-= Per source details. Do not edit below this line.=-
Package is designed to start a bind shell during installation. However, it requires providing the port as an installation parameter, which suggests it's more research than direct malicious intentions.
Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.
Campaign: GENERIC-questionable-pentest
Reasons (based on the campaign):
exfiltration-env-variables
exfiltration-generic
The package overrides the install command in setup.py to execute malicious code during installation.
typosquatting
{
"malicious-packages-origins": [
{
"versions": [
"0.0.0"
],
"sha256": "e78be1bf65bda1455a5f08dafdf69aef528e4fb206333e1ecb6c6a97fe8adbc2",
"id": "pypi/GENERIC-questionable-pentest/pipinpeace-bind",
"import_time": "2026-03-22T17:10:02.53352425Z",
"modified_time": "2026-03-22T16:56:09.646435Z",
"source": "kam193"
}
]
}