pypi · Malicious package advisory
Malwarejatinangor-teleport-testing-zer0id
MAL-2026-3746
Malicious code in jatinangor-teleport-testing-zer0id (PyPI)
Details
--- _-= Per source details. Do not edit below this line.=-_ ## Source: kam193 (34c3a001b297d2dfcc37259733ff95ded758a3a89d63331422f239359c60edd2) Installing the package or importing the module exfiltrates basic information about the host, and the package has no other purpose. --- Category: PROBABLY_PENTEST - Packages looking like typical pentest packages, but also anything that looks like testing, exploring pre-prepared kits, research & co, with clearly low-harm possibilities. Campaign: GENERIC-standard-pypi-install-pentest Reasons (based on the campaign): - The package contains code to exfiltrate basic data from the system, like IP or username. It has a limited risk. - The package overrides the install command in setup.py to execute malicious code during installation.
Compromised versions (1)
- 99.0.0
Any computer that installed or ran a compromised version should be considered fully compromised. Rotate every secret on that machine from a clean environment.