{"skill":{"slug":"litellm-attack-detector","displayName":"litellm attack detector","summary":"Detect the LiteLLM supply chain attack (v1.82.7/1.82.8). Scans for compromised packages, malicious .pth files, backdoor persistence, suspicious network conne...","tags":{"latest":"1.0.0"},"stats":{"comments":0,"downloads":145,"installsAllTime":0,"installsCurrent":0,"stars":0,"versions":1},"createdAt":1774416873400,"updatedAt":1774418041573},"latestVersion":{"version":"1.0.0","createdAt":1774416873400,"changelog":"Initial release: Detects compromise from the LiteLLM supply chain attack (v1.82.7/1.82.8) in a safe, read-only manner.\n\n- Scans for malicious packages, .pth files, persistence mechanisms, suspicious network connections, and Kubernetes compromise Indicators (IoCs).\n- No dependencies required, safe to run (does not modify files or send data).\n- Provides color-coded output and actionable remediation guidance if compromise is detected.\n- Handles edge cases: missing pip/python, alternative cache locations, absence of kubectl or lsof, macOS/Linux compatibility.\n- Usage details and detection steps included for both security teams and general users.","license":"MIT-0"},"metadata":{"os":null,"systems":null},"owner":{"handle":"tjefferson","userId":"s170z4mt16txtqsqz0ea9rph3183f336","displayName":"Jeff","image":"https://avatars.githubusercontent.com/u/2939233?v=4"},"moderation":null}