MAL-2026-1049

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/flycord/MAL-2026-1049.json
JSON Data
https://api.osv.dev/v1/vulns/MAL-2026-1049
Published
2026-02-26T15:38:34Z
Modified
2026-02-26T16:02:47.712925Z
Summary
Malicious code in flycord (PyPI)
Details

-= Per source details. Do not edit below this line.=-

Source: kam193 (b2071af47a4b327550f5614253b291b893e0741e6f2ebe3b4378a4794696d211)

When the user uses the provided library, this package silently reports basic information and the result of the user's action to a hardcoded, obfuscated URL. Given the lack of an opt-out possibility, collection of usernames, obfuscated target and not disclosing it anywhere, it cannot be classified as telemetry.


Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.

Campaign: 2026-02-flycord

Reasons (based on the campaign):

  • obfuscation

  • The package contains code to exfiltrate basic data from the system, like IP or username. It has a limited risk.

  • action-hidden-in-lib-usage

Database specific
{
    "malicious-packages-origins": [
        {
            "id": "pypi/2026-02-flycord/flycord",
            "modified_time": "2026-02-26T15:38:34.49123Z",
            "source": "kam193",
            "sha256": "b2071af47a4b327550f5614253b291b893e0741e6f2ebe3b4378a4794696d211",
            "import_time": "2026-02-26T15:49:50.613017646Z",
            "versions": [
                "1.2.4"
            ]
        }
    ]
}
References
Credits

Affected packages

PyPI / flycord

Package

Affected ranges

Affected versions

1.*
1.2.4

Database specific

source
"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/flycord/MAL-2026-1049.json"