Elementary Data CLI Breach 2026: 1M-Download Package Stole Credentials
The element-data CLI, an open-source ML monitoring tool with over one million monthly downloads, was compromised on 25 April 2026 when attackers exploited a developer account vulnerability to publish a credential-stealing version 0.23.3 to PyPI and Docker Hub. Business20Channel.tv analyses the breach's impact across financial services, healthcare, and government.
James covers AI, agentic AI systems, gaming innovation, smart farming, telecommunications, and AI in film production. Technology analyst focused on startup ecosystems.
LONDON, 3 May 2026 — On Friday 25 April 2026, unknown threat actors compromised the open-source machine-learning monitoring tool element-data, a Python command-line interface with more than one million monthly downloads, by exploiting a vulnerability in the developer account workflow to gain access to signing keys and other sensitive credentials. The malicious version, tagged 0.23.3, was published to the Python Package Index (PyPI) and the project's Docker image account, and remained available for approximately 12 hours before removal on Saturday 26 April 2026. According to the original report by Ars Technica, the compromised package scoured infected environments for user profiles, warehouse credentials, cloud provider keys, API tokens, and SSH keys. The incident underscores systemic weaknesses in the open-source software supply chain that continue to expose enterprises across every sector. This analysis, informed by Business20Channel.tv's ongoing coverage of AI infrastructure security and our 2026 open-source supply-chain risk series, examines the technical anatomy of the breach, its competitive and regulatory context, and the concrete steps organisations must take in response.
Executive Summary
• A threat actor exploited a developer account workflow vulnerability in the element-data CLI project on 25 April 2026, publishing malicious version 0.23.3 to PyPI and Docker Hub.
• The compromised package harvested user profiles, warehouse credentials, cloud-provider keys, API tokens, and SSH keys from any environment where it was executed.
• The malicious artefact was live for roughly 12 hours — from Friday evening to Saturday morning — before the Elementary team removed it.
• Elementary Cloud, the Elementary dbt package, and all other CLI versions were confirmed unaffected.
• Elementary's developers advised all users who installed version 0.23.3 or pulled the tainted Docker image to treat every credential accessible to that environment as compromised.
Key Developments
How the Compromise Unfolded
The attackers targeted a weakness in the account workflow used by the Elementary project's maintainers — specifically the mechanism governing access to package-signing keys and repository publishing tokens. By obtaining these keys, the threat actors were able to mint a new release that would pass standard integrity checks. Version 0.23.3 was the sole malicious artefact; no other Elementary packages — including Elementary Cloud and the Elementary dbt package — were affected. The malicious code embedded within 0.23.3 performed automated reconnaissance across the host environment, targeting at least five categories of sensitive material: user profiles, data-warehouse credentials, cloud-provider keys, API tokens, and SSH keys. In a post-incident advisory published on 26 April 2026, the Elementary development team was unequivocal: "Users who installed 0.23.3, or who pulled and ran the affected Docker image, should assume that any credentials accessible to the environment where it ran may have been exposed."
Timeline and Remediation Window
The 12-hour exposure window — roughly Friday evening through Saturday morning UTC — is significant. Automated CI/CD pipelines that resolve dependencies without pinned versions could have pulled 0.23.3 during scheduled nightly builds, potentially multiplying the blast radius well beyond individual developers. The Python Package Index hosts more than 500,000 projects and serves billions of downloads per year, according to PyPI Stats. A package attracting one million monthly downloads sits comfortably within the top tier of the ecosystem, meaning the pool of potentially affected users and organisations is substantial. Elementary's maintainers moved to yank the release within 12 hours, but the question of how many downstream environments ingested the tainted version remains open as of 3 May 2026.
Market Context & Competitive Landscape
Supply-Chain Attacks in the Python Ecosystem
The Elementary breach is far from an isolated event. In 2024, the Phylum research team documented more than 5,000 malicious packages uploaded to PyPI within a single 12-month period. The Socket security research group reported a 58% year-on-year increase in supply-chain attacks targeting open-source registries between 2023 and 2025. Elementary's predicament mirrors the 2024 compromise of the popular ultralytics YOLO package, where attackers similarly hijacked publishing credentials to distribute cryptocurrency-mining code to an estimated 50,000 downloads before detection. The Open Source Security Foundation (OpenSSF), backed by Google, Microsoft, and the Linux Foundation, has championed initiatives such as SLSA (Supply-chain Levels for Software Artifacts) and Sigstore to address precisely this class of attack. Yet adoption remains uneven. According to a 2025 Sonatype State of the Software Supply Chain report, only 24% of organisations enforce provenance verification on every package they consume from public registries.
