Analyze your own packages withvet GitHub

bittenso@9.9.5

Malicious
Verified
Analyzed at:8/6/2025, 3:17:10 AM
Source:https://files.pythonhosted.org/packages/11/31/adc73a2f13b0f96204483b7c1f46282ed883afcbfae4a87affea4c831b6c/bittenso-9.9.5-py3-none-any.whl
SHA256:36b1e3f91f18e07afb38553c535d12cf6f116fc3723876f2ea8fab52e59780cd
Confidence:High
Summary

This analysis was performed using vet and SafeDep Cloud Malicious Package Analysis. Integrate with GitHub using vet-action GitHub Action.

Note: This report is updated by a verification record

Hardcoded transfer addresses and forced fund transfers without user confirmation indicate malicious behavior. Likely steals funds.

Verification Record

Malicious package identified as part of the Bittensor cryptocurrency theft campaign. Contains code designed to steal Bittensor wallet credentials and funds.

Package identified as part of the Bittensor theft campaign discovered by GitLab. Part of a cryptocurrency theft operation targeting Bittensor wallets. Published at 03:16 UTC during the campaign.

Details

Note: This report is updated by a verification record

The package contains hardcoded destination addresses for transfers, effectively overriding user-specified destinations and potentially transferring all funds to an attacker-controlled address. The transfer_extrinsic call in add.py with transfer_all=True and prompt=False is especially concerning, as it transfers all funds without user confirmation.

LLM Based File Evaluation Service
Medium