MAL-2026-1933

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/libavcodec-extra/MAL-2026-1933.json
JSON Data
https://api.osv.dev/v1/vulns/MAL-2026-1933
Published
2026-03-19T17:37:46Z
Modified
2026-03-19T18:02:10.124320Z
Summary
Malicious code in libavcodec-extra (PyPI)
Details

-= Per source details. Do not edit below this line.=-

Source: kam193 (00a68b4208fb4614b815e8a867c2155a8667b424e6457e3b72da362edbad9615)

During installation or import, the package exfiltrates basic information in a dependency confusion attempt. The user identifies themselves as a HackerOne user abusing the PyPI for the purpose of a bug bounty program.


Category: PROBABLY_PENTEST - Packages looking like typical pentest packages, but also anything that looks like testing, exploring pre-prepared kits, research & co, with clearly low-harm possibilities.

Campaign: GENERIC-hackerone-bugbounty

Reasons (based on the campaign):

  • dependency-confusion

  • The package contains code to exfiltrate basic data from the system, like IP or username. It has a limited risk.

Database specific
{
    "malicious-packages-origins": [
        {
            "import_time": "2026-03-19T17:50:10.448032625Z",
            "modified_time": "2026-03-19T17:37:46.313379Z",
            "versions": [
                "99.99.9"
            ],
            "sha256": "00a68b4208fb4614b815e8a867c2155a8667b424e6457e3b72da362edbad9615",
            "id": "pypi/GENERIC-hackerone-bugbounty/libavcodec-extra",
            "source": "kam193"
        }
    ]
}
References
Credits

Affected packages

PyPI / libavcodec-extra

Package

Name
libavcodec-extra
View open source insights on deps.dev
Purl
pkg:pypi/libavcodec-extra

Affected ranges

Affected versions

99.*
99.99.9

Database specific

source
"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/libavcodec-extra/MAL-2026-1933.json"