n\n---\n\nCategory: MALICIOUS - The campaign has clearly malicious intent, like infostealers.\n\n\nCampaign: 2026-02-requests-toolkit\n\n\nReasons (based on the campaign):\n\n\n - impersonation\n\n\n - infostealer\n\n\n - malware\n\n\n - The package contains code to detect if it is running in a sandbox environment.\n\n\n - keylogger\n","modified":"2026-02-15T00:44:25.021243Z","published":"2026-02-15T00:02:57Z","database_specific":{"malicious-packages-origins":[{"versions":["0.1.2","0.1.3"],"import_time":"2026-02-15T00:36:28.43756293Z","source":"kam193","sha256":"ccf88804317b4caf9661eb94c320a521f7689c5cf26a8754ec219d268fc9c873","modified_time":"2026-02-15T00:02:57.643541Z","id":"pypi/2026-02-requests-toolkit/requests-toolkit"}]},"references":[{"type":"EVIDENCE","url":"https://www.virustotal.com/gui/file/af261caf84b235f17213f8deada55b8b867b5dcf7932330ca1a502e8530a35a5/detection"},{"type":"WEB","url":"https://bad-packages.kam193.eu/pypi/package/requests-toolkit"}],"affected":[{"package":{"name":"requests-toolkit","ecosystem":"PyPI","purl":"pkg:pypi/requests-toolkit"},"versions":["0.1.2","0.1.3"],"database_specific":{"source":"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/requests-toolkit/MAL-2026-903.json"}}],"schema_version":"1.7.3","credits":[{"name":"Kamil Mańkowski (kam193)","contact":["https://github.com/kam193","https://bad-packages.kam193.eu/"],"type":"REPORTER"}]}