pypi · Malicious package advisory
Malwarestripe-utils
MAL-2026-4180
Malicious code in stripe-utils (PyPI)
Details
--- _-= Per source details. Do not edit below this line.=-_ ## Source: kam193 (2134a01cead67cd3508d0ca8a14acbfd272181c65faed08b8491a1b2e7885ddc) Installing the package or importing the module exfiltrates basic information about the host, and the package has no other purpose. --- Category: PROBABLY_PENTEST - Packages looking like typical pentest packages, but also anything that looks like testing, exploring pre-prepared kits, research & co, with clearly low-harm possibilities. Campaign: GENERIC-standard-pypi-install-pentest Reasons (based on the campaign): - The package contains code to exfiltrate basic data from the system, like IP or username. It has a limited risk. - The package overrides the install command in setup.py to execute malicious code during installation. ## Source: ossf-package-analysis (b4670310584320e88c63bc8b3f248b3ee73a562d8829da6b4651241cf8162b6a) The OpenSSF Package Analysis project identified 'stripe-utils' @ 99.4.0 (pypi) as malicious. It is considered malicious because: - The package communicates with a domain associated with malicious activity.
Compromised versions (8)
- 99.4.0
- 2.0.0
- 3.0.0
- 4.0.0
- 99.0.0
- 99.1.0
- 99.2.0
- 99.5.0
Any computer that installed or ran a compromised version should be considered fully compromised. Rotate every secret on that machine from a clean environment.