Skip to main content

malwi - AI Python Malware Scanner

Project description

malwi - AI Python Malware Scanner

Logo

Detect Python malware fast - no internet, no expensive hardware, no fees.

malwi is specialized in detecting zero-day vulnerabilities, for classifying code as safe or harmful.

Open-source software made in Europe. Based on open research, open code, open data. 🇪🇺🤘🕊️

# Install
pip install --user malwi

# Run
malwi ./examples

| File                 | Name       |   Malicious |
|----------------------|------------|-------------|
| examples/__init__.py | run        |        0.93 |
| examples/__init__.py | debug      |        0.99 |
| examples/__init__.py | runcommand |        1    |

Why malwi?

The number of malicious open-source packages is growing. This is not just a threat to your business but also to the open-source community.

Typical malware behaviors include:

  • Exfiltration of data: Stealing credentials, API keys, or sensitive user data.
  • Backdoors: Allowing remote attackers to gain unauthorized access to your system.
  • Destructive actions: Deleting files, corrupting databases, or sabotaging applications.

Attention: Malicious packages might execute code during installation (e.g. through setup.py). Make sure to NOT download or install malicious packages from the dataset with commands like uv add, pip install, poetry add.

What's next?

The first iteration focuses on maliciousness of Python source code.

Future iterations will cover malware scanning for more languages (JavaScript, Rust, Go) and more formats (binaries, logs).

How does it work?

malwi applies DistilBert and Support Vector Machines (SVM) based on the design of Zero Day Malware Detection with Alpha: Fast DBI with Transformer Models for Real World Application (2025). Additionally, malwi applies Tree-sitter for creating abstract syntax trees (ASTs) which are mapped to a unified and security sensitive syntax used as training input. The Python malware dataset can be found here. After 3 epochs of training you will get: Loss: 0.0986, Accuracy: 0.9669, F1: 0.9666.

High-level training pipeline:

  • Create dataset from malicious/benign repositories and map code to malwi syntax
  • Remove code duplications based on hashes
  • Train DistilBert based on the malwi samples for categorizing malicious/benign

Support

Do you have access to malicious Rust, Go, whatever packages? Contact me.

Develop

Prerequisites: uv

# Download and process data
cmds/download_and_preprocess.sh

# Only process data
cmds/preprocess.sh

# Preprocess then start training
cmds/preprocess_and_train.sh

# Only start training
cmds/train.sh

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

malwi-0.0.7.tar.gz (59.2 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

malwi-0.0.7-py3-none-any.whl (55.0 kB view details)

Uploaded Python 3

File details

Details for the file malwi-0.0.7.tar.gz.

File metadata

  • Download URL: malwi-0.0.7.tar.gz
  • Upload date:
  • Size: 59.2 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: uv/0.7.3

File hashes

Hashes for malwi-0.0.7.tar.gz
Algorithm Hash digest
SHA256 4841a47e2b159385aa105b53bd5672f8b3d78158751f0685bef42c97306851da
MD5 4cb9ddba7221005f3e539b9295b86434
BLAKE2b-256 78a45de71286335836b754c4e8809fb829e105b8178b1b79547165ae5a526927

See more details on using hashes here.

File details

Details for the file malwi-0.0.7-py3-none-any.whl.

File metadata

  • Download URL: malwi-0.0.7-py3-none-any.whl
  • Upload date:
  • Size: 55.0 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: uv/0.7.3

File hashes

Hashes for malwi-0.0.7-py3-none-any.whl
Algorithm Hash digest
SHA256 d5c36637663c4954c7aa09b93d56ce876b6bff142843d69f15e41a6e650c6551
MD5 47b1fc0d172b29c7a03ab7853aac6d63
BLAKE2b-256 5adc5a0ff93685567a011c4c3305c9bb7a3a857d118e686b5691b3bbe82bedf1

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page