docs: add LiteLLM supply-chain incident notice to README#516
docs: add LiteLLM supply-chain incident notice to README#516johnnygreco merged 4 commits intomainfrom
Conversation
Code Review: PR #516 — docs: add LiteLLM supply-chain incident notice to READMESummaryThis is a documentation-only PR that adds a security notice to FindingsAccuracy of Claims
Low — Minor Version Range InaccuracyThe notice states v0.3.0–v0.5.3 pinned Impact: Negligible. The security-relevant constraint is the Suggestion: Consider changing Info — External LinksThe notice references two external URLs:
Both URLs are well-formed. Their continued availability depends on third parties, but this is standard practice for security notices. Info — Placement and FormattingThe notice is positioned prominently between the introductory "What can you do" section and "Quick Start", separated by horizontal rules. This is appropriate for a security advisory — visible without cluttering the main content. The heading uses VerdictApprove. This is a well-written, clearly scoped security notice that accurately communicates the exposure window and affected versions. The only finding is a minor inaccuracy in the stated lower bound of the litellm version constraint for v0.3.0–v0.5.3 ( |
Greptile SummaryThis PR adds a security notice to
|
| Filename | Overview |
|---|---|
| README.md | Adds a security notice section about the LiteLLM supply-chain incident; one factual inaccuracy — "eight subsequent releases" should be "fourteen" based on git tags. |
Flowchart
%%{init: {'theme': 'neutral'}}%%
flowchart TD
A[Assess LiteLLM Supply-Chain Exposure] --> B{Data Designer version?}
B -- "v0.2.2 or v0.2.3" --> C{Ran pip install/update\non 2026-03-24\n10:39–16:00 UTC?}
B -- "v0.3.0 – v0.5.3\nlitellm pinned to\n>=1.73.6,<1.80.12" --> F[✅ Not affected\nupper bound blocks 1.82.x]
B -- "v0.5.4+" --> G[✅ Not affected\nlitellm removed as dependency]
C -- "Yes" --> D{Did litellm 1.82.7\nor 1.82.8 install?}
C -- "No" --> E[✅ Not affected]
D -- "Yes" --> H[⚠️ Potentially affected\nSee BerriAI incident report\nfor remediation]
D -- "No" --> E
Prompt To Fix All With AI
This is a comment left during a code review.
Path: README.md
Line: 29
Comment:
**Incorrect subsequent-release count**
The notice says v0.2.2 and v0.2.3 "have been superseded by eight subsequent releases," but the git tags show 14 non-RC releases between v0.2.3 and v0.5.4: v0.3.0–v0.3.8 (9 releases), v0.4.0, v0.5.0–v0.5.3. In a security notice, getting this factual detail wrong can undermine reader trust.
```suggestion
The only Data Designer releases that could resolve to these versions are **v0.2.2** (Dec 2025) and **v0.2.3** (Jan 2026), which carried a looser `litellm<2` upper bound. These are nearly three months old and have been superseded by fourteen subsequent releases — both have been yanked from PyPI as a precaution. All other releases (v0.3.0 – v0.5.3) pinned `litellm` to `>=1.73.6,<1.80.12` and were never compatible with 1.82.x. Starting with v0.5.4, `litellm` is no longer a dependency.
```
How can I resolve this? If you propose a fix, please make it concise.Reviews (3): Last reviewed commit: "Merge branch 'main' into johnny/chore/ad..." | Re-trigger Greptile
Co-authored-by: greptile-apps[bot] <165735046+greptile-apps[bot]@users.noreply.github.com>
|
Tip: Greploop — Automatically fix all review issues by running Use the Greptile plugin for Claude Code to query reviews, search comments, and manage custom context directly from your terminal. |
📋 Summary
Adds a security notice to the README about the LiteLLM supply-chain incident (March 24, 2026) so users can assess their exposure. This supplements the information already published in the v0.5.4 release notes.
🔗 Related Issue
N/A
🔄 Changes
README.md(before Quick Start) covering the maliciouslitellm1.82.7/1.82.8 packages, the five-hour exposure window, and which Data Designer versions were theoretically compatible (only v0.2.2 and v0.2.3)🧪 Testing
✅ Checklist