BotBeat
...
← Back

> ▌

Mistral AIMistral AI
UPDATEMistral AI2026-05-12

Mistral AI Python Package Compromised: Backdoor Detected in Version 2.4.6

Key Takeaways

  • ▸mistralai version 2.4.6 contains a hidden backdoor that automatically executes on import, targeting Linux systems only
  • ▸The backdoor downloads and runs arbitrary code from a remote IP (83.142.209.194), disabling TLS verification to bypass network security
  • ▸This is a classic supply chain attack requiring immediate response: package yanking, credential audit, and widespread user remediation
Source:
Hacker Newshttps://github.com/mistralai/client-python/issues/523↗

Summary

A critical supply chain compromise was discovered in mistralai version 2.4.6, containing a backdoor that automatically downloads and executes a malicious payload from a hardcoded IP address (83.142.209.194) when the package is imported on Linux systems. The backdoor, embedded in src/mistralai/client/init.py (lines 21-48), downloads a Python executable from https://83.142.209.194/transformers.pyz via curl with TLS verification disabled, then executes it silently in the background using a spawned subprocess. The attack is triggered automatically on import—no user action required—and uses a MISTRAL_INIT environment variable as a single-execution guard while swallowing all errors to avoid detection.

The vulnerability affects any Linux user who installed or upgraded mistralai to version 2.4.6 after May 12, 2026 at 00:05Z. Mistral AI has been urged to immediately yank the compromised version from PyPI and conduct a complete audit of their publishing credentials and CI/CD pipeline to identify how the malicious code was injected. Security researchers recommend that affected users check for the presence of /tmp/transformers.pyz and investigate system logs for suspicious activity, as the payload execution occurs silently in a new session with redirected output.

  • Any Linux system that installed or upgraded mistralai since May 12, 2026 00:05Z should verify their /tmp directory and logs for compromise indicators
MLOps & InfrastructureCybersecurityPrivacy & DataOpen Source

More from Mistral AI

Mistral AIMistral AI
INDUSTRY REPORT

Shai-Hulud Campaign Compromises 160+ npm and PyPI Packages with Valid Cryptographic Signatures

2026-05-12
Mistral AIMistral AI
INDUSTRY REPORT

Massive Coordinated Supply Chain Attack Compromises 170+ npm and 2 PyPI Packages, Including Mistral AI SDKs

2026-05-12
Mistral AIMistral AI
UPDATE

Mistral AI's NPM Package Compromised in Shai Hulud Supply Chain Attack

2026-05-11

Comments

Suggested

AnthropicAnthropic
OPEN SOURCE

Anthropic Releases Prempti: Open-Source Guardrails for AI Coding Agents

2026-05-12
vlm-runvlm-run
OPEN SOURCE

mm-ctx: Open-Source Multimodal CLI Toolkit Brings Vision Capabilities to AI Agents

2026-05-12
AnthropicAnthropic
PRODUCT LAUNCH

Anthropic Unleashes Computer Use: Claude 3.5 Sonnet Now Controls Your Desktop

2026-05-12
← Back to news
© 2026 BotBeat
AboutPrivacy PolicyTerms of ServiceContact Us