
Cloud Vulnerability DB
A community-led vulnerabilities database
This is part of an ongoing campaign to attempt to typosquat crates in an
attempt to exfiltrate Polymarket credentials.
The malicious crate had 1 version published on 2026-02-26 approximately 9 hours
before removal and had no evidence of actual usage. The only crate depending on
this crate was the tracing_checks crate, which was also part of this campaign
and has received a separate advisory.
Thanks to Marko Ćupić for finding and reporting this to the Rust security
response working group, and to Emily Albini for co-ordinating with the
crates.io team.
The crates.io team advises anyone developing with Polymarket to review
dependencies carefully. We are investigating ways to mitigate this attacker who
appears to be very motivated to steal Polymarket credentials.
Source: NVD
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."