Compromised open source package pushed malicious Elementary CLI release to developers
The open source Elementary CLI tool has more than one million monthly downloads
Threat actors gained access to sensitive developer data and cryptocurrency wallets after a popular open source software tool was compromised.
Developers behind the Elementary Python command line interface (CLI) tool revealed a recent release (version 0.23.3) included malicious code.
Attackers exploited a script injection vulnerability in the open source project’s GitHub Actions workflow to push the malicious update to users.
This malicious version was subsequently published on PyPI, as well as a Docker image pushed to the project’s registry.
In a blog post detailing the incident, developers said the malicious version was removed roughly 12 hours later. Elementary Cloud, the Elementary dbt package, and other CLI versions weren’t affected.
A replacement version (0.23.4) has also been released, however developers warned those who downloaded the malicious version are still at high risk.
What happened with the Elementary CLI attack?
Analysis of the incident by researchers at StepSecurity found attackers exploited a script injection vulnerability in the project’s GitHub Actions workflow.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Thereafter, they used the workflow’s GITHUB_TOKEN to “forge a signed release commit” and push the malicious version through a legitimate release pipeline.
According to StepSecurity, a .pth file was baked into the release, which upon startup allowed the threat actor(s) to harvest an array of sensitive data, including:
- SSH keys
- Cloud credentials, including AWS, GCP, and Azure
- CI secrets
- Container orchestration data
- System data (passwords, logs, shell history)
- Crypto wallet files (including Bitcoin, Litecoin, Monero, and Ripple)
What developers need to know
Project maintainers warned that users who installed the malicious version should “assume that any credentials accessible to the environment where it ran may have been exposed”.
Developers outlined a series of steps to take for those affected, including:
- Check your installed version (pip show elementary-data | grep Version)
- If the version is 0.23.3, uninstall it and replace it with the safe version
- Delete your cache files to avoid any artifacts
- Check for the malware’s marker file on any machine where the CLI may have run: If this file is present, the payload executed on that machine.
Developers are also advised to rotate credentials that were accessible from the environment where 0.23.3 ran. This includes dbt profiles, cloud provider keys, API tokens, SSH keys, and contents of .env files.
“CI/CD runners are especially exposed because they typically have broad sets of secrets mounted at runtime,” the blog post noted.
In the wake of the incident, project maintainers noted they have “hardened” open source release flows and permissions.
The vulnerable GitHub Action workflow has also been removed, while an audit of other GitHub Actions workflows across the organisation has been conducted to identify the same type of script injection flaw.
FOLLOW US ON SOCIAL MEDIA
Follow ITPro on Google News and add us as a preferred source to keep tabs on all our latest news, analysis, views, and reviews.
You can also follow ITPro on LinkedIn, X, Facebook, and BlueSky.

Ross Kelly is ITPro's News & Analysis Editor, responsible for leading the brand's news output and in-depth reporting on the latest stories from across the business technology landscape. Ross was previously a Staff Writer, during which time he developed a keen interest in cyber security, business leadership, and emerging technologies.
He graduated from Edinburgh Napier University in 2016 with a BA (Hons) in Journalism, and joined ITPro in 2022 after four years working in technology conference research.
For news pitches, you can contact Ross at ross.kelly@futurenet.com, or on Twitter and LinkedIn.
-
Everything you need to know about the GitHub Copilot pricing changesNews GitHub Copilot pricing changes mean users will be charged based on consumption, rather than a set number of credits
-
Integris makes first international move with Australian MSP acquisitionNews The provider’s first international acquisition will extend its reach across APAC.
-
The open source ecosystem is booming thanks to AI, but hackers are taking advantageNews Analysis by Sonatype found that AI is giving attackers new opportunities to target victims
-
A torrent of AI slop submissions forced an open source project to scrap its bug bounty program – maintainer claims they’re removing the “incentive for people to submit crap”News Curl isn’t the only open source project inundated with AI slop submissions
-
Anthropic says MCP will stay 'open, neutral, and community-driven' after donating project to Linux FoundationNews The AAIF aims to standardize agentic AI development and create an open ecosystem for developers
-
Open source AI models are cheaper than closed source competitors and perform on par, so why aren’t enterprises flocking to them?Analysis Open source AI models often perform on-par with closed source options and could save enterprises billions in cost savings, new research suggests, yet uptake remains limited.
-
AI-generated code is in vogue: Developers are now packing codebases with automated code – but they’re overlooking security and leaving enterprises open to huge risksNews While AI-generated code is helping to streamline operations for developer teams, many are overlooking crucial security considerations.
-
Redis unveils new tools for developers working on AI applicationsNews Redis has announced new tools aimed at making it easier for AI developers to build applications and optimize large language model (LLM) outputs.
-
‘Awesome for the community’: DeepSeek open sourced its code repositories, and experts think it could give competitors a scareNews Challenger AI startup DeepSeek has open-sourced some of its code repositories in a move that experts told ITPro puts the firm ahead of the competition on model transparency.
-
Flaws in a popular dev library could let hackers run malicious code in your MongoDB databaseNews A popular third party library of MongoDB could allow attackers to execute malicious code on company servers.