17 comments

  • wlkr 13 minutes ago
    This might just be the frequency illusion at play, but there seem to have been a number of high-profile supply chain attacks of late in major packages. There are several articles on the first few pages of HN right now with different cases.

    Looking back ten years to `left-pad`, are there more successful attacks now than ever? I would suspect so, and surely the value of a successful attack has also increased, so are we actually getting better as a broad community at detecting them before package release? It's a complex space, and commercial software houses should do better, but it seems that whilst there are some excellent commercial products (e.g. CI scan tools), generally accessible, idiot friendly tooling is somewhat lacking for projects which start as hobby/amateur code but end up being a dependency in many other projects.

    I've cross-posted my comment from the current SAP supply chain attack thread [0].

    [0]: https://news.ycombinator.com/item?id=47964003

    • JohnMakin 9 minutes ago
      People are ramming tons of code into places without ever looking at it, it would follow that supply chain attacks would increase thusly.
  • jackdoe 35 minutes ago
    I cant wait to have no dependencies.

    An extreme example is now when I make interactive educational apps for my daughter, I just make Opus use plain js and html; from double pendulums to fluid simulations, works one shot. Before I had hundreds of dependencies.

    Luckily with MIT licensed code I can just tell Opus to extract exactly the pieces I need and embed them, and tweaked for my usecase. So far works great for hobby projects, but hopefully in the future productions software will have no dependencies.

    • mandevil 3 minutes ago
      The problem with this is now you are solely responsible for managing all of the changes, all of the variation of life. Chrome changed the shape of this API, you are responsible for finding it and updating it. Morocco changed when their daylight savings took effect, now you need to update your date/time handling code. There are a lot of these things that we take for granted because our libraries handle it for us, and with no dependencies you have to do all the work. Not a big deal for making a double-pendulum simulator for your daughter to play with that will stop mattering next week, but is a concern for a company which is trying to build something that can run indefinitely into the future.
    • Aperocky 27 minutes ago
      I am torn because I like rust over go, and rust is better from an LLM perspective. But the dependency philosophy on rust is basically a security blackhole whereas go is much better.
      • kblissett 25 minutes ago
        I have found Go is an amazing language for LLMs. What do you prefer about Rust?
  • notatallshaw 3 minutes ago
    > Running pip install lightning is all that is needed to activate

    FYI, pip added cooldowns in 26.1:

      * https://discuss.python.org/t/announcement-pip-26-1-release/107108
      * https://ichard26.github.io/blog/2026/04/whats-new-in-pip-26.1/
    
    To use:

      * CLI: pip install --uploaded-prior-to=P1D ...
      * Env Var: PIP_UPLOADED_PRIOR_TO=P1D pip install ...
      * Config: pip config set global.uploaded-prior-to P1D
  • gcapu 4 minutes ago
    I just saw on Github this message from April 20 and I'm a bit confused.

    "deependujha hi @thebaptiste, thanks for inquiring. Release of 2.6.2 is blocked due to some internal reasons. Will notify once release is made. "

    I'd hate it if they knew of the problem that long ago and didn't warn until now. If someone has more info and can clarify I'd be thankful.

    https://github.com/Lightning-AI/pytorch-lightning/issues/216...

  • mkeeter 1 hour ago
    A repository search shows 2.2K repos with the text "A Mini Shai-Hulud has Appeared", all created within the past day:

    https://github.com/search?q=A%20Mini%20Shai-Hulud%20has%20Ap...

    • rhdunn 1 hour ago
      The repository names all look like two terms/words from dune (harkonen, mentat, ornithoptor, etc.) followed by a number. This would indicate that the account (possibly GitHub auth/actions token) has been compromised and then used to create the repository.
    • spate141 1 hour ago
      what's this all about?
      • foo12bar 1 hour ago
        FTFA

        > The attack steals credentials, authentication tokens, environment variables, and cloud secrets, while also attempting to poison GitHub repositories.

        • CodeAndCuffs 59 minutes ago
          That doesn't really explain why there is a bunch of GitHub repos created as well.

