In hindsight: a bad choice of a hero message

Reddit r/LocalLLaMA / 3/25/2026

📰 NewsDeveloper Stack & InfrastructureSignals & Early TrendsTools & Practical Usage

Key Points

  • LiteLLM versions 1.82.7 and 1.82.8 were compromised for a three-hour window on PyPI, with downloads reaching millions per day, potentially affecting many AI agent projects.
  • The attacker chain involved compromising the Trivy security scanner first, then using the leaked PyPI token to publish poisoned LiteLLM packages.
  • Version 1.82.8 contained a malicious .pth payload that executes on Python startup, meaning the backdoor could run even during routine pip usage.
  • The report recommends immediate incident steps for affected users, including checking for backdoors at a specific local path, rotating all credentials, and hunting for suspicious Kubernetes pods.
  • The safe remediation is to downgrade to any LiteLLM version ≤ 1.82.6 and treat installed 1.82.7/1.82.8 as potentially fully compromised.
In hindsight: a bad choice of a hero message

If you haven't heard, two versions of LiteLLM got hacked yesterday (1.82.7 and 1.82.8)

That means tons of AI agent projects got compromised if they installed during those 3 hours

Live on PyPI for 3 hours. Downloaded 3.4 million times per day.

Stole SSH keys, credentials, secrets, API keys and crypto wallet seed phrases.

How it happened:

Attackers compromised Trivy (a security scanner) first. When LiteLLM's CI ran Trivy, it leaked their PyPI token. With that token, they published the poisoned versions.

Worst part: version 1.82.8 used a .pth file. The malicious code ran every time Python started. Even when you just ran pip.

There's a few articles popping up about this (and posts here on reddit). Quite a huge deal, as MANY agent toolkits (even one I'm making in a personal project) use LiteLLM behind the scenes.

If you installed either version:

  1. Check for backdoors at ~/.config/sysmon/sysmon.py
  2. Rotate every credential on that machine
  3. Check for suspicious pods: kubectl get pods -A | grep node-setup-

Safe version: anything ≤ 1.82.6

submitted by /u/jakecoolguy
[link] [comments]