MAL-2023-1375

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/libtpu-nightly/MAL-2023-1375.json
JSON Data
https://api.osv.dev/v1/vulns/MAL-2023-1375
Published
2023-05-03T04:09:26Z
Modified
2023-05-03T04:09:26Z
Summary
Malicious code in libtpu-nightly (PyPI)
Details

-= Per source details. Do not edit below this line.=-

Source: ossf-package-analysis (4710fdb2d58063f6a640883c2617fc154d074a9122c261111dd2e2b10a1e9552)

The OpenSSF Package Analysis project identified 'libtpu-nightly' @ 0.1.dev20230207 (pypi) as malicious.

It is considered malicious because: - The package communicates with a domain associated with malicious activity.

Database specific
{
    "malicious-packages-origins": [
        {
            "sha256": "4710fdb2d58063f6a640883c2617fc154d074a9122c261111dd2e2b10a1e9552",
            "modified_time": "2023-05-03T04:09:26.013920759Z",
            "source": "ossf-package-analysis",
            "import_time": "2023-08-10T06:15:35.714331539Z",
            "versions": [
                "0.1.dev20230207"
            ]
        }
    ]
}
References
Credits

Affected packages

PyPI / libtpu-nightly

Package

Affected ranges

Affected versions

0.*
0.1.dev20230207

Database specific

source
"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/libtpu-nightly/MAL-2023-1375.json"