Competitor and Alternative Tooling
| Tool / Platform | Primary Function | Monthly Downloads (est.) | Known Supply-Chain Incident (2024–2026) |
|---|---|---|---|
| Elementary (element-data CLI) | ML data observability | ~1,000,000 | Yes — version 0.23.3 (April 2026) |
| Great Expectations | Data validation & profiling | ~2,500,000* | None publicly reported |
| Monte Carlo | Data observability (SaaS) | N/A (proprietary SaaS) | None publicly reported |
| Soda Core | Data quality monitoring | ~400,000* | None publicly reported |
Sources: PyPI Stats, vendor disclosures, Ars Technica (April 2026). Figures marked * are estimates based on publicly available PyPI download counters and may not reflect internal/private usage.
Great Expectations and Soda Core compete in overlapping segments of the data-observability market. Neither has suffered a comparable public compromise in the 2024–2026 window, though this speaks to the randomness of attacker targeting as much as to any inherent security superiority. Monte Carlo's closed-source SaaS model insulates it from registry-level supply-chain risk, though it introduces different trust trade-offs around proprietary code auditing.
Industry Implications
Financial Services
Banks, insurers, and trading firms that deploy ML-driven risk models frequently integrate open-source observability tooling into production data pipelines. The UK Financial Conduct Authority (FCA) and the European Central Bank (ECB) have both issued guidance since 2024 requiring regulated entities to maintain a software bill of materials (SBOM) for critical systems. An organisation running element-data 0.23.3 in a production pipeline connected to a cloud data warehouse could have exposed access keys to Snowflake, BigQuery, or Redshift instances containing regulated customer data — potentially triggering notification obligations under the EU Digital Operational Resilience Act (DORA), which took full effect on 17 January 2025.
Healthcare and Life Sciences
Healthcare organisations using ML observability tools to monitor clinical-data pipelines face HIPAA exposure in the United States and UK GDPR obligations under the Information Commissioner's Office regime. If SSH keys or cloud-provider credentials harvested from a compromised environment granted access to patient data stores, the regulatory consequences extend well beyond a credential rotation exercise. The 72-hour breach notification window under UK GDPR means that any affected NHS Trust or pharmaceutical company must already have initiated reporting procedures.
Government and Defence
Public-sector adoption of open-source data tooling has accelerated under programmes such as the UK Central Digital and Data Office's open-source-first strategy. The Elementary breach is a case study in why the National Cyber Security Centre (NCSC) continues to advocate zero-trust architectures and automated dependency scanning for government digital services. Any Whitehall department ingesting element-data via automated pipelines must now conduct a forensic review.
Business20Channel.tv Analysis
The 12-Hour Problem
Twelve hours is both reassuringly short and disturbingly long. It is short because the Elementary maintainers detected and removed the compromised version before many European and Asian business hours began on Saturday 26 April 2026. It is long because modern CI/CD pipelines do not wait for business hours. A GitLab or GitHub Actions workflow triggered at 02:00 UTC on a Saturday would have resolved the latest version of element-data, installed 0.23.3, and shipped whatever it built to staging or even production — all without a single human seeing a terminal prompt. The real blast radius of this incident will not be fully understood for weeks, possibly months. Credential harvesting is a silent operation; the malicious code exfiltrates data and the pipeline continues running as though nothing happened. Unlike a crypto-miner, which leaves CPU-usage traces, a credential stealer's footprint vanishes the moment the process exits.
Developer Account Workflows: A Systemic Weak Point
The specific vulnerability exploited — access to signing keys via a flaw in the developer account workflow — points to a recurring structural weakness in the open-source ecosystem. PyPI introduced mandatory two-factor authentication for critical projects in 2024, and the registry's own blog has documented steady improvements to publisher verification through Trusted Publishers and OpenID Connect-based token issuance. Yet the Elementary breach demonstrates that even well-intentioned security layers can be circumvented when the attack surface includes the entire identity and access management chain of volunteer maintainers. The Business20Channel.tv editorial team has consistently argued that the industry's reliance on unpaid or under-resourced maintainers to secure critical infrastructure is an economic market failure, not merely a technical gap. Until enterprises that depend on open-source packages fund proportional security resources — through programmes like thanks.dev, Tidelift, or direct sponsorship — incidents of this nature will recur with predictable regularity.
