Skip to content
This repository has been archived by the owner on Mar 24, 2024. It is now read-only.

Commit

Permalink
Update README.md
Browse files Browse the repository at this point in the history
  • Loading branch information
h4sh5 authored Sep 3, 2023
1 parent ca4b52b commit d5faea6
Showing 1 changed file with 0 additions and 18 deletions.
18 changes: 0 additions & 18 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,21 +10,3 @@ Note that the above techniques work well for NPM as well! A NPM equivalent of th

Currently stores the JSON report in github action artifacts, `*.txt` files with a bunch of potentially malicious package names, and raises [issues](https://github.com/h4sh5/pypi-auto-scanner/issues) when suspicious packages are found.


## Why?

If you search "pip malicious packages feed", you will not find anything other than a bunch of vendor blogs that say "researcher from our company found another 10,000 malicious pip packages..", some package names and screenshots.

If you want to identify these malicious packages across your environment and roll incident response, there is currently **no open data** to do so **accessible via an API**.

This repo is hopefully, eventually going to be low-noise enough to be used as a high-fidelity feed for malicious pip packages; you can even use the txt output files we provide and grab the github issues via Github API yourself, and match it against things in your environment and bypass the false positives from a list of known good packages you use.

Since this repository is open source, all you need to access this data is a single HTTP request (for the txt files) and use a Github API key with permission to access public repos (for searching through issues and scan artifacts).

If you are a researcher / malware analyst / threat hunter, this dataset is also for you. In the github actions artifacts, you will find potential IoCs, PCAP files and so on; in the main repo, the yara scan results give you filenames and formats you can reverse engineer. You can use this dataset for security research academic projects.

**The supply chain security space is too important to be a closed ecosystem of vendors disclosing their findings in blogs.**

Let's rip it open.


0 comments on commit d5faea6

Please sign in to comment.