Skip to content

Commit d281614

Browse files
author
github-actions
committed
Assign IDs
1 parent 449581d commit d281614

File tree

2 files changed

+7
-7
lines changed

2 files changed

+7
-7
lines changed

osv/malicious/.id-allocator

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
3786c2d1841ca8f3b6a92eea5cbc47e133c7dd09a52696ad7e67b020f3362dd6
1+
2be4152af6527e7d33ba6a35ef642cfb2451d6af63fd86301ee8a91a3af17c7a

osv/malicious/pypi/helloharry123p/MAL-0000-kam193-6e199ebf30ba4e39.json renamed to osv/malicious/pypi/helloharry123p/MAL-2025-192379.json

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,9 @@
22
"modified": "2025-12-08T23:54:54Z",
33
"published": "2025-12-08T23:54:54Z",
44
"schema_version": "1.7.4",
5-
"id": "",
6-
"summary": "Pentesting or research code in helloharry123p (PyPI)",
7-
"details": "Installing the package or importing the module exfiltrates basic information about the host, and the package has no other purpose.\n\n\n---\n\nCategory: PROBABLY_PENTEST - Packages looking like typical pentest packages, but also anything that looks like testing, exploring pre-prepared kits, research \u0026 co, with clearly low-harm possibilities.\n\n\nCampaign: GENERIC-standard-pypi-install-pentest\n\n\nReasons (based on the campaign):\n\n\n - The package contains code to exfiltrate basic data from the system, like IP or username. It has a limited risk.\n\n\n - The package overrides the install command in setup.py to execute malicious code during installation.\n\n",
5+
"id": "MAL-2025-192379",
6+
"summary": "Malicious code in helloharry123p (PyPI)",
7+
"details": "\n---\n_-= Per source details. Do not edit below this line.=-_\n\n## Source: kam193 (6e199ebf30ba4e39d4e6bd9fc4d31ffa9f0a7687e21f67e2e6e8c01e3f24717a)\nInstalling the package or importing the module exfiltrates basic information about the host, and the package has no other purpose.\n\n\n---\n\nCategory: PROBABLY_PENTEST - Packages looking like typical pentest packages, but also anything that looks like testing, exploring pre-prepared kits, research \u0026 co, with clearly low-harm possibilities.\n\n\nCampaign: GENERIC-standard-pypi-install-pentest\n\n\nReasons (based on the campaign):\n\n\n - The package contains code to exfiltrate basic data from the system, like IP or username. It has a limited risk.\n\n\n - The package overrides the install command in setup.py to execute malicious code during installation.\n",
88
"affected": [
99
{
1010
"package": {
@@ -35,11 +35,11 @@
3535
"database_specific": {
3636
"malicious-packages-origins": [
3737
{
38-
"source": "kam193",
39-
"sha256": "6e199ebf30ba4e39d4e6bd9fc4d31ffa9f0a7687e21f67e2e6e8c01e3f24717a",
40-
"import_time": "2025-12-09T00:26:38.782652237Z",
4138
"id": "pypi/GENERIC-standard-pypi-install-pentest/helloharry123p",
39+
"import_time": "2025-12-09T00:26:38.782652237Z",
4240
"modified_time": "2025-12-08T23:54:54.853753Z",
41+
"sha256": "6e199ebf30ba4e39d4e6bd9fc4d31ffa9f0a7687e21f67e2e6e8c01e3f24717a",
42+
"source": "kam193",
4343
"versions": [
4444
"0.1.0"
4545
]

0 commit comments

Comments
 (0)