<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Guardrails-Ai (== 0.10.1) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/guardrails-ai--0.10.1/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 19 May 2026 15:41:27 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/guardrails-ai--0.10.1/feed.xml" rel="self" type="application/rss+xml"/><item><title>Malicious guardrails-ai 0.10.1 Package Published to PyPI</title><link>https://feed.craftedsignal.io/briefs/2026-05-guardrails-ai-supply-chain/</link><pubDate>Tue, 19 May 2026 15:41:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-guardrails-ai-supply-chain/</guid><description>A malicious version of the guardrails-ai package (0.10.1) was published to PyPI on May 11, 2026, advising users who installed this version to downgrade and treat the host as potentially compromised, rotating credentials and auditing GitHub accounts, with Snowglobe and Guardrails Hub API keys being invalidated on May 13, 2026.</description><content:encoded><![CDATA[<p>On May 11, 2026, a malicious version (0.10.1) of the <code>guardrails-ai</code> package was published to the Python Package Index (PyPI). The compromised package was identified by security researchers within approximately two hours, leading to its subsequent quarantine by PyPI. Any user who installed <code>guardrails-ai==0.10.1</code> from PyPI on May 11, 2026, is potentially affected. While Guardrails AI has not observed any data exfiltration through their systems, users are advised to take immediate remediation steps, including downgrading to version 0.10.0 and treating affected hosts as potentially compromised. This supply chain compromise could lead to credential theft and unauthorized access to sensitive resources. The incident highlights the risks associated with relying on third-party packages and the importance of verifying package integrity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker compromises the PyPI account or infrastructure used to publish the <code>guardrails-ai</code> package.</li>
<li>The attacker injects malicious code into the <code>guardrails-ai</code> version 0.10.1 package.</li>
<li>The attacker publishes the malicious <code>guardrails-ai</code> 0.10.1 package to PyPI.</li>
<li>Developers unknowingly install the compromised <code>guardrails-ai==0.10.1</code> package using <code>pip</code>.</li>
<li>Upon execution, the malicious code within the installed package attempts to exfiltrate sensitive data, such as credentials (GitHub PATs, cloud provider keys, package registry tokens, API keys) from the compromised host.</li>
<li>The exfiltrated credentials could then be used to gain unauthorized access to GitHub accounts and other cloud resources.</li>
<li>The attacker may create unauthorized workflows or repositories using the stolen credentials.</li>
<li>The attacker leverages the compromised GitHub account or cloud resources to further propagate malicious activity.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The malicious <code>guardrails-ai</code> 0.10.1 package could lead to the compromise of developer machines and the theft of sensitive credentials, including GitHub Personal Access Tokens (PATs), cloud provider keys, and API keys. If successful, attackers could gain unauthorized access to GitHub accounts, cloud resources, and other sensitive systems. The immediate impact includes potential data breaches, supply chain attacks, and service disruptions. Guardrails AI has invalidated all Snowglobe and Guardrails Hub API keys as a precaution, requiring users to rotate them to avoid service interruptions.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Downgrade immediately to <code>guardrails-ai==0.10.0</code> as advised in the overview to mitigate the risk of running the malicious code.</li>
<li>Deploy the &ldquo;Detect guardrails-ai Package Installation&rdquo; Sigma rule to identify potentially compromised systems that installed the malicious package.</li>
<li>Rotate any credentials accessible from machines that installed version 0.10.1, including GitHub PATs, cloud provider keys, and package registry tokens, as described in the overview.</li>
<li>Audit your GitHub account for unauthorized workflows or repositories as recommended in the advisory overview.</li>
<li>Rotate Snowglobe and Guardrails Hub API keys before May 13, 2026, at 2:00 PM Pacific to avoid service interruptions, as mentioned in the advisory overview.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>supply-chain</category><category>pypi</category><category>malicious-package</category></item></channel></rss>