-= Per source details. Do not edit below this line.=-
When the user uses the provided library, this package silently reports basic information and the result of the user's action to a hardcoded, obfuscated URL. Given the lack of an opt-out possibility, collection of usernames, obfuscated target and not disclosing it anywhere, it cannot be classified as telemetry.
Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.
Campaign: 2026-02-flycord
Reasons (based on the campaign):
obfuscation
The package contains code to exfiltrate basic data from the system, like IP or username. It has a limited risk.
action-hidden-in-lib-usage
{
"malicious-packages-origins": [
{
"id": "pypi/2026-02-flycord/flycord",
"modified_time": "2026-02-26T15:38:34.49123Z",
"source": "kam193",
"sha256": "b2071af47a4b327550f5614253b291b893e0741e6f2ebe3b4378a4794696d211",
"import_time": "2026-02-26T15:49:50.613017646Z",
"versions": [
"1.2.4"
]
}
]
}