Real-time pip security — built for developers

Every pip install
is a security
risk. We fix that.

CyberScan intercepts Python package installs, scans them against 1,800+ known malicious packages and deep behavioral analysis — before a single line of code runs on your machine.

$ npm install -g github:AmazinCS/CyberScanner
terminal
cyberscan install requests
🔄 Checking malicious package database...
📦 Downloading requests for scanning...
🔎 Scanning package contents...
 
✅ Package appears safe. Installing...
Successfully installed requests-2.31.0
 
cyberscan install vulnpkg
📂 Scanning local package...
🔎 Scanning package contents...
 
🚨 HIGH RISK PACKAGE DETECTED — Installation blocked
 
os.system() call
subprocess execution
exec() call
[combination] base64 + exec/eval
 
Risk score: 35
→ Installation blocked
 
cyberscan repo https://github.com/user/suspicious-lib
📥 Cloning repo (shallow)...
🔎 Running security scan...
 
remote download piped to shell executor
[combination] download + execute pattern
 
Risk score: 17
Final result: HIGH RISK
1,800+
Known malicious packages blocked
2×
Layers of protection on every install
0
Data ever sent to external servers
1
Command to protect every install

pip install trusts everything. Attackers know this.

The Python package ecosystem is the most targeted in software supply chain attacks. Malicious packages get published to PyPI daily — and pip has no built-in protection. One bad install is all it takes.

⚠️

Typosquatting attacks

Attackers publish packages with names like reqeusts or numpy-base — one typo and your machine is compromised.

💀

Legitimate packages get hijacked

Real packages like ultralytics have had specific versions compromised. pip has no way to warn you.

🔓

Malicious code runs at install time

setup.py executes during pip install. Attackers embed shell commands, backdoors, and data exfiltration in that single file.

Two layers of protection.
One command.

01
🗄

Known-Risk Database Check

Every package name is instantly checked against the DataDog malicious package dataset — 1,800+ confirmed PyPI threats. Known bad packages are blocked before anything is downloaded.

02
🔬

Behavioral Analysis

The package is downloaded but NOT installed. CyberScan opens every .py file and scans for dangerous execution patterns — system calls, shell injection, obfuscated payloads, install-time execution.

03
⚖️

Two-Level Decision

A weighted risk score is calculated. LOW RISK packages install automatically with no interruption. HIGH RISK packages are blocked outright — no prompts, no exceptions. Trusted packages like numpy and pandas are never falsely flagged.

Security that doesn't slow you down

Built to fit into how developers actually work — not force a new workflow.

🔒

100% Local — Zero Data Leakage

Every scan happens entirely on your machine. No package names, no code, no metadata ever leaves your terminal. Critical for teams with compliance requirements.

🧠

Behavioral Pattern Detection

Doesn't just check a blocklist — actively reads package code looking for os.system calls, subprocess abuse, base64 payloads, shell injection, and more.

📊

Weighted Risk Scoring

Each suspicious pattern is scored individually. Combination attacks — like base64 paired with exec() — are scored higher. You see exactly why something was blocked.

Real-Time Threat Intelligence

The malicious package database auto-refreshes every 24 hours directly from DataDog's live dataset. You're always protected against the latest known threats.

🌐

GitHub Repository Scanning

Run cyberscan repo <url> to scan any GitHub repo before cloning or running it. Shallow-clones, scans all Python and shell scripts, then reports risk — no installation needed.

🤝

Trusted Package Intelligence

numpy, pandas, requests, flask, and other mature libraries use advanced patterns internally. CyberScan recognises this — they're never falsely flagged as high risk from legitimate internal code.

The only terminal security tool
built specifically for Python developers

There is no other tool that combines real-time threat intelligence, deep behavioral analysis, and complete local privacy — all in a single pip-native CLI command.

The only solution that runs entirely offline

Every competing tool sends your package data to a cloud server to scan it. CyberScan never does. If your organisation handles sensitive code, classified data, or has strict network policies — CyberScan is the only tool that works for you.

The only tool that combines two independent detection layers

Known-malware database checks catch confirmed threats instantly. Behavioral analysis catches new, unknown threats that have never been seen before. No other pip tool does both — you need both.

The only scanner that reads code, not just metadata

Most tools compare package names and version numbers. CyberScan actually opens the files and reads the code — catching obfuscated payloads, suspicious combinations, and novel attack patterns that a database alone will never detect.

The only pip security tool with combination attack detection

base64 alone is harmless. exec() alone can be legitimate. base64 + exec() together is how 80% of PyPI malware executes its payload. CyberScan understands context — not just keywords.

pip install is blind.
cyberscan install is not.

Every time a developer runs pip install without CyberScan, they are trusting a stranger's code with root-level access to their machine. That is not a risk — it is a guarantee of eventual compromise.

What CyberScan looks for

Each pattern is scored and weighted. High-risk combinations trigger bonus scoring.

+3
os.system()
Direct shell command execution — the most abused primitive in PyPI malware
+3
subprocess.call/Popen()
Spawning child processes — used for reverse shells and data exfiltration
+2
eval() / exec()
Dynamic code execution — runs arbitrary code from strings or decoded blobs
+4
shell=True
Opens the door to full shell injection when combined with subprocess calls
+10
base64 + exec/eval
Combo bonus: #1 attack pattern in PyPI malware — decode a payload then execute it
+10
download + execute
Combo bonus: fetch remote code and run it — classic stage-2 payload delivery
+8
shell=True + subprocess
Combo bonus: full shell injection path — arbitrary command execution
+8
obfuscated payload
Combo bonus: long base64 blob in a single file — hidden encoded payload

Start free. Scale when you need to.

The CLI is free forever. Teams and enterprises get centralized control, reporting, and compliance tools.

Free
$0
For individual developers. Always free, forever.
  • Full CLI tool
  • 2-layer scanning on every install
  • DataDog malicious package database
  • Behavioral analysis engine
  • 24-hour threat database refresh
  • 100% local — no data sent anywhere
Install Free →
Enterprise
Custom
For organisations with compliance and security requirements.
  • Everything in Team
  • CI/CD pipeline integration
  • GitHub Actions support
  • SOC2 / ISO 27001 compliance exports
  • Private package registry support
  • SLA and dedicated support
  • On-premise deployment option
Contact Sales →

Stop trusting strangers
with your machine.

Install CyberScan in 30 seconds. Free forever for individual developers.