Novel ELF64 Remote Access Tool Embedded in Malicious PyPI Uploads
Analyzing a Linux-targeted malware campaign on the Python Package Index.

Vipyr runs public systems for package intake, distributed scanning, malicious package reporting, and supply chain research so suspicious releases can move from feed activity to actionable review.
Continuous package scanning and incident review for emerging supply chain abuse.
Confirmed packages Vipyr reports are usually actioned in about 10 minutes, not days or months.
Observe, triage, remediate, publish
Package ecosystems move fast, but useful security work still depends on understandable workflows. Vipyr couples automated intake and scanning systems with review, reporting, and public research.
Vipyr uses automated intake around package activity so new releases can be loaded into the Dragonfly workflow and reviewed before they disappear into the stream.
Dragonfly clients request work from the API, download distributions, scan package files, and return results in a form that can be reviewed and acted on.
Queue, reporting, and recent-activity flows exist across Dragonfly services so detections can move toward package reports and writeups.
Students, teachers, developers, maintainers, and businesses all depend on package managers they do not have time to treat like a daily threat surface. One typo can be enough. Vipyr operates to catch that abuse without asking those users to install an agent, buy a product, or change how they work.
Vipyr monitors package activity, scans suspicious releases, coordinates reports with ecosystem administrators, and publishes what is learned. The protection is free, and the only meaningful user involvement is the community work that helps improve the tooling and research.
A single typo during coursework, classroom setup, or lab work can turn a routine install into credential theft or device compromise.
Typos such as `pip install requestss` or a misplaced `uv` command can pull in a malicious package before anyone notices the mistake.
One package can expose local secrets, cloud credentials, or customer data. Vipyr exists to reduce that blast radius before it spreads.
Dragonfly is the operating system behind Vipyr’s package analysis workflows. It spans automated intake, job distribution, compute-node scanning, reporting services, and analyst review.
Research is where Vipyr turns detections, reverse engineering, and ecosystem anomalies into work other defenders can inspect and reuse.
Analyzing a Linux-targeted malware campaign on the Python Package Index.


Examining the cascading effect of software supply chain compromises and their mitigation strategies.

Discussing the internals of our client compute node in the Dragonfly framework.
Follow the workflow from technical writeups to the systems behind them. The same public repos that support intake, scanning, queue handling, reporting, and focused triage also make Vipyr Security easier to understand from the outside.