In a scenario that feels more like a tech satire than a standard security bulletin, LiteLLM—a popular open-source project that streamlines access to hundreds of AI models—recently fell victim to a credential-stealing malware attack. Despite its massive footprint of 3.4 million daily downloads and 40,000 GitHub stars, the project was compromised through a vulnerable software dependency.
A “Vibe Coded” Intrusion
The breach was unearthed by Callum McMahon, a research scientist at FutureSearch. The malware functioned by infiltrating LiteLLM via a third-party dependency, subsequently harvesting login credentials from any system it touched. These stolen credentials were then used to access further accounts and packages, creating a recursive cycle of theft.
Ironically, the malware was discovered because of its own poor construction. A bug in the malicious code caused McMahon’s machine to shut down immediately after download, prompting a deep-dive investigation. This “sloppy” design led both McMahon and renowned AI researcher Andrej Karpathy to characterize the attack as “vibe coded”—a term for software built with more intuition than rigorous engineering.
The Compliance Paradox
While the LiteLLM team worked to purge the threat within hours, the incident has ignited a fierce debate on social media regarding “security theater.” At the time of the attack, the LiteLLM website prominently displayed SOC2 and ISO 27001 certifications. These were issued by Delve, a Y-Combinator-backed compliance startup currently facing allegations of generating fake data and utilizing “rubber stamp” auditors to fast-track certifications.
Industry experts, including engineer Gergely Orosz, noted the irony of a project being “Secured by Delve” while simultaneously hosting malware. While such certifications are meant to validate a company’s security policies rather than provide a literal shield against every exploit, the association with a controversial compliance provider has raised eyebrows across the developer community.
Investigation and Recovery
LiteLLM CEO Krrish Dholakia has remained focused on remediation rather than the compliance controversy. The organization is currently conducting a forensic review in partnership with Mandiant, a leading cybersecurity firm. Dholakia has committed to sharing a full technical post-mortem with the community once the investigation concludes, aiming to turn a “vibe coded” disaster into a lesson for the broader AI ecosystem.







