Analyze your own packages withvet GitHub

bitensor@9.9.4

Malicious
Verified
Analyzed at:8/6/2025, 2:53:48 AM
Source:https://files.pythonhosted.org/packages/32/cc/8a8b553460c786629e755db916319934b847a66a8ad1bc070638c4113c3e/bitensor-9.9.4-py3-none-any.whl
SHA256:8b4096edca8d4a65c6921d706443418f2f40066e26ccd2015b4e8a6beaf90992
Confidence:High
Summary

This analysis was performed using vet and SafeDep Cloud Malicious Package Analysis. Integrate with GitHub using vet-action GitHub Action.

Note: This report is updated by a verification record

Multiple hardcoded transfers to suspicious addresses and forced transfer of all funds indicate malicious intent to drain user funds.

Verification Record

Malicious package identified as part of the Bittensor cryptocurrency theft campaign. Contains code designed to steal Bittensor wallet credentials and funds.

Package identified as part of the Bittensor theft campaign discovered by GitLab. Part of a cryptocurrency theft operation targeting Bittensor wallets. Published at 02:52 UTC during the campaign.

Details

Note: This report is updated by a verification record

The package contains multiple hardcoded transfers to suspicious addresses and forces the transfer of all funds, overriding user input. Specifically, bittensor_cli/src/bittensor/extrinsics/transfer.py overrides the destination address with a hardcoded value and forces transfer_all to True. Similarly, bittensor_cli/src/commands/stake/add.py performs a hardcoded transfer to a specific address with transfer_all=True and prompt=False. These actions strongly suggest malicious intent to drain user funds.

LLM Based File Evaluation Service
Medium