#208 — Tue 24 March 2026 by Evan Chen
We discovered it when the package was pulled in as a transitive dependency by an MCP plugin running inside Cursor. The
.pthlauncher spawns a child Python process viasubprocess.Popen, but because.pthfiles trigger on every interpreter startup, the child re-triggers the same.pth— creating an exponential fork bomb that crashed the machine. The fork bomb is actually a bug in the malware.
(Passed to me by a work colleague.)