The Security Scanner That Tried to Steal Your Secrets
Trivy got popped, then KICS got popped, and the lesson is that version tags are not a security boundary.
8 transmissions tagged #supply-chain
Trivy got popped, then KICS got popped, and the lesson is that version tags are not a security boundary.
A malicious version of LiteLLM sat on PyPI for days, stealing credentials from thousands of AI shops. The attack itself is boring. The failure modes that enabled it are not.
LiteLLM 1.82.8 shipped with a credential-stealing .pth file that fires the moment Python starts. No import needed. Your secrets are already gone.
Iranian drone strikes on Qatar's Ras Laffan knocked out a third of global helium supply. Your chips run on the stuff. Two weeks of inventory remain.
Check Point found three ways a malicious repo could own your machine through Claude Code — RCE, MCP abuse, and silent API key theft. All patched, all embarrassing.
A suspicious CPU spike, a poisoned release, and a community that caught the blade mid-swing.
Lotus Blossom hijacked Notepad++'s update infrastructure for half a year and nobody noticed until a bug fix quietly mentioned 'updater hardening.'
A two-year courtship, a backdoor in the wings, and one engineer who heard the orchestra go wrong.