CVSS Score: 10.0 Published: 2026-02-13 Full Report: https://cvereports.com/reports/GHSA-P5VF-5754-X7P3
In the fast-moving world of crypto-prediction markets, developers often prioritize speed over security. GHSA-P5VF-5754-X7P3 (also known as RUSTSEC-2026-0011) exploits this urgency through a classic typosquatting attack. By publishing a crate named polymarket-client-sdks—adding a single, pluralizing 's' to the legitimate SDK name—an attacker managed to distribute a malicious payload designed to harvest credentials from developer machines. This wasn't a subtle buffer overflow; it was a brazen smash-and-grab operation targeting AWS keys, SSH credentials, and wallet data, executing automatically the moment the package was compiled.
A malicious Rust crate polymarket-client-sdks impersonated the official polymarket-client-sdk. It contained malware that executed during the build process to scan the host filesystem for sensitive credentials (AWS, SSH, Wallets) and exfiltrate them. If you installed this package between Feb 9 and Feb 13, 2026, your machine is compromised.
- Attack Vector: Supply Chain / Typosquatting
- Impact: Credential Theft / Data Exfiltration
- Severity: Critical (Malware)
- Affected Component: build.rs (Build Script)
- CWE ID: CWE-1357
- Exploit Status: Active / Weaponized
- Rust Development Environments
- CI/CD Pipelines running
cargo buildon unverified manifests - Developer Workstations (macOS, Linux, Windows)
- polymarket-client-sdks: = 0.1.0 (Fixed in:
Deleted)
- Dependency Pinning: Always inspect the
Cargo.tomlof new dependencies. - Registry Verification: Check download counts and owner history on crates.io.
- Sandboxed Builds: Run compilations in isolated containers (Docker) with no network access or restricted filesystem access.
- Use
cargo-audit: Regularly scan project dependencies for reported vulnerabilities.
Remediation Steps:
- Remove the malicious crate
polymarket-client-sdksfromCargo.toml. - Delete the
Cargo.lockfile and thetarget/directory to clear build artifacts. - Rotate ALL credentials located on the infected machine (AWS, SSH, GPG, API Keys).
- Check
~/.bashrc,~/.zshrc, and systemd services for persistence mechanisms. - Switch to the legitimate crate:
polymarket-client-sdk.
- GitHub Advisory GHSA-P5VF-5754-X7P3
- RustSec Advisory RUSTSEC-2026-0011
- Crates.io Blog on Malicious Crate Policy
Generated by CVEReports - Automated Vulnerability Intelligence