LiteLLM versions 1.82.7 and 1.82.8 on PyPI contain a malicious `.pth` file that executes a credential-stealing payload automatically on every Python interpreter start — no import required. The payload collects SSH keys, environment variables (capturing API keys and tokens), git credentials, and cloud provider configs, then exfiltrates them. Any developer or AI pipeline with litellm in its dependency tree should audit immediately and rotate credentials.
Safety
Tell HN: Litellm 1.82.7 and 1.82.8 on PyPI are compromised
Malicious .pth files in LiteLLM 1.82.7 and 1.82.8 (PyPI) automatically steal SSH keys, API tokens, and cloud credentials from any dependent Python project.
Wednesday, March 25, 2026 12:00 PM UTC2 MIN READSOURCE: Hacker NewsBY sys://pipeline
Tags
safety
/// RELATED
Infrastructure6d ago
Linux 7.0 Broke PostgreSQL: The Preemption Regression Explained
A 50% PostgreSQL performance cliff on Linux 7.0: AWS engineer traces the regression to the kernel's removal of PREEMPT_NONE and its clash with spinlock-based buffer management.
Policy4d ago
For Linux kernel vulnerabilities, there is no heads-up to distributions
Critical Linux kernel LPE (CopyFail) disclosed without advance notice to distributions, breaking the standard coordinated vulnerability disclosure process for patch planning.