PyPIで公開されているライブラリー「litellm」の特定版に不正コードが混入した。悪用によって認証情報の窃取やK8sへの横展開、永続的なバックドア設置が可能になるという。利用環境の調査および認証情報の更新が強く推奨される。
The threat group's shift to speedy attacks on AWS, Azure, and SaaS instances shows organizations need to respond quickly to ...
TeamPCP strikes again, with almost identical code to LiteLLM.
Learn how to detect compromise, assess your exposure to the LiteLLM supply chain attack, and use GitGuardian to orchestrate ...
On the morning of March 24, 2026, tens of thousands of software developers working on AI applications were unknowingly exposed to malware.
LiteLLM, a widely used AI developer tool, was hit by a supply chain attack through a malicious PyPI release. The malware ...