-
-
Notifications
You must be signed in to change notification settings - Fork 7.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. Weβll occasionally send you account related emails.
Already on GitHub? Sign in to your account
docs: readme #18018
docs: readme #18018
Conversation
|
π Hello @openimbot, thank you for submitting an
For more guidance, please refer to our Contributing Guide, and feel free to leave a comment below if youβre unsure about anything. Thank you for helping improve Ultralytics' documentation! An Ultralytics engineer will review your PR soon. π |
b83047f to
21162bd
Compare
|
bro what π |
|
What did the bot do? |
Security Advisory: Unauthorized Code in PyPI ReleasesSummaryUltralytics has identified a supply chain attack affecting affecting multiple versions of the ultralytics package. The compromised versions contained unauthorized code that downloaded and executed cryptocurrency mining software when instantiating YOLO models. This code was injected into the PyPI release artifacts and was not present in the public GitHub repository. Technical DetailsThe unauthorized code performed the following actions:
Affected binaries were hosted at:
The malicious process manifested as ImpactAll users who installed and ran affected versions from PyPI were potentially affected. The malicious code was activated upon YOLO model initialization. Source installations from GitHub were not affected. Affected Versions
Mitigation
ResolutionWe have:
Additional InformationThis incident appears to be a sophisticated supply chain attack that bypassed PyPI provenance signing. We are conducting a thorough investigation and implementing enhanced security measures to prevent similar incidents. |
π οΈ PR Summary
Made with β€οΈ by Ultralytics Actions
π Summary
This PR doesn't introduce any new code changes.
π Key Changes
π― Purpose & Impact