Reddit Programming
201 subscribers
1.22K photos
126K links
I will send you newest post from subreddit /r/programming
Download Telegram
Malicious litellm 1.82.8: Credential Theft and Persistent Backdoor
https://www.reddit.com/r/programming/comments/1s2h4by/malicious_litellm_1828_credential_theft_and/

<!-- SC_OFF -->litellm, a famous python package got compromised and it executes on your system without even importing it — cloud creds, SSH keys, K8s secrets, crypto wallets, env vars and what not, all exfiltrated to the attacker's server. Full technical analysis: https://safedep.io/malicious-litellm-1-82-8-analysis/ <!-- SC_ON --> submitted by /u/No_Plan_3442 (https://www.reddit.com/user/No_Plan_3442)
[link] (https://safedep.io/malicious-litellm-1-82-8-analysis/) [comments] (https://www.reddit.com/r/programming/comments/1s2h4by/malicious_litellm_1828_credential_theft_and/)
Litellm 1.82.7 and 1.82.8 on PyPI are compromised, do not update!
https://www.reddit.com/r/programming/comments/1s2h8lt/litellm_1827_and_1828_on_pypi_are_compromised_do/

<!-- SC_OFF -->We just have been compromised, thousands of peoples likely are as well, more details updated IRL at the link Update: Callum McMahon, who discovered this, wrote an explainer and postmortem going into greater detail: https://futuresearch.ai/blog/no-prompt-injection-required <!-- SC_ON --> submitted by /u/ddp26 (https://www.reddit.com/user/ddp26)
[link] (https://futuresearch.ai/blog/litellm-pypi-supply-chain-attack/) [comments] (https://www.reddit.com/r/programming/comments/1s2h8lt/litellm_1827_and_1828_on_pypi_are_compromised_do/)
Why Raft can’t safely commit old-term entries — from an implementation/debugging perspective
https://www.reddit.com/r/programming/comments/1s32qin/why_raft_cant_safely_commit_oldterm_entries_from/

<!-- SC_OFF -->I recently finished the MIT distributed systems labs and wrote up one Raft rule that took me some time to fully understand: why a leader cannot safely commit old-term entries just because they’re replicated on a majority. When reading the paper, this can feel like a detail you just accept and move on from. But during implementation/debugging, it becomes much more concrete. You start seeing why “replicated on a majority” is not enough by itself, and why the current-term restriction matters for safety. I tried to explain it from the perspective of someone implementing and debugging Raft, not just restating the theory. Article: https://abdellani.dev/posts/2026-03-23-why-raft-cant-safely-commit-old-term-entries/ I’d be curious how this clicked for others:
did it make sense immediately from the Raft paper, or only after implementing/debugging it? <!-- SC_ON --> submitted by /u/am0123 (https://www.reddit.com/user/am0123)
[link] (https://abdellani.dev/posts/2026-03-23-why-raft-cant-safely-commit-old-term-entries/) [comments] (https://www.reddit.com/r/programming/comments/1s32qin/why_raft_cant_safely_commit_oldterm_entries_from/)
How the TeamPCP attack exploited CI/CD pipelines and trusted releases to release infected Trivy and LiteLLM packages
https://www.reddit.com/r/programming/comments/1s35ohw/how_the_teampcp_attack_exploited_cicd_pipelines/

<!-- SC_OFF -->TeamPCP attack shows how CI/CD can be abused by compromised pipelines to compromised repos to push out infostealers in the packages. Most notable ones were Aquasec's entire GitHub acc including Trivy repo and LiteLLM python package. <!-- SC_ON --> submitted by /u/raptorhunter22 (https://www.reddit.com/user/raptorhunter22)
[link] (https://thecybersecguru.com/news/teampcp-supply-chain-attack/) [comments] (https://www.reddit.com/r/programming/comments/1s35ohw/how_the_teampcp_attack_exploited_cicd_pipelines/)
GitHub will use your repos to train AI models
https://www.reddit.com/r/programming/comments/1s45lme/github_will_use_your_repos_to_train_ai_models/

<!-- SC_OFF --> Important update On April 24 we'll start using GitHub Copilot interaction data for AI model training unless you opt out. Remember to opt-out fellows engineers. Important correction: As many of you noted, the title of the post is misleading. This update will impact only "GitHub Copilot interaction" and not "all your repos". Direct opt out link: Direct opt out link <!-- SC_ON --> submitted by /u/Ok-Lifeguard-9612 (https://www.reddit.com/user/Ok-Lifeguard-9612)
[link] (https://github.com/) [comments] (https://www.reddit.com/r/programming/comments/1s45lme/github_will_use_your_repos_to_train_ai_models/)
My Story with Programming Languages
https://www.reddit.com/r/programming/comments/1s4d2ce/my_story_with_programming_languages/

<!-- SC_OFF -->Hi there! I’m glad to share my story with programming languages, from age 16 to now, with you! <!-- SC_ON --> submitted by /u/Ok-Razzmatazz-6125 (https://www.reddit.com/user/Ok-Razzmatazz-6125)
[link] (https://github.com/shd101wyy/Yo/blob/develop/docs/en-US/MY_STORY_WITH_PROGRAMMING_LANGUAGES.md) [comments] (https://www.reddit.com/r/programming/comments/1s4d2ce/my_story_with_programming_languages/)