RUSTSEC-2026-0018

Source
https://rustsec.org/advisories/RUSTSEC-2026-0018
Import Source
https://github.com/rustsec/advisory-db/blob/osv/crates/RUSTSEC-2026-0018.json
JSON Data
https://api.osv.dev/v1/vulns/RUSTSEC-2026-0018
Published
2026-02-24T12:00:00Z
Modified
2026-02-24T16:58:18.268633Z
Summary
`rpc-check` was removed from crates.io for malicious code
Details

This is part of an ongoing campaign to attempt to typosquat crates in the <code>polymarket-client-sdk</code> ecosystem to exfiltrate user credentials.

The malicious crate had 6 versions published from 2026-02-20 onwards and had no evidence of actual usage. There were no crates depending on this crate on crates.io.

Thanks to Eren for finding and reporting this to the Rust security response working group, and to Emily Albini for co-ordinating with the crates.io team.

The crates.io team advises anyone developing with Polymarket to review dependencies carefully. We are investigating ways to mitigate this attacker who appears to be very motivated to steal Polymarket credentials.

Database specific
{
    "license": "CC0-1.0"
}
References

Affected packages

crates.io / rpc-check

Package

Affected ranges

Type
SEMVER
Events
Introduced
0.0.0-0

Ecosystem specific

{
    "affected_functions": null,
    "affects": {
        "functions": [],
        "os": [],
        "arch": []
    }
}

Database specific

categories
[]
cvss
null
informational
null
source
"https://github.com/rustsec/advisory-db/blob/osv/crates/RUSTSEC-2026-0018.json"