Malicious code in guardrails-ai 0.10.1 (supply chain compromise)
Description
Impact
On May 11, 2026 at approximately 6:00 PM Pacific, an attacker published a malicious version of guardrails-ai (0.10.1) to PyPI.
Affected: any user who installed guardrails-ai==0.10.1 from PyPI on May 11, 2026.
Security researchers identified the malicious package within approximately 2 hours of publication, and PyPI quarantined the repository. Based on our telemetry, we have observed no requests to Guardrails AI infrastructure originating from the malicious 0.10.1 version, and a review of system and access logs has produced no evidence of user data exfiltration through our systems.
For the full timeline, technical details, and remediation steps we have taken, see SECURITY_ADVISORY.md.
Patches
No patched version above 0.10.1 is available yet. **Downgrade to 0.10.0**, which is unaffected.
Workarounds
1. Pin to a safe version:
guardrails-ai==0.10.0
2. While the PyPI quarantine is active, install from GitHub:
pip install git+https://github.com/guardrails-ai/guardrails.git@v0.10.0
The v0.10.0 tag in this repository is clean. Track quarantine status here: #1473.
3. If you installed 0.10.1, treat the host as potentially compromised. Rotate any credentials accessible from that machine (GitHub PATs, cloud provider keys, package registry tokens, API keys) and audit your GitHub account for unauthorized workflows or repositories.
4. Snowglobe and Guardrails Hub users : all Snowglobe and Guardrails Hub API keys will be invalidated at 2:00 PM Pacific on May 13, 2026. Rotate yours before then to avoid service interruption.
References
- Full advisory, timeline, and remediation details: SECURITY_ADVISORY.md
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
An attacker published a malicious version of guardrails-ai (0.10.1) to PyPI as part of a supply chain campaign; users who installed it on May 11, 2026 are affected.
Vulnerability
On May 11, 2026, an attacker published a malicious version of guardrails-ai (0.10.1) to PyPI as part of a broader supply chain campaign [1][2][3][4]. Any user who installed guardrails-ai==0.10.1 from PyPI on that date is affected; versions 0.10.0 and earlier are safe [1][2]. The malicious package was identified within approximately two hours, and PyPI quarantined the repository [2][3].
Exploitation
The attacker uploaded the malicious package to PyPI, requiring no special network position or authentication from the victim beyond a standard pip install guardrails-ai command [1][2][4]. Users who upgraded to or freshly installed version 0.10.1 during the window between publication and quarantine (less than two hours) would have retrieved the malicious code onto their local environment [2][4].
Impact
If installed, the malicious code could compromise the host system. Based on vendor telemetry, no requests to Guardrails AI infrastructure originated from the malicious version, and no evidence of user data exfiltration through their systems has been observed [1][2][3][4]. However, any credentials (GitHub PATs, cloud provider keys, package registry tokens, API keys) accessible from that machine are considered potentially exposed, and the host should be treated as compromised [2][3][4].
Mitigation
No patched version above 0.10.1 is available yet; users should downgrade to 0.10.0, which is unaffected [1][2][3][4]. While PyPI quarantine is active, users can install directly from GitHub via pip install git+https://github.com/guardrails-ai/guardrails.git@v0.10.0 [2][3][4]. Those who installed 0.10.1 must rotate all credentials accessible from the host and audit GitHub accounts for unauthorized activity [2][3][4]. Snowglobe and Guardrails Hub API keys will be invalidated on May 13, 2026; users should rotate them before then [1][2][3][4].
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2= 0.10.1+ 1 more
- (no CPE)range: = 0.10.1
- (no CPE)range: ==0.10.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.