Install-Time Execution Expands Supply-Chain Blast Radius
Sources: 1 • Confidence: Medium • Updated: 2026-04-12 10:19
Key takeaways
- A malicious payload placed in a Python .pth file can execute upon installation of the package, even if the package is never imported.
- LiteLLM v1.82.7 contained an exploit located in proxy/proxy_server.py that required importing the package to take effect.
- When installed on a system, the credential stealer attempts to collect secrets from locations including SSH keys, Git credentials, AWS and Kubernetes config, and shell history files.
- A referenced issue contains a detailed description of the credential stealer’s behavior, and a separate source describes the exploit timeline.
- Stolen PyPI credentials were used to publish vulnerable LiteLLM packages.
Sections
Install-Time Execution Expands Supply-Chain Blast Radius
- A malicious payload placed in a Python .pth file can execute upon installation of the package, even if the package is never imported.
Version-Specific Activation Conditions Affect Exposure Analysis
- LiteLLM v1.82.7 contained an exploit located in proxy/proxy_server.py that required importing the package to take effect.
Credential Harvesting Targets Common Developer And Cloud Secret Stores
- When installed on a system, the credential stealer attempts to collect secrets from locations including SSH keys, Git credentials, AWS and Kubernetes config, and shell history files.
Verification And Scoping Depend On External Forensic/Timeline Detail
- A referenced issue contains a detailed description of the credential stealer’s behavior, and a separate source describes the exploit timeline.
Account Compromise Can Bypass Normal Trust Signals In Package Publishing
- Stolen PyPI credentials were used to publish vulnerable LiteLLM packages.
Unknowns
- Which exact LiteLLM versions/releases were compromised, and which ones used install-time (.pth) execution versus import-time execution?
- What is the exact exploit timeline (first malicious publish time, detection time, removal/mitigation time) described by the separate source?
- What are the concrete indicators of compromise (file hashes, domains/IPs contacted, process behaviors) described in the referenced issue?
- Did the credential stealer successfully exfiltrate secrets (and to where), or is the corpus only describing attempted collection?
- How were the PyPI credentials obtained (phishing, token leak, CI secret exposure), and what preventive control failed?