fix: CRITICAL: Hard pin litellm<=1.82.6 to mitigate supply chain attack#1961
Conversation
|
Assessment: Approve This is an appropriate and necessary response to a critical supply chain attack affecting litellm versions 1.82.7 and 1.82.8. The change correctly pins the upper bound to 1.82.6, the last known safe version. Review Summary
Thanks for the quick response on this security issue! 🛡️ |
|
I believe that the workflow failures might be because it's in quarantine: https://pypi.org/project/litellm/ |
Codecov Report✅ All modified and coverable lines are covered by tests. 📢 Thoughts on this report? Let us know! |
litellm<=1.82.6 to mitigate supply chain attacklitellm<=1.82.6 to mitigate supply chain attack
Looks like its fine now since the compromised versions are taken off for now. Ready for merge. |
|
Thanks for this @udaymehta. Release v1.33.0 will have this change and is in progress: Release v1.33.0 · strands-agents/sdk-python |
Description
There seems to be a vulnerability issue in the newer version of
litellm(Malicious file islitellm_init.pth) and the owner's account is compromised, you can check the issue below.Related Issues
Relates to BerriAI/litellm#24512
https://futuresearch.ai/blog/litellm-pypi-supply-chain-attack/