RUSTSEC-2026-0019

Source
https://rustsec.org/advisories/RUSTSEC-2026-0019
Import Source
https://github.com/rustsec/advisory-db/blob/osv/crates/RUSTSEC-2026-0019.json
JSON Data
https://api.osv.dev/v1/vulns/RUSTSEC-2026-0019
Aliases
Published
2026-02-24T12:00:00Z
Modified
2026-03-05T05:53:11Z
Summary
`tracing-check` was removed from crates.io for malicious code
Details

This is part of an ongoing campaign to attempt to typosquat crates in the <code>polymarket-client-sdk</code> ecosystem to exfiltrate user credentials.

The malicious crate had 1 version published on 2026-02-24 approximately 4 hours before removal and had no evidence of actual downloads. There were no crates depending on this crate on crates.io.

The crates.io team advises anyone developing with Polymarket to review dependencies carefully. We are investigating ways to mitigate this attacker who appears to be very motivated to steal Polymarket credentials.

Database specific
{
    "license": "CC0-1.0"
}
References

Affected packages

crates.io / tracing-check

Package

Name
tracing-check
View open source insights on deps.dev
Purl
pkg:cargo/tracing-check

Affected ranges

Type
SEMVER
Events
Introduced
0.0.0-0

Ecosystem specific

{
    "affected_functions": null,
    "affects": {
        "functions": [],
        "os": [],
        "arch": []
    }
}

Database specific

categories
[]
cvss
null
informational
null
source
"https://github.com/rustsec/advisory-db/blob/osv/crates/RUSTSEC-2026-0019.json"