-= Per source details. Do not edit below this line.=-
During import, package masquerade and starts an embedded executable. The executable has signs of infostealer activity
Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.
Campaign: 2026-02-requests-toolkit
Reasons (based on the campaign):
impersonation
infostealer
malware
The package contains code to detect if it is running in a sandbox environment.
keylogger
{
"malicious-packages-origins": [
{
"import_time": "2026-02-16T07:28:49.580166101Z",
"modified_time": "2026-02-16T07:03:21.22114Z",
"id": "pypi/2026-02-requests-toolkit/http-request-toolkit",
"sha256": "13b29a753802db633ab987963543535999a246049761d4d29699b66edf207f13",
"source": "kam193",
"versions": [
"2.28.3",
"2.28.4",
"2.28.5"
]
}
]
}