最新上传的LiteLLM Python 版本1.82.7和1.82.8,已被人为恶意植入信息窃取程序。 一旦安装,SSH密钥、AWS凭证和API密钥等数据均会立即泄漏。 目前LiteLLM的维护者Krrish Dholakia,已经公开证实此事。 在恶意版本存在三小时后,PyPI迅速发现了这一漏洞,并将软件包隔离。
慢雾首席信息安全官 23pds 发推表示,月下载量高达 9700 万次的 Python AI 网关库 LiteLLM 遭遇 PyPI 供应链攻击,攻击者通过 pip install litellm 指令即可在用户设备上窃取敏感信息。可窃取的敏感数据包括:SSH 密钥、云服务凭据(AWS / GCP / Azure)、Kubernetes 配置文件、Git ...
至顶头条 on MSN
npm供应链蠕虫病毒持续蔓延,窃取开发者敏感数据
又一起npm供应链攻击正在蔓延,恶意软件以蠕虫方式感染与Namastex Labs相关的多个npm包,窃取开发者环境中的令牌、API密钥、SSH密钥及云服务凭证,并将数据外传至ICP容器端点。该攻击具备自我传播能力,可识别受害者有权发布的包并注入恶意代码重新发布,还可横向感染PyPI包。安全厂商Socket指出,此次攻击与上月TeamPCP发动的CanisterWorm攻击高度重叠。
Self-propagating npm worm steals tokens via postinstall hooks, impacting six packages and expanding supply chain attacks.
Andrej Karpathy, the former Tesla AI director and OpenAI cofounder, is calling a recent Python package attack \"software horror\"—and the details are ge.
ThreatsDay Bulletin: active exploits, supply chain attacks, AI abuse, and stealth data risks observed this week.
Yet another npm supply-chain attack is worming its way through compromised packages, stealing secrets and sensitive data as ...
A new supply chain attack targeting the Node Package Manager (npm) ecosystem is stealing developer credentials and attempting to spread through packages published from compromised accounts.
Checkmarx suffers a second supply chain attack in a month, resulting in hackers injecting credential-stealing malware into ...
An attack on the open-source library for connecting to LLMs has apparently occurred, allowing two compromised packages to steal credentials. The LiteLLM development team has announced a security ...
29 天on MSN
担心的事还是发生了,真有人给龙虾“投毒”
如果你最近在用OpenClaw跑Agent、装Skill,或者即便只是正常装了几个常见依赖,那你可得好好注意了! 今日,资深开发者Daniel Hnyk在社交平台X上紧急发文警告称:LiteLLM的PyPI官方发布版本1.82.8已被注入恶意代码,并着重强调“DONOTUPDATE”(请勿更新)。
一些您可能无法访问的结果已被隐去。
显示无法访问的结果