Security
12 min read read

Technical Analysis: The LiteLLM Supply Chain Attack (TeamPCP)

Amit Narwal
Freelance Full Stack & AI Developer
Technical Analysis: The LiteLLM Supply Chain Attack (TeamPCP)

Security Alert

A critical supply chain vulnerability was discovered in the LiteLLM ecosystem targeting cloud credentials.

The Attack Vector: Dependency Confusion

The TeamPCP threat group utilized a \"Dependency Confusion\" attack by publishing a malicious version of a sub-dependency to the public PyPI registry. When developers ran `pip install litellm`, the installer prioritized the malicious public version over the intended private or cached one.

Payload & Exfiltration

The malicious payload was designed to exfiltrate **Environmental Variables**—specifically AI API keys (OpenAI, Anthropic) and AWS credentials—to a remote command-and-control (C2) server.