Skip to main content

Search

Items tagged with: litellm


#LiteLLM Compromised! LiteLLM - a popular Python Library used by a lot of AI tooling got compromised on PyPI, and the malicious versions are stealing everything they can find on your machine:

#SoftwareSupplyChainSecurity

๐Ÿ‘‡
xda-developers.com/popular-pytโ€ฆ


โš ๏ธ LiteLLM backdoored

๏ฝข On March 24, 2026, version 1.82.8 of LiteLLM was pushed to PyPI containing a malicious .pth file called "litellm_init.pth". That file executes automatically on every Python process startup, meaning you don't even need to import the library for it to run. What's more, version 1.82.7 has also been compromised. On the latest version, simply having it installed is enough, but 1.82.7 requires an import for the payload to activate ๏ฝฃ

xda-developers.com/popular-pytโ€ฆ

#litellm #pypi



Supply-chain attack on litellm

"At 10:52 UTC on March 24, 2026, litellm version 1.82.8 was published to PyPI. The release contains a malicious .pth file (litellm_init.pth) that executes automatically on every Python process startup when litellm is installed in the environment."

futuresearch.ai/blog/litellm-pโ€ฆ

#genai #llms #litellm #infosec #python


TeamPCP injected malicious code into Trivy, Checkmarx tools, and LiteLLM in a supply chain attack designed to steal cloud credentials, tokens, and crypto wallet data.

Read: hackread.com/teampcp-trivy-cheโ€ฆ

#CyberSecurity #Malware #TeamPCP #Trivy #Checkmarx #LiteLLM


Addressing the #LiteLLM supply chain incident:

All #SakuraSky managed production environments are unaffected by the v1.82.7/8 compromise.

Our infrastructure is a "Zero-Value Target." Using #OIDC and Just-in-Time key injection, we ensure that even if a library is breached, it finds an "empty room"- no static keys or .env files to steal.

Weโ€™re also accelerating our Sentinel framework for deeper AI agent governance.

Details: sakurasky.com/blog/security-adโ€ฆ

#InfoSec #AI #SupplyChainSecurity #DevSecOps

โ‡ง