After an API Token exposure from an exploited trivy dependency, two new releases of `litellm` were uploaded to PyPI containing automatically activated malware, harvesting sensitive credentials and files, and exfiltrating to a remote API. Anyone who has installed and run the project should assume any credentials available to litellm environment may have been exposed, and revoke/rotate thema ccordingly.
| Vendor | Product | Versions |
|---|---|---|
| pip | litellm | pip/litellm: >= 1.82.7, <= 1.82.8 |