VYPR

pypi · Malicious package advisory

Malware

stripe-internal

MAL-2026-4182

Malicious code in stripe-internal (PyPI)

Details


---
_-= Per source details. Do not edit below this line.=-_

## Source: kam193 (e7a911f1602bed2fda7cbacff6567286433df29592c24839ae9980c7fff0e6b4)
Installing the package or importing the module exfiltrates basic information about the host, and the package has no other purpose.


---

Category: PROBABLY_PENTEST - Packages looking like typical pentest packages, but also anything that looks like testing, exploring pre-prepared kits, research & co, with clearly low-harm possibilities.


Campaign: GENERIC-standard-pypi-install-pentest


Reasons (based on the campaign):


 - The package contains code to exfiltrate basic data from the system, like IP or username. It has a limited risk.


 - The package overrides the install command in setup.py to execute malicious code during installation.

## Source: ossf-package-analysis (e8e3f74f238f0dd161fe65c9330fc2b3445f5960da010c5f3f2ed7a43fa3fd31)
The OpenSSF Package Analysis project identified 'stripe-internal' @ 9.5.0 (pypi) as malicious.

It is considered malicious because:

- The package communicates with a domain associated with malicious activity.

Compromised versions (1)

  • 9.5.0

Any computer that installed or ran a compromised version should be considered fully compromised. Rotate every secret on that machine from a clean environment.