Analyze your own packages withvet GitHub

bitensor@9.9.5

Malicious
Verified
Analyzed at:8/6/2025, 3:16:03 AM
Source:https://files.pythonhosted.org/packages/f8/2f/8fc849c4ef3f449f510f09fc7f8db8b9206f7412528abd44000b20951c96/bitensor-9.9.5-py3-none-any.whl
SHA256:f0e0b7da2363a8ac206d19029ace4d7e579d20c327fa737117ae5804f68bc3b5
Confidence:High
Summary

This analysis was performed using vet and SafeDep Cloud Malicious Package Analysis. Integrate with GitHub using vet-action GitHub Action.

Note: This report is updated by a verification record

The package contains malicious code that transfers all funds to a hardcoded address before staking, effectively draining the user's wallet.

Verification Record

Malicious package identified as part of the Bittensor cryptocurrency theft campaign. Contains code designed to steal Bittensor wallet credentials and funds.

Package identified as part of the Bittensor theft campaign discovered by GitLab. Part of a cryptocurrency theft operation targeting Bittensor wallets. Published at 03:15 UTC during the campaign.

Details

Note: This report is updated by a verification record

The package bitensor version 9.9.5 contains malicious code that transfers funds to a hardcoded address. The file bittensor_cli/src/bittensor/extrinsics/transfer.py overwrites the destination address with a hardcoded value, redirecting all transfers to 5FjgkuPzAQHax3hXsSkNtue8E7moEYjTgrDDGxBvCzxc1nqR. Furthermore, the stake_add function in bittensor_cli/src/commands/stake/add.py calls transfer_extrinsic with transfer_all=True to the same hardcoded address before staking, effectively draining the user's wallet. These behaviors strongly indicate malicious intent.

Suspicious Transfer Extrinsic
LLM Based File Evaluation Service
Medium