This is an advisory for a malicious package.

We recommend immediate removal of malicious versions of this package. Safety Firewall is actively blocking installation and will help you identify any existing installations of the package.

Learn more

PyPI: langraph

SFTY-20240726-31877

--- _-= Per source details. Do not edit below this line.=-_ ## Source: kam193 (4d1857013d9ca781ba7579d60e20a1ee155ced90eef1e9d99045b8797e3e18be) Installing the package or importing the module exfiltrates basic information about the host, and the package has no other purpose. --- Category: PROBABLY_PENTEST - Packages looking like typical pentest packages, but also anything that looks like testing, exploring pre-prepared kits, research & co, with clearly low-harm possibilities. Campaign: GENERIC-standard-pypi-install-pentest Reasons (based on the campaign): - The package contains code to exfiltrate basic data from the system, like IP or username. It has a limited risk. - The package overrides the install command in setup.py to execute malicious code during installation.

Created at: Feb 14, 2026Updated at: Feb 14, 2026

Overview

Malicious code in langraph (PyPI)

Advisory

Malicious code in langraph (PyPI)

Affected Package

Affecting langraph package, versions
==0.0.0
==1.0.0

Also affects

---

How to Fix

We recommend updating langraph to the latest non-vulnerable version.

Mitigation and Workarounds

---

Vulnerable Functions

Functions linked to known vulnerabilities.

Vulnerable function data is available for Enterprise customers

Book a call with us to see Safety in action.

Safety

Verified by Safety

Our Cybersecurity Intelligence Team reviewed this vulnerability. We combine public data with our own research to find issues not yet reported to public sources.

Learn more