pycolorlib3

MAL-2026-2433

PyPImalware4/2/2026
Description

Malicious code in pycolorlib3 (PyPI)

Indicators of Compromise
SHA256 Hashes (8)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 (2)
jolly-violet-def9.staraledreamer.workers.devholy-sun-41ff.staraledreamer.workers.dev
Details
EcosystemPyPI
Attack Typemalware
Published4/2/2026
Agentic AI · Pentesting

Ready for Agentic Automated Testing?

Deploy autonomous AI agents that reason, exploit, and validate complex vulnerability chains — not another scanner, an agentic system that thinks like a senior pentester.

Zero false positives
PoC for every finding
30+ tools orchestrated
Setup in 5 minutesSOC 2 & ISO 27001