LiteLLM Compromised by Credential Stealer

42 points by Cajunvoodoo


simonw

This one is really bad. It was only live on PyPI for about an hour as far as I can tell before it was quarantined there, but it's an unpinned dependency of a bunch of downstream projects (like DSPy) and has more than 3 million daily downloads so that's still enough time to steal a whole lot of credentials.

I found good details about this in this issue opened against LiteLLM itself.

Like most people, I still run development environments directly on my Mac. I would have been hit by this one really badly if I'd installed that package while the vulnerability was live. Maybe this will be the thing that convinces me to figure out a good local sandboxing strategy!

dvogel

Nice clear write-up with clear indicators of compromise. It was nice to not have to read through 3 paragraphs of fluff about their expertise and process.

akavel

What seems to be a reconstructed timeline of the attack:

https://ramimac.me/trivy-teampcp/

Personally, I find it both a fascinating and scary read.

Sanity

only discovered because a bug created a fork bomb – how many went undiscovered? :-S

jiangplus

I wish there is something like LavaMoat everywhere

https://github.com/LavaMoat/LavaMoat

fiatjaf

So any Python package that gets installed on any project for any reason can come with a ".pth" file that is executed automatically whenever you run any Python? Isn't this crazy?

Almost as bad as npm postinstall scripts.

Is there any sane package manager out there in any language that only downloads source code instead of executing stuff arbitrarily?