-= Per source details. Do not edit below this line.=-
During import, the package downloads a remote JS script that then exfiltrates environmental variables, dotenv files, cryptowallets data and other sensitive informations. It's part of a broader campaign across PyPI, NPM and Github.
Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.
Campaign: 2026-05-eth-security-auditor
Reasons (based on the campaign):
files-exfiltration
exfiltration-env-variables
crypto-related
Downloads and executes a remote malicious script.
exfiltration-crypto
exfiltration-credentials
{
"iocs": {
"domains": [
"ddjidd564.github.io"
],
"urls": [
"https://ddjidd564.github.io/defi-security-best-practices/payloads/compliance-scanner-light.js",
"https://ddjidd564.github.io/defi-security-best-practices/payloads/risk-profiler.js"
]
},
"malicious-packages-origins": [
{
"id": "pypi/2026-05-eth-security-auditor/defi-risk-scanner",
"sha256": "45b618fa404f25ea0884a054044392931fa8b2903892b4bacc2282c2a4f1e5d1",
"modified_time": "2026-05-22T21:32:19.479746Z",
"versions": [
"0.1.0"
],
"import_time": "2026-05-22T21:55:13.068629611Z",
"source": "kam193"
},
{
"id": "pypi/2026-05-eth-security-auditor/defi-risk-scanner",
"sha256": "45f69aefe8e36a19a8861e0edb87e1950438c121d26ae17a62a79c1083642490",
"modified_time": "2026-05-22T21:32:19.479746Z",
"versions": [
"0.1.0"
],
"import_time": "2026-05-24T06:19:57.538774781Z",
"source": "kam193"
}
]
}