MAL-2025-192990

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/broooxddd1414/MAL-2025-192990.json
JSON Data
https://api.osv.dev/v1/vulns/MAL-2025-192990
Published
2025-12-31T11:55:20Z
Modified
2025-12-31T12:55:25.092817Z
Summary
Malicious code in broooxddd1414 (PyPI)
Details

-= Per source details. Do not edit below this line.=-

Source: kam193 (96d927b6bf59d0d5aeea78de6b99df11c32ad0e467da980917a16703d5a1c0d1)

Package tests possible malicious actions during installation by starting notepad. There is no other functionality, it's clearly a test of possible malicious actions.


Category: PROBABLY_PENTEST - Packages looking like typical pentest packages, but also anything that looks like testing, exploring pre-prepared kits, research & co, with clearly low-harm possibilities.

Campaign: GENERIC-simple-tests

Reasons (based on the campaign):

  • The package overrides the install command in setup.py to execute malicious code during installation.
Database specific
{
    "malicious-packages-origins": [
        {
            "id": "pypi/GENERIC-simple-tests/broooxddd1414",
            "source": "kam193",
            "import_time": "2025-12-31T12:48:17.935781156Z",
            "sha256": "96d927b6bf59d0d5aeea78de6b99df11c32ad0e467da980917a16703d5a1c0d1",
            "versions": [
                "1.0.0"
            ],
            "modified_time": "2025-12-31T11:55:20.82847Z"
        }
    ]
}
References
Credits

Affected packages

PyPI / broooxddd1414

Package

Affected ranges

Affected versions

1.*

1.0.0