Snyk has reported that there have been attempts or successful attacks targeting this vulnerability.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsAvoid using all malicious instances of the faster_log
package.
faster_log is a malicious package.
Two malicious Rust crates, faster_log
(impersonates the legitimate fast_log
library) and async_println
attempt to scan source files for Quoted Ethereum private keys (0x + 64 hex), Solana-style Base58 secrets and Bracketed byte arrays to later exfiltrate matches via HTTP POST
to a hardcoded command and control (C2) endpoint https://mainnet[.]solana-rpc-pool[.]workers[.]dev/
. The payload runs at application or test runtime, specifically during log packing operation, not at the build process.
Note:
If you have installed or used these crate since May 25th 2025, assume exposure: uninstall them, rotate any secrets that could have been exposed in source, tests, fixtures.