GeistHaus
log in · sign up

How a Poisoned Security Scanner Became the Key to Backdooring LiteLLM | Snyk

snyk.io

On March 24, 2026, threat actor known as TeamPCP published backdoored versions of the litellm Python package after stealing PyPI credentials via a compromised Trivy GitHub Action in LiteLLM's CI/CD pipeline. Here's what happened, how the three-stage malware works, and how to check if you're affected.

4 pages link to this URL