pypi · Malicious package advisory
Malwaretensor-compute
MAL-2026-4223
Malicious code in tensor-compute (PyPI)
Details
--- _-= Per source details. Do not edit below this line.=-_ ## Source: kam193 (65d708cc1f7f21e95b09b365734e06251c59f931bf07ff7fbb004713064bcae7) The package performs a targeted attack on specific environments. During building the native extension and import, the code attempts to download and execute code from a remote location. Access to the remote code is filtered. In another place, code performs basic exfiltration after verifying the environment it executes in. --- Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers. Campaign: 2026-05-tensor-compute Reasons (based on the campaign): - targetted-attack - Downloads and executes a remote malicious script. - obfuscation - The package contains code to exfiltrate basic data from the system, like IP or username. It has a limited risk.
Compromised versions (1)
- 1.0.0
Any computer that installed or ran a compromised version should be considered fully compromised. Rotate every secret on that machine from a clean environment.