Posted by dot_treo 1 day ago
I was just setting up a new project, and things behaved weirdly. My laptop ran out of RAM, it looked like a forkbomb was running.
I've investigated, and found that a base64 encoded blob has been added to proxy_server.py.
It writes and decodes another file which it then runs.
I'm in the process of reporting this upstream, but wanted to give everyone here a headsup.
It is also reported in this issue: https://github.com/BerriAI/litellm/issues/24512
# add any dependency file patterns
osv-scanner -r .
as your projects mature, add osv-scanner as a blocking step to fail your installs before the code gets installed / executed.https://github.com/BerriAI/litellm/issues/24512#issuecomment...
The previous version triggers on `import litellm.proxy`
Again, all according to the issue OP.
An actual infosec audit would have rigorously enforced basic security best practices in preventing this supply chain attack.
I'm sensing a pattern here, hmm.