MAL-2025-191678

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/amd-taichi/MAL-2025-191678.json
JSON Data
https://api.osv.dev/v1/vulns/MAL-2025-191678
Published
2025-09-15T14:34:20Z
Modified
2025-12-31T02:52:01.157983Z
Summary
Malicious code in amd-taichi (PyPI)
Details

-= Per source details. Do not edit below this line.=-

Source: kam193 (4f9a360052987b7df8a2686b98678789e6699d7f6592a2191a5d6346a7897d7d)

Installing the package or importing the module exfiltrates basic information about the host, and the package has no other purpose.


Category: PROBABLY_PENTEST - Packages looking like typical pentest packages, but also anything that looks like testing, exploring pre-prepared kits, research & co, with clearly low-harm possibilities.

Campaign: GENERIC-standard-pypi-install-pentest

Reasons (based on the campaign):

  • The package contains code to exfiltrate basic data from the system, like IP or username. It has a limited risk.

  • The package overrides the install command in setup.py to execute malicious code during installation.

Database specific
{
    "malicious-packages-origins": [
        {
            "id": "pypi/GENERIC-standard-pypi-install-pentest/amd-taichi",
            "sha256": "51d6ed28487a2a29433430ce7cc6a369df7fe0b068a767aa31c3ef4ea2374370",
            "modified_time": "2025-09-15T15:31:50.038426Z",
            "versions": [
                "1.0.0",
                "0.1.10",
                "0.1.9",
                "0.1.8",
                "0.1.7",
                "0.1.6",
                "0.1.5",
                "0.1.11",
                "0.1.12",
                "0.1.13"
            ],
            "import_time": "2025-12-02T22:30:55.828703355Z",
            "source": "kam193"
        },
        {
            "id": "pypi/GENERIC-standard-pypi-install-pentest/amd-taichi",
            "sha256": "4f9a360052987b7df8a2686b98678789e6699d7f6592a2191a5d6346a7897d7d",
            "modified_time": "2025-09-15T15:31:50.038426Z",
            "versions": [
                "1.0.0",
                "0.1.10",
                "0.1.9",
                "0.1.8",
                "0.1.7",
                "0.1.6",
                "0.1.5",
                "0.1.11",
                "0.1.12",
                "0.1.13"
            ],
            "import_time": "2025-12-02T23:07:19.008207123Z",
            "source": "kam193"
        },
        {
            "id": "pypi/GENERIC-standard-pypi-install-pentest/amd-taichi",
            "sha256": "e478d524426cfc42f7e256ec665d268507bd1acb7c9470081b481877f9d4727f",
            "modified_time": "2025-09-15T15:31:50.038426Z",
            "versions": [
                "0.1.5",
                "0.1.6",
                "0.1.7",
                "0.1.8",
                "0.1.9",
                "0.1.10",
                "0.1.11",
                "0.1.12",
                "0.1.13",
                "1.0.0"
            ],
            "import_time": "2025-12-30T22:39:04.265835422Z",
            "source": "kam193"
        }
    ]
}
References
Credits

Affected packages

PyPI / amd-taichi

Package

Affected ranges

Affected versions

0.*
0.1.5
0.1.6
0.1.7
0.1.8
0.1.9
0.1.10
0.1.11
0.1.12
0.1.13
1.*
1.0.0

Database specific

source
"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/amd-taichi/MAL-2025-191678.json"