Delve did the security compliance on LiteLLM, an AI project hit by malware
This is one of those Silicon Valley real-life episodes that seems pulled from the HBO satire show.
LiteLLM gives developers easy access to hundreds of AI models and provides features like spend management.
It’s a breakout hit, downloaded as often as 3.
4 million times per day, according to Snyk, one of the many security researchers monitoring the incident.
The malware slipped in through a “dependency,” meaning other open source software that LiteLLM relied upon. It then stole the log-in credentials of everything it touched. With those credentials, the malware gained access to more open source packages and accounts to harvest more credentials, and so on. The malware caused McMahon’s machine to shut down after he downloaded LiteLLM. That event prompted him to investigate and discover it. Ironically, a bug in the malware caused his machine to blow up.
There’s another part to this saga that folks on X can’t stop talking about.
But it used a startup called Delve for those certifications.
Delve has denied these allegations. There is one point of nuance here worth understanding. Such certifications are intended to show that a company has strong security policies in place to limit the possibility of incidents like this one. Certifications don’t automatically prevent a company, like LiteLLM, from being hit by malware.
… but no, LiteLLM *really* was ‘Secured by Delve. ’” As for LiteLLM, CEO Krrish Dholakia had no comment on the use of Delve. He’s still busy cleaning up the unfortunate mess from being a victim of attack.
“Our current priority is the active investigation alongside Mandiant.
We are committed to sharing the technical lessons learned with the developer community once our forensic review is complete,” he told TechCrunch
Logic Quality Breakdown:
- Updated_At:
- Truth_Blocks:
- Analysis_Method: