LiteLLM (YC W23)

976 posts

LiteLLM (YC W23) banner
LiteLLM (YC W23)

LiteLLM (YC W23)

@LiteLLM

Call every LLM API like it's OpenAI 👉 https://t.co/UV2PpapQo7

try it today ➜ 가입일 Aralık 2022
179 팔로잉5K 팔로워
LiteLLM (YC W23) 리트윗함
Krrish
Krrish@krrish_dh·
📣 Announcing @LiteLLM's April Townhall Agenda: - Product roadmap - Reliability and security updates - Open Q&A with the team Register here: forms.gle/zyyHLhHEyWGo1A…
Krrish tweet media
English
0
1
1
323
LiteLLM (YC W23) 리트윗함
Krrish
Krrish@krrish_dh·
5️⃣ new things @LiteLLM 🐳 Docker - All Pip+NPM+Docker deps now pinned 💪 Qohash - new Guardrail provider 🛠️ Teams - enforce TPM/RPM limits for members 🎉 Gemini - skip fetch for File API URLs 🧹 Azure - forward api_version on embeddings
English
0
1
3
572
Shahn
Shahn@shahin43·
@garrytan @mercor_ai this is so concerning about safety and security of Data. Pypi package leak, which poisoned @LiteLLM is main reason for this leak
English
1
0
0
2.9K
Garry Tan
Garry Tan@garrytan·
Wow. Incredible amount of SOTA training data now just available to China thanks to @mercor_ai leak. Every major lab. Billions and billions of value and a major national security issue.
artemis@atermisgreek

@archiexzzz More customer data leaks: Amazon, Athena, Aphrodite, Meta, Apple… Athena and Aphrodite are code names

English
121
251
2.5K
978.8K
CipherBC
CipherBC@CipherBC·
🟡March was brutal. We hope all affected projects have recovered🔐 🔴 @LiteLLM: hijacked maintainer account pushed malicious packages to this protocol that stole crypto private keys and cloud credentials from dev environments 🔴 @ResolvLabs, a stolen minting key let an attacker create $80M in unbacked stablecoins, draining $23M in ETH. 🔴 French Corporate Networks: fake CV files deployed crypto miners and credential stealers, targeting only enterprise machines to avoid detection.
CipherBC tweet media
English
21
25
60
6.3K
LiteLLM (YC W23) 리트윗함
Ishaan
Ishaan@ishaan_jaff·
Update from us @LiteLLM, We will be partnering with @TrustVanta for its SOC-2 Type 2 and ISO 27001 recertification. Thank you to the Vanta team for their quick help! We are also in the process of identifying 3rd party auditors to verify our compliance controls.
Ishaan tweet media
English
6
3
123
24.1K
LiteLLM (YC W23) 리트윗함
solst/ICE of Astarte
solst/ICE of Astarte@IceSolst·
Also @LiteLLM immediately went public, transparently, and is even doing a webinar, to talk about lessons learned. I haven’t heard shit from aqua nor checkmarx. When they should be role models about how to handle incidents. Instead they show us what NOT to do.
TeamPCP@pcpcats

@IceSolst Crowdstrike only disclosed trivy 1/2 day after they had been analyzed by third parties, socket marked our litellm packages as clean, both releases and claim their dependency scanners could have prevented it. Everyone affected know the counter playbook, none are applying it.

English
13
27
333
26.8K
LiteLLM (YC W23) 리트윗함
solst/ICE of Astarte
solst/ICE of Astarte@IceSolst·
Fascinating seeing security companies are so much worse at responding to incidents than non-security companies Both aqua and checkmarx didn’t do a good job. LiteLLM handled it much better. Curious!!
DFIR Radar@DFIR_Radar

TeamPCP supply chain campaign scope expanded beyond initial reports with new CISA KEV entry and detection tools now available. Campaign timeline spans Feb 28 initial access through March 24 LiteLLM PyPI compromise. #DFIR_Radar

English
10
19
203
21.9K
LiteLLM (YC W23) 리트윗함
Ishaan
Ishaan@ishaan_jaff·
Hi everyone, We'll be hosting a townhall tomorrow from 7:30am PST - 8:30am PST for LiteLLM users. To discuss what we've learnt and share planned improvements. If you're interested, sign up here: forms.gle/D788oPFjX8xKwF…
English
0
3
21
2.2K
LiteLLM (YC W23)
LiteLLM (YC W23)@LiteLLM·
Hi everyone, We'll be hosting a townhall tomorrow from 7:30am PST - 8:30am PST for LiteLLM users. To discuss what we've learnt and share planned improvements. If you're interested, sign up here: forms.gle/D788oPFjX8xKwF…
English
0
0
6
755
LiteLLM (YC W23) 리트윗함
Adnan Khan
Adnan Khan@adnanthekhan·
The security response by @LiteLLM has really been commendable. They were blindsided by the breach but within a day they hired professionals to guide them through a process that they themselves probably weren’t mature enough for as a company. @AquaSecTeam slow rolled their response which gave threat actors days and an entire weekend before victims learned about it. They even got popped a third time during this. This delay will go down in history as an S-tier fumble. @Checkmarx - well, their two actions and OpenVSX extensions got backdoored and I don’t see a public advisory or statement yet. The two security companies here demonstrate how not to handle incidents; while the young AI startup makes the best of a very difficult situation.
English
10
24
251
22.5K
LiteLLM (YC W23)
LiteLLM (YC W23)@LiteLLM·
The comprised packages were 1.82.7 and 1.82.8, they were quarantined and deleted, thanks to @pypi team No LiteLLM releases will out until we have scanned our chain and make sure it’s safe We are actively investigating, reach out to support@berri.ai with any questions/concerns
English
1
1
40
9.7K
LiteLLM (YC W23)
LiteLLM (YC W23)@LiteLLM·
[INCIDENT UPDATES] - Compromised LiteLLM packages have been deleted. - Proxy docker image users were not impacted - All dependencies are pinned on requirements.txt. - Compromise came from Trivvy security scan dependency, looking into it with Google’s Mandiant Security
English
16
85
524
71.7K
LiteLLM (YC W23) 리트윗함
ljbthatsme
ljbthatsme@ljbthatsmee·
Thanks to my personal fav @LiteLLM, switching to a faster api model was eassssy. So been using @AnthropicAI Haiku
English
1
1
1
3K
Nirant
Nirant@NirantK·
.@LiteLLM has a bug on their Gemini LLM caching which is leading to 2-10x costs, we raised a PR to fix 3 days ago. How do we get someone to take a review? PR link below from our team
English
3
0
5
943
LiteLLM (YC W23) 리트윗함
Or Hiltch
Or Hiltch@_orcaman·
Boy, have we got news for you! 🧑‍🍳 The @openwork_ai team is happy to announce: - Amazon Bedrock integration, contributed by our friends at @awscloud (thanks guys!) - Native @deepseek_ai integration - Integration with @openrouter and @LiteLLM! Here's how what it looks like >>
English
29
27
212
40.6K
LiteLLM (YC W23) 리트윗함
Raymond Weitekamp
Raymond Weitekamp@raw_works·
first, pinky, we will use @DSPyOSS and @LiteLLM proxy server with custom guardrails to translate any api call into spanish... ...then, we try to take over the world!
Raymond Weitekamp tweet media
English
5
7
81
8.6K