Two malicious versions of LiteLLM (1.82.7 and 1.82.8) were briefly published on PyPI as part of the TeamPCP supply chain campaign, which previously compromised the Trivy vulnerability scanner. The packages embedded a three-stage payload that harvested environment variables, SSH keys, cloud credentials (AWS, GCP, Azure),
Sort: