Supply chain
⛓ Supply Chain
LiteLLM Cascading Supply Chain Attack — TeamPCP Trivy Credentials Used
Primary Source ↗Incident Details
The LiteLLM PyPI supply chain attack by TeamPCP involved a cascading attack chain: TeamPCP first compromised
the Trivy security scanner’s GitHub Actions CI/CD pipeline (March 19, 2026), used stolen credentials to access
LiteLLM’s PyPI publishing infrastructure, and pushed malicious versions of LiteLLM on March 27, 2026. LiteLLM
is a widely used Python library for calling LLM APIs (OpenAI, Anthropic, etc.) used in AI application
development. Downstream victim Mercor (AI data training startup) suffered a major breach via the LiteLLM
compromise. This ‘supply chain of supply chains’ attack — one compromise enabling access to another trusted
package — is documented separately in the LiteLLM/Mercor/TeamPCP records.
Technical Details
- Initial Attack Vector
- TeamPCP (UNC6780) used credentials stolen in the Trivy GitHub Actions compromise to push malicious versions of LiteLLM to PyPI, creating a second-stage supply chain attack
- Supply Chain Attack
- ✅ Confirmed third-party / vendor compromise
Timeline
- 2026-03-26 Breach occurred
- 2026-03-26 Publicly disclosed