A critical vulnerability in Marimo's reactive Python notebook is being exploited by hackers to deploy a new variant of NKAbuse malware, which is hosted on Hugging Face Spaces. This vulnerability allows attackers to execute arbitrary code, enabling them to spread malware. The NKAbuse malware is being used to compromise systems, with the Marimo flaw serving as the initial entry point. The fact that Hugging Face Spaces is being used to host the malware adds a new layer of complexity to the threat landscape1. The use of Hugging Face, a popular platform for machine learning models, highlights the potential risks associated with relying on third-party services. This incident underscores the importance of monitoring and securing dependencies in software development. The exploitation of this vulnerability matters to practitioners because it highlights the need to assess the security of their environment, particularly when using third-party services like Hugging Face.