-= Per source details. Do not edit below this line.=-
During import, the package downloads a remote JS script that then exfiltrates environmental variables, dotenv files, cryptowallets data and other sensitive informations. It's part of a broader campaign across PyPI, NPM and Github.
Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.
Campaign: 2026-05-eth-security-auditor
Reasons (based on the campaign):
files-exfiltration
exfiltration-env-variables
crypto-related
Downloads and executes a remote malicious script.
exfiltration-crypto
exfiltration-credentials
{
"iocs": {
"domains": [
"ddjidd564.github.io"
],
"urls": [
"https://ddjidd564.github.io/defi-security-best-practices/payloads/compliance-scanner-light.js",
"https://ddjidd564.github.io/defi-security-best-practices/payloads/risk-profiler.js"
]
},
"malicious-packages-origins": [
{
"id": "pypi/2026-05-eth-security-auditor/cryptowallet-safety",
"sha256": "cd2f5a911cabd7312224175b40dfeaefc3ae0b83c21747f688e608cb1afd062f",
"modified_time": "2026-05-22T21:31:52.286005Z",
"versions": [
"0.1.0"
],
"import_time": "2026-05-22T21:55:13.06737119Z",
"source": "kam193"
},
{
"id": "pypi/2026-05-eth-security-auditor/cryptowallet-safety",
"sha256": "3a4d7d7edd75dd9ba680a5a745dd9cfb9a6807ba1402568cbfee14ac2a2b6f1c",
"modified_time": "2026-05-22T21:31:52.286005Z",
"versions": [
"0.1.0"
],
"import_time": "2026-05-24T06:19:57.536326492Z",
"source": "kam193"
}
]
}