Skip to main content

LiteLLM: Suspected Supply Chain Incident

  • March 25, 2026
  • 0 replies
  • 3 views
janetteguzman
Community Manager
Forum|alt.badge.img+1

Supply-chain compromise of LiteLLM

Supply-chain compromise of LiteLLM

An attacker hijacked maintainer credentials via poisoned CI dependency, published legit-package backdoors with auto-executing infostealer (.pth) exfiltrating cloud, SSH, K8s, and crypto secrets, plus persistence/C2.

According to LiteLLM only PyPI versions 1.82.7/1.82.8 had malicious packages, injected via compromised CI (Trivy). Official Docker image (pinned deps) unaffected; releases paused during audit. Malware enabled full credential exfiltration and persistence.

LiteLLM’s guidance:

  1. Uninstall affected versions (1.82.7/1.82.8) and reinstall a safe version (≤1.82.6) 

  2. Rotate all credentials (cloud, API keys, SSH, etc.) immediately

  3. Audit systems/CI for compromise & persistence (hosts, containers, clusters) 

  4. Pause/secure release pipelines and review supply chain (CI/CD, dependencies) 

  5. Prefer pinned/isolated deployments (e.g., Docker with locked deps)