Rust in Peace: The 'finch_cli_rust' Supply Chain Ambush
Vulnerability ID: GHSA-6V2J-VR4H-F632
CVSS Score: 9.8
Published: 2026-02-12
In the modern development ecosystem, typing the wrong package name is akin to handing your house keys to a burglar. The 'finch_cli_rust' package, recently purged from crates.io, was a classic supply chain attack targeting users of the AWS 'Finch' container tool. By leveraging the inherent trust developers place in package registries and the powerful (and dangerous) build.rs mechanism in Rust, this malicious crate executed arbitrary code immediately upon installation—silently harvesting credentials and compromising development environments.
TL;DR
A malicious Rust crate named 'finch_cli_rust' (and aliases) was uploaded to crates.io, impersonating tools for AWS Finch. It utilized the build.rs build script feature to achieve Remote Code Execution (RCE) instantly when a developer ran cargo build or cargo install. The package has been removed, but affected users must assume full compromise of their local environment and rotate all exposed credentials.
⚠️ Exploit Status: ACTIVE
Technical Details
- Attack Vector: Supply Chain (Typosquatting)
- Execution Point: cargo build / build.rs
- Impact: Remote Code Execution (RCE) / Data Exfiltration
- Severity: Critical
- Target Ecosystem: Rust (crates.io)
- Exploit Status: Active / Weaponized
Affected Systems
- Rust Development Environments
- CI/CD Pipelines running
cargo build - Workstations with AWS Credentials exposed
-
finch_cli_rust: All versions (Fixed in:
N/A (Removed))
Exploit Details
- Malware Analysis: The package itself is the exploit. No separate PoC needed.
Mitigation Strategies
- Dependency Pinning: Always use Cargo.lock to ensure consistent builds.
- Typosquatting Awareness: Double-check package names against official documentation before installing.
- Registry Mirroring: Use private registries (like Artifactory) that proxy and scan public crates.
- Least Privilege: Avoid running builds with global administrator or root privileges.
Remediation Steps:
- Remove
finch_cli_rustfrom Cargo.toml immediately. - Delete
Cargo.lockand regenerate it. - Run
cargo cleanto remove build artifacts. - Rotate all AWS keys, SSH keys, and API tokens present in the environment.
- Inspect shell configuration files (.bashrc, .zshrc) for added persistence mechanisms.
References
Read the full report for GHSA-6V2J-VR4H-F632 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)