Skip to main content

malwi - AI Python Malware Scanner

Project description

malwi - AI Python Malware Scanner

Logo

Detect Python malware fast - no internet, no expensive hardware, no fees.

malwi is specialized in detecting zero-day vulnerabilities, for classifying code as safe or harmful.

Open-source software made in Europe. Based on open research, open code, open data. 🇪🇺🤘🕊️

# Install
pip install --user malwi

# Run
malwi ./examples

| File                 | Name       |   Malicious |
|----------------------|------------|-------------|
| examples/__init__.py | run        |        0.93 |
| examples/__init__.py | debug      |        0.99 |
| examples/__init__.py | runcommand |        1    |

Why malwi?

The number of malicious open-source packages is growing. This is not just a threat to your business but also to the open-source community.

Typical malware behaviors include:

  • Exfiltration of data: Stealing credentials, API keys, or sensitive user data.
  • Backdoors: Allowing remote attackers to gain unauthorized access to your system.
  • Destructive actions: Deleting files, corrupting databases, or sabotaging applications.

Attention: Malicious packages might execute code during installation (e.g. through setup.py). Make sure to NOT download or install malicious packages from the dataset with commands like uv add, pip install, poetry add.

What's next?

The first iteration focuses on maliciousness of Python source code.

Future iterations will cover malware scanning for more languages (JavaScript, Rust, Go) and more formats (binaries, logs).

How does it work?

malwi applies DistilBert and Support Vector Machines (SVM) based on the design of Zero Day Malware Detection with Alpha: Fast DBI with Transformer Models for Real World Application (2025). Additionally, malwi applies Tree-sitter for creating abstract syntax trees (ASTs) which are mapped to a unified and security sensitive syntax used as training input. The Python malware dataset can be found here. After 3 epochs of training you will get: Loss: 0.0986, Accuracy: 0.9669, F1: 0.9666.

High-level training pipeline:

  • Create dataset from malicious/benign repositories and map code to malwi syntax
  • Remove code duplications based on hashes
  • Train DistilBert based on the malwi samples for categorizing malicious/benign

Support

Do you have access to malicious Rust, Go, whatever packages? Contact me.

Develop

Prerequisites: uv

# Download and process data
cmds/download_and_preprocess.sh

# Only process data
cmds/preprocess.sh

# Preprocess then start training
cmds/preprocess_and_train.sh

# Only start training
cmds/train.sh

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

malwi-0.0.6.tar.gz (55.9 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

malwi-0.0.6-py3-none-any.whl (52.2 kB view details)

Uploaded Python 3

File details

Details for the file malwi-0.0.6.tar.gz.

File metadata

  • Download URL: malwi-0.0.6.tar.gz
  • Upload date:
  • Size: 55.9 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: uv/0.7.3

File hashes

Hashes for malwi-0.0.6.tar.gz
Algorithm Hash digest
SHA256 9df43780a297445af62f9ac5a229c15360168ce17f1a925d865386020711689d
MD5 8ebb10b3b4d0dbabfe250adcf9743c88
BLAKE2b-256 f06eaf5924baa2c04bcd14f49f93375af0d6dd78a331188afa31a7cb5711c051

See more details on using hashes here.

File details

Details for the file malwi-0.0.6-py3-none-any.whl.

File metadata

  • Download URL: malwi-0.0.6-py3-none-any.whl
  • Upload date:
  • Size: 52.2 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: uv/0.7.3

File hashes

Hashes for malwi-0.0.6-py3-none-any.whl
Algorithm Hash digest
SHA256 4d923913be12d1b62277e36349145fa14b8d1ae1e57e978857134060b08e2228
MD5 8bb14119117ef9bce5fc00d1ef18cf97
BLAKE2b-256 d476d1abba2262539bf75c5809234a1c4d5612366ab72b34d70276c998418fa5

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page