PyPI의 낮은 Hash 검증률(78%)과 느린 탐지 시간(11.7h) 분석
Supply chain npm vs PyPI: I compared both simulations and the most dangerous vector isn't what everyone thinks
Supply chain npm vs PyPI: I compared both simulations and the most dangerous vector isn't what everyone thinks
PyTorch Lightning 침해 사고를 통한 Supply Chain Attack 분석 및 대응 방안
Malware in PyTorch Lightning: I Simulated the Same Supply Chain Attack Vector on My ML Dependencies in Production
Malware en PyTorch Lightning: simulé el mismo vector de supply chain attack sobre mis dependencias de ML en producción
The never-ending supply chain attacks worm into SAP npm packages, other dev tools
I Almost Installed a Malicious Python Package: So, I Built trustcheck
pip-guardian on Pypi
I built a CLI to verify PyPI package attestations before installing packages
PyPI 공급망 공격 분석, API 토큰 탈취부터 악성 패키지 배포까지의 연쇄 경로
I open sourced a production MLOps pipeline. Here is what it took to get it to PyPI and Hugging Face in one day.
PyPI Supply Chain Attack Compromises LiteLLM, Enabling the Exfiltration of Sensitive Information
LiteLLM 공급망 공격에서 Claude의 지원으로 취약점을 발견·분석·보고하여 PyPI가 30분 내 패키지 격리 및 47,000명 감염 확산 방지
Supply Chain Security: How the Telnyx PyPI Compromise Happened and How to Protect Your Projects
LiteLLM Supply Chain Attack: How TeamPCP Backdoored AI Infrastructure
PyPI의 litellm 1.82.8 패키지가 .pth 파일 자동 실행 기능을 악용해 API 키·SSH 키·클라우드 토큰 등 모든 자격 증명을 탈취
LiteLLM v1.82.7, v1.82.8의 PyPI 패키지 침해로 malicious 코드 배포 후 모든 자격증명 교체 및 공급망 보안 재설계 필요성 대두
LiteLLM PyPI Compromise: What You Need to Know Now
LiteLLM loses game of Trivy pursuit, gets compromised
LiteLLM Python package compromised by supply-chain attack