The sha-rust crate was identified as malicious and removed from crates.io. Analysis of the source code, retrieved from external security research, reveals a malicious function named constructor within src/lib.rs. This function is not explicitly called by a user of the library, but is instead designed to execute automatically upon the library being loaded into an application, a side-effect of the #[ctor::ctor] attribute. The function's sole purpose is to steal sensitive credentials. It searches for configuration and credential files for popular cloud and container services, reads their contents, and sends them to a remote server controlled by the attacker. Therefore, any application that includes this crate as a dependency would be compromised, and the constructor function would appear in a runtime profile during the application's startup phase.