Credential Rotation Is Not Sufficient
Elementary's advisory rightly instructs affected users to treat all accessible credentials as compromised. But credential rotation addresses only the first-order risk. If exfiltrated SSH keys or API tokens were used by the attackers during the 12-hour window to establish persistence — planting secondary backdoors, creating new IAM roles, or cloning repositories — a simple key rotation will not close those doors. Organisations must pair rotation with a full audit of access logs, IAM event histories, and network egress records for the exposure period.
Why This Matters for Industry Stakeholders
| Stakeholder | Primary Risk | Immediate Action Required | Regulatory Trigger |
|---|---|---|---|
| Data Engineering Teams | Credential exposure in ML pipelines | Audit pip/Docker logs for version 0.23.3; rotate all secrets | Internal incident response SLA |
| CISOs / Security Teams | Lateral movement via harvested keys | Forensic review of IAM logs and network egress for 25–26 April 2026 | DORA, NIS2, UK GDPR (72-hour notification) |
| Open-Source Maintainers | Account workflow exploitation | Enable Trusted Publishers on PyPI; audit signing-key storage | N/A — reputational risk |
| Investors / VCs | Portfolio company exposure to supply-chain risk | Require SBOMs and dependency-pinning policies from portfolio companies | Due-diligence obligations |
Source: Business20Channel.tv analysis based on Ars Technica reporting (April 2026), Elementary developer advisory, DORA/NIS2 regulatory frameworks.
For CISOs, the Elementary incident is an immediate call to verify whether any internal environment consumed version 0.23.3 between 25 and 26 April 2026. Any organisation that cannot answer that question within hours has a dependency-management visibility gap that no amount of perimeter security will compensate for. For investors evaluating data-infrastructure start-ups, the breach is a due-diligence prompt: does the target company pin dependencies? Does it verify package provenance? Does it maintain an SBOM? These are no longer aspirational best practices — they are baseline operational hygiene for any company handling third-party data.
Forward Outlook
We expect three developments in the wake of this incident. First, PyPI and other registries will accelerate the rollout of build-provenance attestation requirements, building on SLSA Level 3 guarantees that link published artefacts to auditable build systems. Second, enterprise procurement teams will increasingly require dependency-pinning and provenance-verification evidence before approving open-source packages for production use — a trend the US Cybersecurity and Infrastructure Security Agency (CISA) has actively encouraged through its Secure by Design initiative. Third, the commercial data-observability market — led by players such as Monte Carlo and Anomalo — may see a short-term uplift as risk-averse enterprises re-evaluate open-source alternatives in the light of the Elementary breach. Whether that shift proves durable depends on whether the open-source community can close the maintainer-security funding gap before the next one-million-download package is weaponised. The Elementary team has not yet published a detailed root-cause analysis as of 3 May 2026; when it arrives, it will be the definitive document for understanding how signing-key access was obtained and what mitigations will prevent recurrence. Until that report is available, every organisation running ML observability tooling sourced from public registries should audit its dependency resolution, verify installed versions, and treat the supply-chain threat as active and ongoing.
Key Takeaways
• The element-data CLI version 0.23.3, published to PyPI and Docker Hub on 25 April 2026, contained credential-harvesting malware and was live for approximately 12 hours before removal.
• Any environment that installed or executed version 0.23.3 should treat all accessible credentials — including cloud keys, API tokens, SSH keys, and warehouse passwords — as compromised.
• Elementary Cloud, the Elementary dbt package, and all other CLI versions were not affected.
• The breach exploited a developer account workflow vulnerability to access signing keys — a systemic risk across open-source registries that mandatory 2FA alone does not fully mitigate.
• Organisations should enforce dependency pinning, provenance verification, and continuous SBOM generation as minimum supply-chain security standards in 2026.
