The vulnerability lies in a malicious Rust crate, polymarket-clients-sdk, which was typosquatting the legitimate polymarket-client-sdk crate. The malicious crate contained a build.rs script. In Rust, build.rs files are executed at compile time. The main function within this build.rs script contained malicious code designed to steal credentials and environment variables from the build environment. The crate has since been removed from crates.io, so no patch is available. The analysis is based on the description of the vulnerability in the provided advisories and the linked dev.to article which explicitly mentions "build.rs arbitrary code execution" as the attack mechanism.