-= Per source details. Do not edit below this line.=-
LiteLLM was compromised through trivy security scan in a GitHub workflow. Attackers uploaded malicious versions of LiteLLM to PyPI. The malicious code would exfiltrate sensitive secrets to an attcker controlled domain.
{
"iocs": {
"domains": [
"litellm.cloud"
],
"urls": [
"https://models.litellm.cloud/"
]
},
"malicious-packages-origins": [
{
"versions": [
"1.82.7",
"1.82.8"
],
"sha256": "6a89401cbf53902e8374fbf3b424a77bb5e5f8c437176232eab7c3237d10ecbe",
"import_time": "2026-03-24T22:11:35.145201Z",
"modified_time": "2026-03-24T22:11:32Z",
"source": "google-open-source-security"
}
]
}