References & Bibliography
[1] Dan Goodin, Ars Technica. (2026, April 27). Open source package with 1 million monthly downloads stole user credentials. https://arstechnica.com/security/2026/04/open-source-package-with-1-million-monthly-downloads-stole-user-credentials/
[2] Elementary. (2026, April 26). Security Advisory — element-data CLI version 0.23.3. https://www.elementary-data.com/
[3] PyPI Stats. (2026). Download statistics for element-data. https://pypistats.org/
[4] Python Package Index. (2026). PyPI security policies and Trusted Publishers documentation. https://blog.pypi.org/
[5] Open Source Security Foundation. (2026). OpenSSF mission and projects. https://openssf.org/
[6] SLSA. (2026). Supply-chain Levels for Software Artifacts specification. https://slsa.dev/
[7] Sigstore. (2026). Keyless signing for open-source software. https://www.sigstore.dev/
[8] Sonatype. (2025). State of the Software Supply Chain Report 2025. https://www.sonatype.com/state-of-the-software-supply-chain
[9] Phylum. (2025). Malicious package research blog. https://blog.phylum.io/
[10] Socket. (2025). Open-source supply-chain attack trends. https://socket.dev/blog
[11] UK Financial Conduct Authority. (2026). FCA operational resilience guidance. https://www.fca.org.uk/
[12] European Central Bank. (2025). ECB guidance on ICT and security risk management. https://www.ecb.europa.eu/
[13] European Union. (2022). Digital Operational Resilience Act (DORA) — Regulation 2022/2554. https://eur-lex.europa.eu/eli/reg/2022/2554/oj
[14] UK Information Commissioner's Office. (2026). UK GDPR breach notification guidance. https://ico.org.uk/
[15] National Cyber Security Centre. (2026). NCSC supply-chain security guidance. https://www.ncsc.gov.uk/
[16] UK Central Digital and Data Office. (2026). Open-source-first government digital strategy. https://www.gov.uk/government/organisations/central-digital-and-data-office
[17] CISA. (2026). Secure by Design principles. https://www.cisa.gov/
[18] Tidelift. (2026). Paying maintainers for enterprise open-source security. https://tidelift.com/
[19] thanks.dev. (2026). Funding open-source dependencies. https://thanks.dev/
[20] Business20Channel.tv. (2026). AI and open-source security coverage. https://business20channel.tv/?category=AI
About the Author
James Park
AI & Emerging Tech Reporter
James covers AI, agentic AI systems, gaming innovation, smart farming, telecommunications, and AI in film production. Technology analyst focused on startup ecosystems.
Frequently Asked Questions
What happened to the element-data CLI package in April 2026?
On 25 April 2026, unknown attackers exploited a vulnerability in the Elementary developer account workflow to access signing keys and publish a malicious version 0.23.3 to the Python Package Index and Docker Hub. The compromised version harvested user profiles, warehouse credentials, cloud provider keys, API tokens, and SSH keys from affected environments. The malicious artefact was live for approximately 12 hours before the Elementary team removed it on 26 April 2026. Elementary Cloud and the Elementary dbt package were not affected.
How does the Elementary breach affect enterprises using open-source data tools?
Enterprises running ML data pipelines that consumed element-data version 0.23.3 during the 12-hour exposure window face potential credential compromise across cloud providers, data warehouses, and internal systems. Automated CI/CD pipelines that resolve dependencies without version pinning are at particular risk. Affected organisations in regulated sectors such as financial services may face notification obligations under DORA and UK GDPR, which imposes a 72-hour breach reporting window. The incident underscores the need for dependency pinning, SBOM generation, and provenance verification as baseline security practices.
What should investors look for in portfolio companies after this supply-chain attack?
Investors should verify that portfolio companies maintain software bills of materials, enforce dependency pinning in production environments, and verify package provenance using mechanisms such as Trusted Publishers on PyPI or SLSA attestations. The Elementary breach demonstrates that a single compromised package with one million monthly downloads can expose cloud credentials, API tokens, and SSH keys across an entire organisation. Due-diligence processes should now include supply-chain security posture as a standard evaluation criterion alongside conventional cybersecurity audits.
What technical steps should teams take if they installed element-data version 0.23.3?
The Elementary development team advises any user who installed version 0.23.3 or pulled the affected Docker image to assume that all credentials accessible in that environment have been compromised. Immediate actions include rotating all cloud-provider keys, API tokens, SSH keys, and warehouse passwords. Teams should also audit IAM event logs and network egress records for the period between 25 and 26 April 2026 to identify any lateral movement or persistence mechanisms established by the attackers. Simply rotating credentials is insufficient if secondary access was established during the exposure window.
Will registries like PyPI strengthen security requirements after the 2026 Elementary breach?
PyPI has been progressively tightening security since mandating two-factor authentication for critical project maintainers in 2024 and introducing Trusted Publishers using OpenID Connect-based token issuance. The Elementary breach is likely to accelerate the rollout of build-provenance attestation requirements aligned with SLSA Level 3 standards. The US Cybersecurity and Infrastructure Security Agency has also been encouraging Secure by Design principles that push provenance verification upstream. However, adoption across the broader ecosystem remains uneven — Sonatype's 2025 report found only 24% of organisations enforce provenance verification on every consumed package.