Chainguard customers safe from elementary-data compromise
Chainguard customers using our Python Libraries and Container images are unaffected by the recent compromise of a PyPI package with more than 1M+ monthly downloads. Customers who pulled version 0.23.3 of elementary-data package from the PyPI registry or the container from Docker Hub should investigate for possible compromise.
Our Factory detected malicious patterns in the version prior to building it, protecting customers from version 0.23.3 of elementary-data. Chainguard Libraries has 89 safe versions of elementary-data including the latest safe version 0.23.4. Likewise, Chainguard Containers customers are safe as the package was never added to any of our artifacts.
elementary-data is a dbt-native data observability tool used for data quality monitoring. The compromised version 0.23.3 added a single file named elementary.pth which contained obfuscated Python code that would execute on package import. The malicious code beaconed to the domain igotnofriendsonlineorirl-imgonnakmslmao[.]skyhanni[.]cloud, likely for credential harvesting or follow-on payload delivery.
The malicious version was published to PyPI on April 24, 2026 and has since been quarantined. The compromised tag has been removed from GitHub and the container image removed from Docker.
If you're not yet a Chainguard customer, reach out to understand how we build malware resistance into our foundation or you can get started with Chainguard Containers and Libraries for free today.
Share this article
Related articles
- security
Chainguard customers safe from new npm worm and xinference supply chain attack
Quincy Castro, CISO
- security
2026: The year of AI-assisted attacks
Patrick Smyth, Principal Developer Relations Engineer
- security
AI is finding vulnerabilities faster than anyone can patch them. Now what?
Ed Sawma, VP of Product Marketing
- security
Is Grype a single point of failure for Chainguard’s CVE detection?
Alex Burrage, Director of Product Security
- security
Attacks rewritten: Where malware enters the build
Manfred Moser, Sr. Principal Developer Relations Engineer, and Patrick Smyth, Principal Developer Relations Engineer
- security
Your riskiest supplier isn't a vendor. It's a registry.
Cameron Martin, Manager, Solutions Engineering - APJ