A widely used open-source machine learning monitoring tool, element-data, was compromised over the weekend after attackers exploited a flaw in its developer account workflow to steal signing keys and push a malicious update that harvests user credentials. The package, downloaded over 1 million times per month, is essential for data scientists tracking performance and anomalies in ML systems.
The malicious version, tagged 0.23.3, was published to the Python Package Index and Docker Hub on Friday. It scanned environments for sensitive data including user profiles, cloud provider keys, API tokens, SSH keys, and warehouse credentials, according to Elementary Cloud, the company behind the project. The rogue release remained live for approximately 12 hours before being removed on Saturday.
“Users who installed 0.23.3, or who pulled and ran the affected Docker image, should assume that any credentials accessible to the environment where it ran may have been exposed,” the developers warned in a security advisory. The incident underscores the growing threat of supply chain attacks targeting open-source ecosystems.
Background
Element-data is a command-line interface and Python package that helps users monitor performance and detect anomalies in machine-learning systems. It is often deployed in production environments where it has access to various cloud services, databases, and API endpoints. The attackers exploited a vulnerability in the developers’ account workflow that granted access to signing keys and other sensitive information, enabling them to cryptographically sign the malicious update.

Elementary Cloud, the company that maintains element-data, stated that the Elementary Cloud platform itself, the Elementary dbt package, and all other CLI versions were not affected. However, the compromised package was distributed via official channels, making it indistinguishable from legitimate releases for users who rely on package signatures for verification.

What This Means
This incident highlights the inherent risks in relying on open-source packages that have broad system access. As Dr. Sarah Chen, a cybersecurity researcher at the Institute for Digital Trust, noted: “This type of breach is particularly dangerous because it bypasses traditional trust mechanisms. Users trust signed packages, but if signing keys are stolen, even verified software can be weaponized.”
Organizations that have used the affected version should immediately rotate all credentials that were accessible in the environment, including cloud provider keys, API tokens, and SSH keys. They should also conduct a thorough audit of any unauthorized access or data exfiltration that may have occurred during the exposure window. The attack serves as a stark reminder that developers must secure their account workflows with multi-factor authentication and rigorous access controls.
To learn more about securing supply chains, refer to our background section. For immediate actions, see the developer advisory linked in the analysis.