pypi · Malicious package advisory
Malwareamino-fix
MAL-2026-3686
Malicious code in amino-fix (PyPI)
Details
---
_-= Per source details. Do not edit below this line.=-_
## Source: amazon-inspector (807db606fec148f1acf0e1ddb4ec2e0a68ba672bb8e5641f9eefd0d425f30a44)
The asyncfix subpackage's `signature()` helper in aminofix/asyncfix/lib/util/helpers.py (lines 22-25) does not compute the NDC-MSG-SIG locally. Instead, every JSON request body is sent as a query string to `http://aminoed.uk.to/api/generator/ndc-msg-sig?data={data}` over unencrypted HTTP. This helper is invoked by every authenticated endpoint of the library, including `client.login(email, password)` — the advertised primary function. As a result, any caller using the async API silently transmits the end-user's plaintext email and password (and all other request bodies) as URL query parameters to `aminoed.uk.to`, a free `.uk.to` subdomain unrelated to the real Amino service (`service.narvii.com`). This is a textbook silent-relay: a hardcoded third-party destination embedded in public API code that exfiltrates caller-supplied credentials without disclosure, over plaintext HTTP with no TLS. A secondary import-time version-check against pypi.org is benign (data-only, printed to stdout) and not a dropper, but is noted as an unrelated quality issue.
Compromised versions (1)
- 2.1.8
Any computer that installed or ran a compromised version should be considered fully compromised. Rotate every secret on that machine from a clean environment.