Conversation
Signed-off-by: Omkar Phansopkar <omkarphansopkar@gmail.com>
c80e579 to
c925ae0
Compare
Signed-off-by: Omkar Phansopkar <omkarphansopkar@gmail.com>
|
Hi, thanks for your report. I am looking at the "ok-script" project and am having trouble understanding how this is malicious. There are definitely aspects of the code that are unusual, and potentially problematic, but I can't see anything that is directly malicious (I am inspecting both versions prior to 0.0.514 and afterwards). The Are you able to provide more detail about why 'ok-script' is considered malicious? Thanks! |
|
@calebbrown Good point. We too had similar doubts initially but given strong signals decided to report it. Specifically
Based on these strong indicators we decided to report, especially since any of the external URLs used for update process can, in future, be used to perform a download-exec on systems where this package is installed. Do you mind keeping this open for a while even if these indicators do not confirm malicious behaviour? Let me do a deep dive on the code and what is changing across versions before concluding? |
🔍 Key Findings
Suspicious Binary Files
ok/__init__.cp312-win_amd64.pyd(2.7MB)application/vnd.microsoft.portable-executablewith extension.exe__init__.pyfileImported System Modules
The package imports numerous sensitive modules:
psutil(process manipulation)win32api,win32security(Windows system API access)subprocess(command execution)Dangerous Auto-Update Mechanism
GitUpdater.py) that:CC @abhisek