          If I remember correctly from Shai-Hulud 2, the attacker extricated creds by posting them in public github repos with minor easily reversible encryption. I believe it was double b64 last time.

          I'm assuming the logic there is that every security researcher and company is going to pull and scan those creds for their stuff and their clients' stuff. So the attacker is just 1 of N people downloading it. As opposed to trying to send it to their own machine directly.

          • arsome 35 minutes ago
            I think it's more about convenience and bypassing filters - developers are already logged in to github, already have access to create repos and publish code, firewalls will allow it. Even fancy HIDS systems will think the git push is rather normal.

            If they have a clue, the attacker still will not download that without using a botnet tunnel or Tor at a minimum.

            Note though that these credentials aren't even encrypted using some lightweight ECC to prevent others from capturing them, they're posted in cleartext. Embarassment might be part of the point.

      • progbits 1 hour ago
        Malware uploading the credentials it managed to steal
  • brahman81 35 minutes ago
    Thanks to the community for reporting the security issues with PyTorch Lightning 2.6.2 and 2.6.3 - we're actively looking into it.

    In the meantime, please use 2.6.1 until we publish 2.6.4.

    For more details: https://github.com/Lightning-AI/pytorch-lightning/security/a...

  • ks2048 28 minutes ago
    I'm curious what they do with various kinds of credentials if they get access.

    I can see trying to steal crypto, but what do they do if they get some AWS credentials? Try to run some crypto mining instances? Try to use your account for other types of crimes? Or is it mainly trying to steal data and then ask for ransoms?

    • bigfluffydonkey 14 minutes ago
      It's always crypto. A client got some AWS credentials stolen and without anyone checking the account, the hacker managed to spin up big EC2 instances across many regions. The bill after a month as I recall was around 100K. Since the activity was clearly fraudulent the bill was forgiven eventually. So remember to lock down your AWS keys permissions...
  • achandra03 1 hour ago
    Bless the Maker and His water.
  • 0fflineuser 54 minutes ago
    The nixpkg from unstable seems to be infected as it s 2.6.2 https://search.nixos.org/packages?channel=unstable&include_h...
    • minkowski 39 minutes ago
      Nixpkgs uses the GitHub source, not the PyPI dist, for lightning; unclear to me from the advisory whether this should also be considered compromised.
      • andymcsherry 15 minutes ago
        Andy from Lightning here. Thanks for pointing that out, we are updating the CVE. Only the versions from PyPi were affected. The malicious code was not checked into the GitHub repository
      • deforciant 15 minutes ago
        github is fine, the package was only pushed into pypi directly
  • upupupandaway 40 minutes ago
    Not a security guy here. How did the dependency get compromised, exactly? Did they submit a PR into the main repo at github and it was approved by the maintainers? Or just host compromised versions in other mirrors?
    • andymcsherry 9 minutes ago
      Andy from Lightning here. The malicious code was not submitted to the main repo at Github. It appears our PyPi credentials were leaked and compromised packages were published directly there for versions 2.6.2 and 2.6.3
  • csvance 44 minutes ago
    The decision to run all of my experiments in a monorepo with a single uv.lock continues to be validated. I usually only update it a few times a year. It was pinned at 2.6.1 for lightning \o/
  • caycep 59 minutes ago
    just to clarify it's not PyTorch, it's the library for this Lightning AI company?
    • mort96 1 minute ago
      Oh shit I had assumed PyTorch Lightning was affiliated with PyTorch. Not a great name for an unaffiliated third party thing.
    • lostmsu 57 minutes ago
      Yes
  • throwa356262 1 hour ago
  • rvz 1 hour ago
    Shai-Hulud strikes again and continues to turn innocent packages into zombies.

    Think twice before looking at a package and most importantly, always pin your dependencies.

  • 0xbadcafebee 1 hour ago
    something something Safety Requires A Building Code something thing
    • csvance 30 minutes ago
      Shai-Hulud dug my 100 ft trench. Should be OSHA compliant right?
  • spate141 1 hour ago
    ah shit, here we go again
    • 12_throw_away 1 hour ago
      this is fine, we are definitely a perfectly normal industry that knows what it is doing