MAL-2026-2315

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/latinum-wallet-mcp/MAL-2026-2315.json
JSON Data
https://api.osv.dev/v1/vulns/MAL-2026-2315
Published
2026-03-31T20:37:05Z
Modified
2026-04-02T13:35:16.170380Z
Summary
Malicious code in latinum-wallet-mcp (PyPI)
Details

-= Per source details. Do not edit below this line.=-

Source: kam193 (afbe7d2a026f5fb11d3046e061ded50c350b420b146cd446fc0e009cb7190543)

Starting version 0.0.32, the code automatically exfiltrates the private key together with other metrics during the buildmcpwallet_server() call for the Solana wallet. Additionally, the code is automatically added as an MCP server for Claude during import since version 0.0.34. Both actions are not present in the corresponding GitHub repository, which stopped being updated on version 0.0.30. The exfiltration target is the same as the hidden no-consent telemetry present in previous versions.


Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.

Campaign: 2026-03-old-latinum-wallet-mcp

Reasons (based on the campaign):

  • crypto-related

  • exfiltration-crypto

  • action-hidden-in-lib-usage

  • modify-system-without-consent

Database specific
{
    "malicious-packages-origins": [
        {
            "versions": [
                "0.0.1",
                "0.0.2",
                "0.0.3",
                "0.0.4",
                "0.0.5",
                "0.0.6",
                "0.0.7",
                "0.0.8",
                "0.0.9",
                "0.0.10",
                "0.0.11",
                "0.0.12",
                "0.0.13",
                "0.0.14",
                "0.0.15",
                "0.0.16",
                "0.0.17",
                "0.0.18",
                "0.0.19",
                "0.0.20",
                "0.0.21",
                "0.0.22",
                "0.0.23",
                "0.0.24",
                "0.0.25",
                "0.0.26",
                "0.0.27",
                "0.0.28",
                "0.0.29",
                "0.0.30",
                "0.0.31",
                "0.0.32",
                "0.0.33",
                "0.0.34",
                "0.0.35",
                "0.0.36"
            ],
            "source": "kam193",
            "import_time": "2026-03-31T20:48:12.56838193Z",
            "modified_time": "2026-03-31T20:41:09.651273Z",
            "id": "pypi/2026-03-old-latinum-wallet-mcp/latinum-wallet-mcp",
            "sha256": "afbe7d2a026f5fb11d3046e061ded50c350b420b146cd446fc0e009cb7190543"
        },
        {
            "versions": [
                "0.0.32",
                "0.0.33",
                "0.0.34",
                "0.0.35",
                "0.0.36"
            ],
            "source": "kam193",
            "import_time": "2026-03-31T21:17:12.436247111Z",
            "modified_time": "2026-03-31T20:41:09.651273Z",
            "id": "pypi/2026-03-old-latinum-wallet-mcp/latinum-wallet-mcp",
            "sha256": "903bf4fc179f73ae34f58c0b4c08b9d09d27754903e190203ba468bca9e2666e"
        }
    ],
    "iocs": {
        "urls": [
            "https://facilitator.latinum.ai"
        ]
    }
}
References
Credits

Affected packages

PyPI / latinum-wallet-mcp

Package

Name
latinum-wallet-mcp
View open source insights on deps.dev
Purl
pkg:pypi/latinum-wallet-mcp

Affected ranges

Affected versions

0.*
0.0.32
0.0.33
0.0.34
0.0.35
0.0.36

Database specific

source
"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/latinum-wallet-mcp/MAL-2026-2315.json"