By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: PyPI Supply Chain Attack Compromises LiteLLM, Enabling the Exfiltration of Sensitive Information
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > News > PyPI Supply Chain Attack Compromises LiteLLM, Enabling the Exfiltration of Sensitive Information
News

PyPI Supply Chain Attack Compromises LiteLLM, Enabling the Exfiltration of Sensitive Information

News Room
Last updated: 2026/03/31 at 6:25 PM
News Room Published 31 March 2026
Share
PyPI Supply Chain Attack Compromises LiteLLM, Enabling the Exfiltration of Sensitive Information
SHARE

Discovered by FutureSearch researcher Callum McMahon, a supply chain attack against LiteLLM on PyPI resulted in over 40 thousand downloads of a compromised version that installed a malicious payload capable of harvesting and exfiltrating sensitive information. LiteLLM is downloaded roughly 3 million times per day.

As Andrej Karpathy noted on X, the malware was capable to exfiltrate SSL and SSH keys, Cloud provider credentials, Kubernetes configurations, Git credentials, API keys, shell history, crypto wallets, and many other kinds of secrets.

As McMahon explains, the attack affected the litellm 1.82.8 package:

It started with my machine stuttering hard, something that really shouldn’t be happening on a 48GB Mac. htop taking 10s of seconds to load, CPU pegged at 100%, all signs I’ll be working on my local env for a while… After failing to software reset my Mac, I took a final picture for evidence and hard reset.

After promptly reporting the compromised package to the PyPI security team and the LiteLLM maintainers, the affected package where quarantined within approximately 40 minutes. However, the risk extended further, as any packages depending on litellm version 1.82.8 were also indirectly compromised.

According to McMahon, all it took for his system to be compromised was launching a local MCP server through Cursor. This triggered the download of the latest LiteLLM package, which happened to have been compromised just minutes earlier. However, a flaw in the implementation of the malware itself caused the LiteLLM process to recursively fork, eventually bringing McMahon’s system to a complete halt:

The .pth launcher spawns a child Python process via subprocess.Popen, but because .pth files trigger on every interpreter startup, the child re-triggers the same .pth — creating an exponential fork bomb that crashed the machine.

Without this mistake in the implementation, the malware would have gone unnoticed for much longer, noted Karpathy, with much greater damage.

Point Wild, provider of AI-powered cybersecurity, has open-sourced a dependency scanner to help developers assess the impact on their dependencies. The tool, who-touched-my-packages (wtmp), combines behavioral analysis and AI-driven detection to flag zero-day supply-chain threats, going beyond the coverage offered by conventional vulnerabilities checkers.

FutureSearch released a litellm-checker tool to help package maintainers determine whether their projects were impacted by the supply chain attack.

The LiteLLM team reported that the supply chain attack was enabled by a vulnerability in Trivy, which made it possible for the attackers to gain unauthorized access to the LiteLLM publishing pipeline.

For additional details on the supply chain attack and the malicious payload deployed by the malware, see McMahon’s original post and Snyk’s detailed analysis.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Robotaxi companies refuse to say how often their AVs need remote help |  News Robotaxi companies refuse to say how often their AVs need remote help | News
Next Article xx-fractional-scale-v2 Aims To Improve Wayland Fractional Scaling xx-fractional-scale-v2 Aims To Improve Wayland Fractional Scaling
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

How to Build a Social Media Marketing Strategy in 2025 Effectively
Computing
High Court dismisses judicial review against eVisa system | Computer Weekly
High Court dismisses judicial review against eVisa system | Computer Weekly
News
Best AirPods deals you can still shop from Amazon Big Spring Sale: AirPods Pro 3 for under 0
Best AirPods deals you can still shop from Amazon Big Spring Sale: AirPods Pro 3 for under $200
News
Google finally lets you ditch that embarrassing old Gmail username, here’s how to do it
Google finally lets you ditch that embarrassing old Gmail username, here’s how to do it
Gadget

You Might also Like

High Court dismisses judicial review against eVisa system | Computer Weekly
News

High Court dismisses judicial review against eVisa system | Computer Weekly

10 Min Read
Best AirPods deals you can still shop from Amazon Big Spring Sale: AirPods Pro 3 for under 0
News

Best AirPods deals you can still shop from Amazon Big Spring Sale: AirPods Pro 3 for under $200

5 Min Read
The Galaxy S26’s photo app can sloppify your memories
News

The Galaxy S26’s photo app can sloppify your memories

11 Min Read
4 Budget-Friendly Laptops More Powerful Than The MacBook Air – BGR
News

4 Budget-Friendly Laptops More Powerful Than The MacBook Air – BGR

11 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?