VYPR

pypi · Malicious package advisory

Malware

tensor-compute

MAL-2026-4223

Malicious code in tensor-compute (PyPI)

Details


---
_-= Per source details. Do not edit below this line.=-_

## Source: kam193 (65d708cc1f7f21e95b09b365734e06251c59f931bf07ff7fbb004713064bcae7)
The package performs a targeted attack on specific environments. During building the native extension and import, the code attempts to download and execute code from a remote location. Access to the remote code is filtered. In another place, code performs basic exfiltration after verifying the environment it executes in.


---

Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.


Campaign: 2026-05-tensor-compute


Reasons (based on the campaign):


 - targetted-attack


 - Downloads and executes a remote malicious script.


 - obfuscation


 - The package contains code to exfiltrate basic data from the system, like IP or username. It has a limited risk.

Compromised versions (1)

  • 1.0.0

Any computer that installed or ran a compromised version should be considered fully compromised. Rotate every secret on that machine from a clean environment.