Skip to content

PROBABLY_PENTEST (1) package from Python Package Index.

  1. Packages looking like typical pentest packages, but also anything that looks like testing, exploring pre-prepared kits, research & co, with clearly low-harm possibilities.

cryptograohy

Affected versions: unspecified (1)

  1. Version numbers are currently not tracked. Assume all versions are affected.

Campaign data

Campaign information may not always be 100% accurate for every related package.

Campaign description

The pyprettifier library has a feature to send out the user home path throuh the logger. It's attached to the init of EmojiConverter class. Other related packages utilize a typosquatting to imitate real packages, and attempts to call the EmojiConverter from pyprettifier, triggering notifying the author about the user's home path.

See more details on the campaign page.

action-hidden-in-lib-usage

Campaign targets action-hidden-in-lib-usage.

basic_exfiltration

The package contains code to exfiltrate basic data from the system, like IP or username. It has a limited risk.

through_dependency

The malicious code is intentionally included in a dependency of the package

typosquatting

Campaign targets typosquatting.

Look up in other services

  1. May not be available. See more in pypi-json-data repository.
  2. Open Source Insights project, provided by Google.
  3. Service from Socket.dev, a cybersecurity company.
  4. Spectra Assure Community, a service from ReversingLabs, a cybersecurity company.