Skip to content

Commit ed21ee9

Browse files
author
github-actions
committed
Ingest OSV - Cloud Storage
1 parent 8b1c7a9 commit ed21ee9

File tree

2 files changed

+52
-1
lines changed

2 files changed

+52
-1
lines changed

config/start-keys.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ amazon-inspector:
33
kam193:
44
pypi/packages/malicious/osv/: 68c79282aac2d3cfce2c6fbe395472370c021052
55
pypi/packages/pentest/osv/: 0d65fa30569acb74a4cd2f6968297f9cf794b510
6-
pypi/packages/probably_pentest/osv/: a6c23b5f3cb4d8c457bdb72fa8ce0a8d32ae473c
6+
pypi/packages/probably_pentest/osv/: e2101cdce9fb3f5aefb31e20aaa34c51dd44ed18
77
ossf-package-analysis:
88
confident/: confident/20260323/094949-npm-unhandledrejection1-1.0.2.json
99
reversing-labs:
Lines changed: 51 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,51 @@
1+
{
2+
"modified": "2026-03-25T06:58:31Z",
3+
"published": "2026-03-25T06:58:31Z",
4+
"schema_version": "1.7.4",
5+
"id": "",
6+
"summary": "Pentesting or research code in vision-service-python-client-internal (PyPI)",
7+
"details": "Installing the package or importing the module exfiltrates basic information about the host, and the package has no other purpose.\n\n\n---\n\nCategory: PROBABLY_PENTEST - Packages looking like typical pentest packages, but also anything that looks like testing, exploring pre-prepared kits, research \u0026 co, with clearly low-harm possibilities.\n\n\nCampaign: GENERIC-standard-pypi-install-pentest\n\n\nReasons (based on the campaign):\n\n\n - The package contains code to exfiltrate basic data from the system, like IP or username. It has a limited risk.\n\n\n - The package overrides the install command in setup.py to execute malicious code during installation.\n\n",
8+
"affected": [
9+
{
10+
"package": {
11+
"ecosystem": "PyPI",
12+
"name": "vision-service-python-client-internal"
13+
},
14+
"versions": [
15+
"0.0.1",
16+
"0.3.156"
17+
]
18+
}
19+
],
20+
"references": [
21+
{
22+
"type": "WEB",
23+
"url": "https://bad-packages.kam193.eu/pypi/package/vision-service-python-client-internal"
24+
}
25+
],
26+
"credits": [
27+
{
28+
"name": "Kamil Mańkowski (kam193)",
29+
"type": "REPORTER",
30+
"contact": [
31+
"https://github.com/kam193",
32+
"https://bad-packages.kam193.eu/"
33+
]
34+
}
35+
],
36+
"database_specific": {
37+
"malicious-packages-origins": [
38+
{
39+
"source": "kam193",
40+
"sha256": "ea39ef97e61556ba1ef289f438f9401ced47328bd49f096401ed4795792c8f7a",
41+
"import_time": "2026-03-25T07:50:16.763778755Z",
42+
"id": "pypi/GENERIC-standard-pypi-install-pentest/vision-service-python-client-internal",
43+
"modified_time": "2026-03-25T06:58:31.618289Z",
44+
"versions": [
45+
"0.0.1",
46+
"0.3.156"
47+
]
48+
}
49+
]
50+
}
51+
}

0 commit comments

Comments
 (0)