Agent Horror Stories

Viewer discretion advised ยท Updated nightly

โ† Back to the feed
Curatedsecurity breachยท

LiteLLM Supply Chain Compromise: SSH Keys and AWS Credentials Exfiltrated

A supply chain attack on LiteLLM, the popular LLM proxy, compromised the package to exfiltrate SSH keys and AWS credentials from every installation.

Original source
View on trendmicro.com
Nightmare Fuel

The proxy that sat between your code and your LLM was compromised from the inside.

LiteLLM โ€” the widely-used open-source proxy that developers use to manage connections to multiple LLM providers โ€” suffered a supply chain attack that turned it into an exfiltration tool. The compromised package silently harvested SSH keys and AWS credentials from every system it was installed on.

Trend Micro's investigation revealed the attack had been carefully orchestrated: the malicious code was embedded in an update that looked legitimate, passed automated security checks, and deployed to thousands of production environments before anyone noticed.

The scale of exposure was immense. LiteLLM sits at the intersection of AI infrastructure and cloud credentials โ€” the exact junction where an attacker gets maximum value. Every developer who updated their LiteLLM installation during the compromise window potentially exposed their most sensitive infrastructure secrets.

The AI supply chain is the new frontier of supply chain attacks. When your LLM tooling is compromised, the blast radius includes everything that tooling can access.

More nightmares like this