21CTO
21CTO
Mar 25, 2026 · Information Security

How a Supply‑Chain Attack Compromised LiteLLM and Stole Every Credential

A supply‑chain breach of the popular LiteLLM Python library injected malicious .pth files that silently harvest SSH keys, cloud credentials, and other secrets, deploy persistent backdoors, and spread through downstream packages, prompting urgent detection and remediation steps for developers.

DevOps SecurityLiteLLMMalware
0 likes · 8 min read
How a Supply‑Chain Attack Compromised LiteLLM and Stole Every Credential
Ops Development & AI Practice
Ops Development & AI Practice
Sep 2, 2025 · Information Security

How a Tiny XSS Bug in Dev Environments Can Compromise Production Secrets

The article reveals how a seemingly harmless XSS flaw in an internal development platform can be weaponized to steal high‑privilege credentials, pivot across internal services, and ultimately breach production systems, urging teams to treat development environments as critical security frontiers.

Application SecurityDevOps SecurityInfrastructure
0 likes · 9 min read
How a Tiny XSS Bug in Dev Environments Can Compromise Production Secrets
Programmer DD
Programmer DD
Aug 5, 2020 · Information Security

Massive Source Code Leak Exposes Hundreds of Companies – What Went Wrong?

Recent misconfigurations in DevOps tools led to a massive leak of source code from dozens of major tech, finance, and manufacturing firms—including Microsoft, Adobe, Nintendo, and Lenovo—prompting security experts to warn of hard‑coded credentials, legal risks, and the urgent need for robust DevSecOps practices.

DevOps SecurityDevSecOpsGitLab
0 likes · 5 min read
Massive Source Code Leak Exposes Hundreds of Companies – What Went Wrong?