Active Supply-Chain Compromise Confirmation And Escalation Path
Sources: 1 • Confidence: High • Updated: 2026-04-12 10:20
Key takeaways
- The malicious package version litellm==1.82.8 was live on PyPI at the time described in the source.
- McMahon used Claude conversation transcripts to confirm the vulnerability and decide on response actions.
- The litellm-1.82.8 wheel contained a file named litellm_init.pth with size 34628 bytes.
- Anyone installing or upgrading litellm while the malicious 1.82.8 release is live is expected to be infected.
- The beginning of litellm_init.pth contains code that spawns a Python subprocess to base64-decode and execute embedded payload content.
Sections
Active Supply-Chain Compromise Confirmation And Escalation Path
- The malicious package version litellm==1.82.8 was live on PyPI at the time described in the source.
- Callum McMahon reported the LiteLLM malware attack to PyPI.
- A fresh download from PyPI was tested in an isolated Docker container to confirm the compromise.
- The source recommends reporting the incident immediately to security@pypi.org.
Llm-Assisted Incident Response Workflow And Transparency
- McMahon used Claude conversation transcripts to confirm the vulnerability and decide on response actions.
- After confirming malicious code in an isolated Docker container, Claude suggested using the PyPI security contact address.
- McMahon used the claude-code-transcripts tool to publish the conversation transcript.
Forensic Indicators And Execution Mechanism In The Compromised Artifact
- The litellm-1.82.8 wheel contained a file named litellm_init.pth with size 34628 bytes.
- The beginning of litellm_init.pth contains code that spawns a Python subprocess to base64-decode and execute embedded payload content.
Risk Expectation About Infection On Install/Upgrade
- Anyone installing or upgrading litellm while the malicious 1.82.8 release is live is expected to be infected.
Unknowns
- Was litellm==1.82.8 yanked/removed from PyPI, and if so, when relative to the report?
- What is the full decoded payload content and what actions does it perform post-execution (e.g., persistence, exfiltration, lateral movement)?
- Does the malicious behavior execute automatically on standard installation/upgrade paths across common environments, or only under specific conditions?
- Are other LiteLLM versions, distributions (wheel vs other artifacts), or related packages affected beyond litellm==1.82.8?
- How widely was the compromised artifact downloaded/installed during the live period (approximate download counts, impacted organizations)?