GHSA-MH23-RW7F-V5PQ: Malicious 'time-sync' Crate Exfiltrating Environment Secrets
Vulnerability ID: GHSA-MH23-RW7F-V5PQ
CVSS Score: 9.8
Published: 2026-03-05
A critical security advisory has been issued for the Rust crate time-sync, which was identified as a malicious package intended to conduct a supply chain attack. Published to crates.io, the package purported to be a time synchronization utility but contained concealed logic to locate, read, and exfiltrate sensitive .env configuration files from the host system to a remote server controlling the timeapi.io domain or a spoofed variant thereof. The crate was removed from the registry approximately 50 minutes after publication.
TL;DR
The time-sync Rust crate contains malware that steals .env files and sends them to a remote server. It was active on crates.io for 50 minutes on March 4, 2026. Any project that installed this crate must consider all environment secrets compromised and rotate them immediately.
⚠️ Exploit Status: ACTIVE
Technical Details
- CWE ID: CWE-506
- Attack Vector: Network / Supply Chain
- Severity: Critical
- Impact: Information Disclosure (Credentials)
- Affected Component: time-sync crate
- Status: Removed from Registry
Affected Systems
- Rust development environments
- CI/CD pipelines building Rust projects
- Systems with
.envfiles utilizingtime-sync -
time-sync: * (Fixed in:
Removed)
Mitigation Strategies
- Immediate removal of the malicious dependency
- Credential rotation for all exposed secrets
- Automated dependency auditing using cargo-audit
- Network egress filtering for CI/CD environments
Remediation Steps:
- Run
cargo treeor checkCargo.lockto verify iftime-syncis present. - If present, execute
cargo remove time-sync. - Identify every secret key, password, and token located in
.envfiles on the affected machine. - Log into the respective service providers (AWS, Stripe, Database, etc.) and revoke the compromised credentials.
- Generate new credentials and update the local configuration.
- Install
cargo-auditviacargo install cargo-auditand runcargo auditto verify no other vulnerabilities exist.
References
- GitHub Advisory GHSA-MH23-RW7F-V5PQ
- RustSec Advisory RUSTSEC-2026-0036
- OSV Entry for RUSTSEC-2026-0036
Read the full report for GHSA-MH23-RW7F-V5PQ on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)