FutureSearch

107 posts

FutureSearch banner
FutureSearch

FutureSearch

@FUTURESEARCHAI

Building AI to understand AI.

เข้าร่วม Şubat 2024
252 กำลังติดตาม352 ผู้ติดตาม
FutureSearch
FutureSearch@FUTURESEARCHAI·
Callum's minute-by-minute transcript of discovering the LiteLLM supply chain attack is on the front page of Hacker News. The entire attack was caught because of a single missing flag (-S) in the malware's subprocess call. Claude Code session ⬇️
English
1
2
3
473
Daniel Hnyk
Daniel Hnyk@hnykda·
So let me get this straight: we at @FUTURESEARCHAI discover the litellm supply chain attack, report it to PyPI, open the disclosure issue on GitHub, and... @github bans my account? What the hell!?
English
14
49
934
69.6K
FutureSearch รีทวีตแล้ว
Nikos Bosse
Nikos Bosse@nikosbosse·
He published a minute-to-minute account of how it went down and how he and Claude figured this out (with Claude first blaming itself for the issue) futuresearch.ai/blog/litellm-a…
English
0
3
3
265
FutureSearch รีทวีตแล้ว
Nikos Bosse
Nikos Bosse@nikosbosse·
I think a lot of people got very lucky that the litellm attackers accidentally incorporated a fork bomb in their attack and that Callum was so prescient to check htop and take a picture when it happened.
English
1
2
16
1.6K
The Hacker News
The Hacker News@TheHackersNews·
🛑 Malicious LiteLLM versions 1.82.7–1.82.8 deploy credential theft, Kubernetes lateral movement, and a persistent backdoor. Linked to the Trivy CI/CD compromise, the payload runs on import or via .pth at Python startup, spreads across nodes, and installs a systemd service. 🔗 Full story → thehackernews.com/2026/03/teampc…
The Hacker News tweet media
English
7
64
180
20.8K
FutureSearch
FutureSearch@FUTURESEARCHAI·
@pvergadia Daniel is our VP of Eng! The malware triggered for one of our developers within a plugin he was developing for Cursor, and the Mac system notifications sent big warnings about network access. Small follow-up here futuresearch.ai/blog/no-prompt…
English
0
0
1
29
Priyanka Vergadia
Priyanka Vergadia@pvergadia·
BREAKING: We gave AI agents keys to everything. Then we forgot to lock the door behind us. LiteLLM v1.82.8 stole credentials from thousands of AI apps. Silently. Automatically. While the agent kept running. This is the threat model nobody wants to talk about: → Agents are trusted by design, that's the whole point → They hold OAuth tokens, API keys, cloud credentials, DB passwords → They run 24/7 with no human watching → Their dependencies update automatically → And they have permission to take actions in the real world A human getting phished loses their credentials. An agent getting compromised loses its credentials and keeps acting on your behalf. The surface area of an AI agent isn't the model. It's every package, every tool call, every MCP server, every dependency it touches. Security was an afterthought. Agents are shipping to production now. We haven't solved human-scale identity theft. We just gave attackers an automated, always-on, fully-credentialed version of your employees to compromise instead. The LiteLLM attack is a warning shot.
Daniel Hnyk@hnykda

LiteLLM HAS BEEN COMPROMISED, DO NOT UPDATE. We just discovered that LiteLLM pypi release 1.82.8. It has been compromised, it contains litellm_init.pth with base64 encoded instructions to send all the credentials it can find to remote server + self-replicate. link below

