MAL-2026-3035

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/promptflow-runtime/MAL-2026-3035.json
JSON Data
https://api.osv.dev/v1/vulns/MAL-2026-3035
Published
2026-04-25T14:32:36Z
Modified
2026-04-25T15:32:54.562349Z
Summary
Malicious code in promptflow-runtime (PyPI)
Details

-= Per source details. Do not edit below this line.=-

Source: kam193 (5b42466489944454bbab304af3aa9869e3f0483cafc76b4da896f6512bb4c627)

During import, package collects basic information about the system, performs deep fingerprinting, and reports the data to the remote target. The package description attempts to build an impression it's an official package. The package name refers to the Docker image used by Microsoft's project: https://github.com/microsoft/promptflow/blob/6bfdec06ef16d875ca3b1744a1ef133f08c35340/docs/cloud/azureai/runtime-change-log.md?plain=1#L8


Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.

Campaign: 2026-04-promptflow-runtime

Reasons (based on the campaign):

  • The package contains code to exfiltrate basic data from the system, like IP or username. It has a limited risk.

  • dependency-confusion

  • impersonation

  • The package contains code to detect if it is running in a sandbox environment.

Database specific
{
    "iocs": {
        "domains": [
            "ttder9qf90.execute-api.us-east-1.amazonaws.com"
        ]
    },
    "malicious-packages-origins": [
        {
            "sha256": "5b42466489944454bbab304af3aa9869e3f0483cafc76b4da896f6512bb4c627",
            "id": "pypi/2026-04-promptflow-runtime/promptflow-runtime",
            "source": "kam193",
            "modified_time": "2026-04-25T14:32:36.714664Z",
            "import_time": "2026-04-25T15:19:06.829275572Z",
            "versions": [
                "99999999.0.0"
            ]
        }
    ]
}
References
Credits

Affected packages

PyPI / promptflow-runtime

Package

Name
promptflow-runtime
View open source insights on deps.dev
Purl
pkg:pypi/promptflow-runtime

Affected ranges

Affected versions

99999999.*
99999999.0.0

Database specific

source
"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/promptflow-runtime/MAL-2026-3035.json"