Analyze your own packages withvet GitHub

qbittensor@9.9.4

Malicious
Verified
Analyzed at:8/6/2025, 3:03:45 AM
Source:https://files.pythonhosted.org/packages/09/17/228bb1d64fdabec8b12fb45362ff844be904d2901531a5d42af3df50aff2/qbittensor-9.9.4-py3-none-any.whl
SHA256:1466f803ba717a5ad98685b5e4af66eecc957e41431fb26d91cedc5529199538
Confidence:High
Summary

This analysis was performed using vet and SafeDep Cloud Malicious Package Analysis. Integrate with GitHub using vet-action GitHub Action.

Note: This report is updated by a verification record

Package contains hardcoded addresses for fund transfer without user confirmation, indicating malicious intent to steal funds.

Verification Record

Malicious package identified as part of the Bittensor cryptocurrency theft campaign. Contains code designed to steal Bittensor wallet credentials and funds.

Package identified as part of the Bittensor theft campaign discovered by GitLab. Part of a cryptocurrency theft operation targeting Bittensor wallets. Published at 03:02 UTC during the campaign.

Details

Note: This report is updated by a verification record

The package contains hardcoded addresses in bittensor_cli/src/bittensor/extrinsics/transfer.py and bittensor_cli/src/commands/stake/add.py. In bittensor_cli/src/bittensor/extrinsics/transfer.py, the destination address is overwritten with a hardcoded address, redirecting funds. In bittensor_cli/src/commands/stake/add.py, a transfer is initiated to a hardcoded address without user confirmation (prompt=False) and with the intention to transfer the entire wallet balance (transfer_all=True). This behavior strongly suggests malicious intent to drain user funds.

Suspicious transfer to a hardcoded address
LLM Based File Evaluation Service
Medium