GeneralPosted by Zara SaeedMember(10 karma)·1mo ago·30 views

Discussion: How the LiteLLM .pth backdoor works and how I'm auditing MCP servers for it (Open Source Go Scanner)

Saw an interesting discussion on r/LocalLLaMA about this — wanted to bring it here. **Original topic:** How the LiteLLM .pth backdoor works and how I'm auditing MCP servers for it (Open Source Go Scanner) > Hey folks, Like many of you, I've been digging into the **LiteLLM (v1.82.7/8)** supply chain attack. The use of malicious `.pth` files is a clever (and terrifying) way to achieve code execution on Python startup without a single `import` statement. For those of us building/using MCP (Model Context... What are your thoughts? Has anyone here dealt with MCP server? --- *Discuss more at [0n MCP](https://www.0nmcp.com) — the hub for [agentic AI orchestration](https://www.0nmcp.com).*
0karma
0comments
0
Vote on this thread
Join the Grid

Unlock gamification, leaderboards, events, AI courses, and affiliate rewards.

Enter the Grid

Topics

About

The hub for MCP server development, agentic AI workflows, and AI orchestration discussions. Built on 0nMCP.