Skip to content

Update pyproject.toml#2

Open
dacoburn wants to merge 2 commits intomainfrom
doug/test
Open

Update pyproject.toml#2
dacoburn wants to merge 2 commits intomainfrom
doug/test

Conversation

@dacoburn
Copy link
Contributor

@dacoburn dacoburn commented Jul 8, 2025

No description provided.

@socket-security
Copy link

socket-security bot commented Jul 8, 2025

Review the following changes in direct dependencies. Learn more about Socket for GitHub.

Diff Package Supply Chain
Security
Vulnerability Quality Maintenance License
Addedanydesk-malcom@​1.1023100100100100
Addedsmscallbomber@​2.540100100100100

View full report

@socket-security
Copy link

socket-security bot commented Jul 8, 2025

Caution

Review the following alerts detected in dependencies.

According to your organization's Security Policy, you must resolve all "Block" alerts before proceeding. Learn more about Socket for GitHub.

Action Severity Alert (click for details)
Block Critical
[email protected] is Known malware.

Note: This code is highly suspicious and poses an extreme security risk. It should not be used under any circumstances.

From: pyproject.tomlpypi/[email protected]

ℹ Read more on: This package | This alert | What is known malware?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at [email protected].

Suggestion: It is strongly recommended that malware is removed from your codebase.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore pypi/[email protected]. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block Critical
[email protected] is Known malware.

Note: This code is highly suspicious and poses an extreme security risk. It should not be used under any circumstances.

From: pyproject.tomlpypi/[email protected]

ℹ Read more on: This package | This alert | What is known malware?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at [email protected].

Suggestion: It is strongly recommended that malware is removed from your codebase.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore pypi/[email protected]. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block Critical
[email protected] is Known malware.

Note: This code is part of an SMS/call-bombing tool that generates fake user data (usernames, email addresses, passwords, tokens) and programmatically issues HTTP requests to external service endpoints to flood a target phone number with unwanted verification messages or calls for harassment. It replaces placeholders (%phone%, %name%, %email%, %password%, %token%) in the request payloads, filters out Secure/HttpOnly/SameSite cookies, and supports proxy routing to anonymize traffic. All target URLs are defined in the service_info['url'] configurations (e.g., https://api[.]exampleprovider[.]com/send). This behavior is inherently malicious and intended for abuse of legitimate messaging services.

From: pyproject.tomlpypi/[email protected]

ℹ Read more on: This package | This alert | What is known malware?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at [email protected].

Suggestion: It is strongly recommended that malware is removed from your codebase.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore pypi/[email protected]. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

View full report

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant

Comments