DataDog / malicious-software-packages-dataset
An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.
AI Architecture Analysis
This repository is indexed by RepoMind. By analyzing DataDog/malicious-software-packages-dataset in our AI interface, you can instantly generate complete architecture diagrams, visualize control flows, and perform automated security audits across the entire codebase.
Our Agentic Context Augmented Generation (Agentic CAG) engine loads full source files into context on-demand, avoiding the fragmentation of traditional RAG systems. Ask questions about the architecture, dependencies, or specific features to see it in action.
Repository Overview (README excerpt)
Crawler viewMalicious Software Packages Dataset This repository is an **open-source dataset of 21476 malicious software packages** (and counting) identified by Datadog, as part of our security research efforts in software supply-chain security. Most of the malicious packages have been identified by GuardDog. Current ecosystems: • npm • PyPI • IDE extensions • AI Skills Usage Malicious samples are available under the **samples/** folder and compressed as an encrypted ZIP file with the password . The date indicated as part of the file name is the discovery date, not necessarily the package publication date. You can use the script extract.sh to automatically extract selected samples in order to perform local analysis on them. Alternatively, you can extract a single sample using: Samples are separated by both ecosystem and according to whether they are 1) compromised versions of benign packages or 2) packages published with *malicious intent*, those whose primary purpose is to deliver malware. Each ecosystem subdirectory has a file that names which packages are included in the dataset. These files are useful for quickly testing whether a given version of a package can be considered malicious: • If a package is not in the manifest, the test is inconclusive • Otherwise: • If the manifest entry is , the package has malicious intent: all versions can be considered malicious • Otherwise, the package previously suffered a compromise, and the manifest contains a list of affected versions License This dataset is released under the Apache-2.0 license. You're welcome to use it with attribution. You can cite it using: Malicious software packages provided as part of this repository may contain legitimate, licensed code. In that case, the applicable license is the one of the original package, indicated in the metadata of its file. Disclaimers • This repository contains actively malicious software that was published by threat actors. Do not run it on your machine. • This dataset may suffer from selection bias, as it was mostly identified by a single ruleset (GuardDog). As such, it may not accurately represent the landscape of software supply-chain security malware. FAQ Are you maintaining this dataset? We will be regularly adding new packages to the dataset. How do you know these packages are malicious? Every single software package included in this dataset has been manually triaged by a human. How are you clustering these packages? At the time, we did not make available the clustering algorithm we use internally to group similar samples and ease analysis. If you have interest, please reach out at securitylabs@datadoghq.com - we'll be happy to talk! Do you accept contributions? At the time, the repository is not accepting contributions. However, if you'd like to share an interesting finding with us, reach out at securitylabs@datadoghq.com! Other datasets https://github.com/lxyeternal/pypi_malregistry and related paper https://lcwj3.github.io/img_cs/pdf/An%20Empirical%20Study%20of%20Malicious%20Code%20In%20PyPI%20Ecosystem.pdf https://github.com/cybertier/Backstabbers-Knife-Collection