{"id":"MAL-2026-3235","summary":"Malicious code in apexomni-client (PyPI)","details":"\n---\n_-= Per source details. Do not edit below this line.=-_\n\n## Source: kam193 (497dca02206d8084e5a7e135245489a5ef9dd03f318b138574bc43386ddac0ef)\nDuring installation, multiple sensitive environment variables are being exfiltrated.\n\n\n---\n\nCategory: MALICIOUS - The campaign has clearly malicious intent, like infostealers.\n\n\nCampaign: 2026-05-apexomni-client\n\n\nReasons (based on the campaign):\n\n\n - exfiltration-env-variables\n\n\n - dependency-confusion\n\n\n - exfiltration-credentials\n\n\n - The package overrides the install command in setup.py to execute malicious code during installation.\n","modified":"2026-05-02T11:31:49.124867Z","published":"2026-05-02T10:31:16Z","database_specific":{"malicious-packages-origins":[{"versions":["99.99.99"],"sha256":"497dca02206d8084e5a7e135245489a5ef9dd03f318b138574bc43386ddac0ef","import_time":"2026-05-02T11:20:00.625149304Z","modified_time":"2026-05-02T10:31:16.109025Z","source":"kam193","id":"pypi/2026-05-apexomni-client/apexomni-client"}]},"references":[{"type":"WEB","url":"https://bad-packages.kam193.eu/pypi/package/apexomni-client"}],"affected":[{"package":{"name":"apexomni-client","ecosystem":"PyPI","purl":"pkg:pypi/apexomni-client"},"versions":["99.99.99"],"database_specific":{"source":"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/apexomni-client/MAL-2026-3235.json"}}],"schema_version":"1.7.5","credits":[{"name":"Kamil Mańkowski (kam193)","contact":["https://github.com/kam193","https://bad-packages.kam193.eu/"],"type":"REPORTER"}]}