Artificial IntelligenceCybersecurityNewswireStartupsWhat's Buzzing

LiteLLM Malware Attack: Delve Security Compliance Review

Originally published on: March 26, 2026
▼ Summary

– Malware was discovered in the popular open-source project LiteLLM, which provides access to AI models and is downloaded millions of times daily.
– The malware infiltrated through a software dependency, stealing credentials to access further accounts and packages in a chain reaction.
– A researcher discovered the malware after it caused his machine to crash, and its sloppy design led to conclusions it was “vibe coded.”
– LiteLLM’s website displays security certifications from startup Delve, which has been accused of generating misleading compliance reports.
– The company’s CEO stated their priority is the ongoing investigation with Mandiant and sharing lessons learned after the forensic review.

In the high-stakes world of AI infrastructure, a recent security breach involving a popular open-source tool has sparked serious conversations about software supply chains and the true value of compliance certifications. The incident centers on LiteLLM, a project that simplifies access to hundreds of AI models for developers and boasts an impressive 3.4 million daily downloads. This week, researchers uncovered a piece of malware embedded within the project, leading to a scramble to contain the damage and raising questions about the security promises displayed on the company’s own website.

The malicious code was identified by Callum McMahon, a research scientist at FutureSearch. It infiltrated the system through a software dependency, a common building block in open-source development. Once inside, the malware operated like a digital thief, systematically harvesting login credentials from infected machines. These stolen credentials were then used to compromise additional accounts and packages, creating a potential chain reaction of security failures. Interestingly, a flaw in the malware’s own design caused McMahon’s computer to crash, which ironically led him to discover the intrusion. The sloppy nature of the code led observers, including noted AI researcher Andrej Karpathy, to speculate it was vibe coded, or hastily written without rigorous testing.

The LiteLLM team has been working tirelessly to address the vulnerability, and the attack was contained relatively quickly, likely within hours of its discovery. However, a parallel discussion has erupted online regarding the company’s advertised security posture. As of March 25, the LiteLLM website prominently features badges for two major security compliance certifications: SOC2 and ISO 27001. These certifications were reportedly obtained through a startup named Delve, a Y Combinator-backed company that uses AI to streamline compliance processes.

Delve has recently faced public allegations of misleading customers by generating falsified audit data and employing auditors who provide rubber-stamp approvals. The company has denied these claims. This context adds a layer of irony to the situation, as the malware incident occurred despite LiteLLM’s certified status. It is crucial to understand that such certifications are designed to validate that a company has robust security policies and controls in place; they are not an impenetrable shield against all attacks. While a SOC 2 audit should encompass policies for managing software dependencies, determined threats can still find a way through.

The juxtaposition was not lost on the tech community. Engineer Gergely Orosz commented on the social platform X, expressing initial disbelief that the situation was real, noting, “Oh damn, I thought this WAS a joke… but no, LiteLLM really was ‘Secured by Delve.'” When contacted for comment on the relationship with Delve, LiteLLM CEO Krrish Dholakia declined, stating that the team’s immediate focus remains on the ongoing investigation with cybersecurity firm Mandiant. He emphasized a commitment to transparency, pledging to share technical findings with the broader developer community once the forensic review concludes.

(Source: TechCrunch)

Topics

open source malware 98% litellm incident 97% dependency vulnerability 95% security certifications 93% delve controversy 92% credential theft 90% ai model integration 88% vibe coding 85% security response 83% github popularity 80%