.putty P1DocsTechnology
Related
Google Chrome's On-Device AI Model Can Consume 4GB of Storage: What You Need to KnowMint Mobile's Unbeatable Pixel 10 Offer: $300 Phone and Affordable Unlimited DataCritical cPanel & WHM Security Patches Released – Urgent Update AdvisedBreaking: reMarkable Cuts Workforce by 40%; Valve's Steam Controller Nears Release; Microsoft Overhauls Windows UpdateA Developer's Guide to Launchpad's Series Page Redesign for Ubuntu 26.04 LTSExploring After working on the Vision Pro, this AR veteran is going back to p...6 Enduring Lessons from Fred Brooks' 'The Mythical Man-Month' That Still Shape Software DevelopmentOpen-Source Board Turns Google Home Mini into Private Home Assistant Hub for $85

Deep Dive: Open source package with 1 million monthly downloads stole user cr...

Last updated: 2026-04-30 18:41:05 · Technology
Deep Dive: Open
Photo

Elementary Cloud, the Elementary dbt package, and all other CLI versions weren't affected. Open source software with more than 1 million monthly downloads was compromised after a threat actor exploited a vulnerability in the developers’ account workflow that gave access to its signing keys and other sensitive information. On Friday, unknown attackers exploited the vulnerability to push a new version of element-data, a command-line interface that helps users monitor performance and anomalies in machine-learning systems. When run, the malicious package scoured systems for sensitive data, including user profiles, warehouse credentials, cloud provider keys, API tokens, and SSH keys, developers said. The malicious version was tagged as 0.23.3 and was published to the developers’ Python Package Index and Docker image accounts. It was removed about 12 hours later, on Saturday.

Deep Dive: Open
Photo

“Users who installed 0.23.3, or who pulled and ran the affected Docker image, should assume that any credentials accessible to the environment where it ran may have been exposed,” the developers wrote.Read full article Comments