Cloud Security Office Hours Banner

Friday, March 27, 2026 — Meeting Recap

LiteLLM compromise, RSA attendance dip, supply-chain mitigations

— LiteLLM compromise, RSA attendance dip, supply-chain mitigations

Quick recap. The meeting focused on discussing the recent Light LLM security compromise, where a Python package used by 97 million monthly users was compromised, leading to the theft of credentials and sensitive information from affected systems. The group examined how the attack occurred through compromised GitHub repositories and discussed the role of security companies like Aqua and Checkmarx in the incident. Participants also shared their experiences from RSA conference, noting lower attendance and a higher concentration of vendors compared to previous years. The discussion touched on potential preventive measures including version pinning, air-gapped development environments, and the challenges of securing open-source dependencies. Additionally, the group welcomed new members including Mackenzie, a security recruiter, and Francois, a former colleague of Shawn's from Fusion.IO.

2026-03Supply ChainVulnerabilitiesConferences
Show 7 discussion topics

RSA Conference Discussion

The meeting began with casual conversation about RSA conference attendance, where Shawn and Juninho discussed their experiences, noting lower attendance and limited new innovations despite AI being a prominent theme. The group welcomed new attendees and discussed the importance of networking through LinkedIn. No specific decisions or action items were outlined, and the session was designated as an open forum for questions and discussion.

LiteLLM Security Vulnerability

The meeting focused on a discussion about a significant security vulnerability in the LiteLLM Python package, which was compromised and led to the exfiltration of sensitive information from users' systems. Shawn shared a video explaining the details of the vulnerability, including how it affected systems and the role of package managers in security. The group also discussed the response on GitHub, where bot AI replies attempted to suppress the issue, and noted the irony that the compromised package was used for security by companies like Delve, which is currently facing allegations of misleading compliance reports.

Light LLM Security Breach

Shawn presented information about a security breach involving Light LLM and Trivy, where threat actors exfiltrated 300GB of credentials and are extorting multiple billion-dollar companies. Mackenzie introduced herself as a national risk and security recruiter from Tech Systems, offering to support the group with recruitment needs, particularly in cloud security roles for financial institutions and health services. Juninho provided additional context about how the Light LLM compromise occurred through a Trivy security scan, noting that Light LLM's response was faster than competitors Aqua and Checkmarx.

Open-Source Security Compromise

The group discussed a security compromise involving open-source software, with Shawn noting that many developers were affected. Rev suggested that using vetted packaging from security companies could provide a delay in risk mitigation, while Shawn emphasized the importance of trusted open-source packages. Alex highlighted the need for human oversight in security processes, while Pavel proposed sandboxing sensitive information on developer machines to enhance security. Bartek suggested separating CI from CD as a potential solution.

Supply Chain Attack Prevention Measures

Frederick discussed detection and prevention measures for supply chain attacks, mentioning IOCs such as specific domains and file paths. He noted the importance of endpoint detection and protection, especially for activities related to AI coding and malicious package downloads. Juninho added that Team PCP appears to be targeting supply chain companies, highlighting the risks faced by organizations in this sector.

Software Supply Chain Vulnerabilities

The group discussed security vulnerabilities in software supply chains, particularly focusing on the compromise of Trivy and other vulnerability scanners. They explored various mitigation strategies including version pinning, air-gapped development environments, and limiting external connections, though Rev noted that allowlisting external connections would be difficult to implement effectively due to the complex dependencies in GitHub Actions. The discussion highlighted the effectiveness of the attackers' approach, including spamming communication channels to disrupt the response process, and concluded with agreement that while no perfect solution exists, implementing multiple security measures including short-lived credentials and private maintainer channels could help improve resilience.

RSA Conference and AI Compliance

The group discussed their recent experiences at RSA conference, noting significantly lower attendance compared to previous years, with many attendees being vendors rather than security practitioners. Jay observed that the event felt empty despite ongoing vendor activities, leading to speculation about whether RSA might end after this year. The conversation then shifted to compliance and AI, where Brian raised questions about Light LLM's security credentials and Delve's compliance issues, leading to a discussion about the role of AI in compliance processes, with participants agreeing that human oversight remains essential in auditing and compliance verification.

↑ All meeting recaps