English
25
28
176
42.1K
FutureSearch รีทวีตแล้ว
Daniel Hnyk
Daniel Hnyk@hnykda·
Our colleague @@Callum_McMahon_ was testing a Cursor MCP plugin that pulled in litellm as a transitive dependency. His 48GB Mac Pro ground to a halt. The cause: a base64-encoded payload hidden in litellm 1.82.8 that exfiltrates every credential it can find.futuresearch.ai/blog/no-prompt…
English
1
2
28
9.3K
FutureSearch รีทวีตแล้ว
Daniel Hnyk
Daniel Hnyk@hnykda·
@elonmusk We at futuresearch were the ones reporting this yesterday, this was a big one, we checked the numbers and there were 47k downloads in 46 minutes while the package was up: futuresearch.ai/blog/litellm-h…
English
0
3
8
390
FutureSearch
FutureSearch@FUTURESEARCHAI·
@awagents One of our engineers was credited by PyPI for first reporting the supply chain attack on LiteLLM. Happy to connect if you're doing additional coverage! hello@futuresearch.ai
English
0
0
2
28
FutureSearch
FutureSearch@FUTURESEARCHAI·
@fahdmirza One of our engineers was credited by PyPI for reporting the attack. Happy to connect if you're doing further coverage of this story: hello@futuresearch.ai
English
0
0
3
30
Fahd Mirza
Fahd Mirza@fahdmirza·
⚠️ LiteLLM Has Been COMPROMISED 🚨 ♠ And it could have silently stolen everything on your machine 😱 🔹 97 million monthly downloads — one poisoned package 🔹 Steals SSH keys, AWS/GCP/Azure creds, API keys, crypto wallets & more 🔹 Runs automatically — no import needed, triggers on every Python startup 🔹 Spreads through transitive deps — DSPy, MCP plugins & more all affected 🔹 Only discovered because the malware had a bug — otherwise undetected for weeks 🔥 Watch the full breakdown + remediation steps below 👇
English
2
4
8
1.2K
FutureSearch
FutureSearch@FUTURESEARCHAI·
@ReversingLabs One of our engineers - Callum - was credited with first reporting this to PyPI! Reach out if you're doing further coverage - hello@futuresearch.ai
English
0
0
0
12
ReversingLabs
ReversingLabs@ReversingLabs·
What started as a compromise of Checkmarx Open VSX plugins on npm has now spread to PyPI and is targeting LiteLLM. See RL's full post on the evolution to the TeamPCP supply chain attack 👉reversinglabs.com/blog/teampcp-s…
English
1
2
5
234
ReversingLabs
ReversingLabs@ReversingLabs·
👁️ Be on the look out for compromised versions 1.82.7 and 1.82.8 of the "litellm" PyPI package, which has more than 479 million downloads 🧵👇 secure.software/pypi/packages/…
English
4
6
12
1.1K
FutureSearch
FutureSearch@FUTURESEARCHAI·
@ramimacisabird Read the Wiz piece! One of our engineers was credited by PyPI for reporting the attack. Happy to connect and provide details for any further coverage if useful: hello@futuresearch.ai
English
1
0
1
100
FutureSearch รีทวีตแล้ว
Daniel Hnyk
Daniel Hnyk@hnykda·
My awesome colleague Callum McMahon, who discovered this, wrote an explainer and postmortem going into greater detail: futuresearch.ai/blog/no-prompt…
English
2
39
291
68.3K
FutureSearch รีทวีตแล้ว
Daniel Hnyk
Daniel Hnyk@hnykda·
Oh, it just got worse. The [public github issue](github.com/BerriAI/litell…) has been closed as "not planned" by the owner, so they likely have been fully compromised.
English
20
89
977
241.6K
FutureSearch รีทวีตแล้ว
Daniel Hnyk
Daniel Hnyk@hnykda·
LiteLLM HAS BEEN COMPROMISED, DO NOT UPDATE. We just discovered that LiteLLM pypi release 1.82.8. It has been compromised, it contains litellm_init.pth with base64 encoded instructions to send all the credentials it can find to remote server + self-replicate. link below
English
301
2.3K
9.4K
5.5M
FutureSearch รีทวีตแล้ว
Tom Liptay
Tom Liptay@TLiptay·
I updated our play money AI Kalshi trader. Summary: Feb 26: $100,000 Mar 5 after selling: $101, 044 Mar 13 after selling: $102,122 Mar 13 after buying: $101,486 For updates we: 1) Forecast. 2) Handle market resolutions. 3) Sell over-priced positions. 4) Set target buy positions. 5) Buy using the order book. This past week saw: - 7 resolutions (we had 3 winners, 4 losers) - 4 sales - 19 buys - Ending cash $24k
English
1
1
4
274
FutureSearch รีทวีตแล้ว
Nikos Bosse
Nikos Bosse@nikosbosse·
How predictable are the Oscars? We researched 5,298 award winners spanning 26 years of ceremony data (2000–2025) and 15 different awards leading up to the Oscars.
Nikos Bosse tweet media
English
1
1
3
155