Publication Channel Risk And Documentation Pointers
Sources: 1 • Confidence: Medium • Updated: 2026-04-13 03:53
Key takeaways
- The document states that stolen PyPI credentials were used to publish the vulnerable LiteLLM packages to PyPI.
- In the compromised LiteLLM package, a malicious payload placed in a Python .pth file can execute upon installation, without requiring any import of the litellm module.
- LiteLLM v1.82.7 contained an exploit located in proxy/proxy_server.py that required importing the package to take effect.
- The credential stealer attempts to collect secrets from common locations including SSH keys, Git credentials, AWS configuration, Kubernetes configuration, and shell history files on systems where the compromised package is installed.
- The document indicates there is an issue describing the credential stealer’s behavior in detail and a separate source describing the exploit timeline.
Sections
Publication Channel Risk And Documentation Pointers
- The document states that stolen PyPI credentials were used to publish the vulnerable LiteLLM packages to PyPI.
- The document indicates there is an issue describing the credential stealer’s behavior in detail and a separate source describing the exploit timeline.
Install-Time Execution Via Python Packaging (.Pth)
- In the compromised LiteLLM package, a malicious payload placed in a Python .pth file can execute upon installation, without requiring any import of the litellm module.
Version Scope And Activation Conditions Differ Across Releases
- LiteLLM v1.82.7 contained an exploit located in proxy/proxy_server.py that required importing the package to take effect.
Credential Theft Targets And Impact Surface
- The credential stealer attempts to collect secrets from common locations including SSH keys, Git credentials, AWS configuration, Kubernetes configuration, and shell history files on systems where the compromised package is installed.
Unknowns
- Which exact LiteLLM versions and package artifacts were compromised, and over what exact time window were they available for installation?
- What are the definitive indicators of compromise (file paths, hashes, domains/IPs, process behaviors) for the .pth-based install-time payload and any import-time payload variants?
- Did the credential stealer successfully exfiltrate secrets from any environments, and if so, what was the exfiltration mechanism and destination?
- How were the PyPI credentials obtained (phishing, malware on maintainer machine, token leakage, CI compromise), and what controls failed?
- What is contained in the referenced issue and the separate exploit timeline source, and do they provide primary evidence supporting the behavioral and publication claims?