Analyze your own packages withvet GitHub

requests@2.25.1

Safe
Analyzed at:6/4/2025, 4:06:16 AM
Source:https://files.pythonhosted.org/packages/29/c1/24814557f1d22c56d50280771a17307e6bf87b70727d975fd6b2ce6b014a/requests-2.25.1-py2.py3-none-any.whl
SHA256:c210084e36a42ae6b9219e00e48287def368a26d03a048ddad7bfee44f75871e
Confidence:Medium
Summary

This analysis was performed using vet and SafeDep Cloud Malicious Package Analysis. Integrate with GitHub using vet-action GitHub Action.

The YARA rule pip_installer_requests match in METADATA is not malicious. No other evidence suggests malicious behavior.

Details

The YARA rule pip_installer_requests matched the METADATA file, which is expected for a Python package. The rule likely detects the presence of 'pip install requests' within the metadata, which is a common instruction for installing the package. The presence of $ref is not inherently malicious in this context. There is no other evidence to suggest malicious behavior.