← Back to context Comment by cpburns2009 2 days ago You can see it for yourself here:https://inspector.pypi.io/project/litellm/1.82.8/packages/fd... 3 comments cpburns2009 Reply jbkkd 2 days ago Two URLs found in the exploit: https://checkmarx.zone/raw https://models.litellm.cloud/ tinix 2 days ago these links trigger prefetch in chrome (doesn't respect nofollow rel).I got popped by our security team, they were convinced I had this malware because my machine attempted to connect to the checkmarx domain.clearly a false positive but I still had to roll credentials and wipe my machine.
jbkkd 2 days ago Two URLs found in the exploit: https://checkmarx.zone/raw https://models.litellm.cloud/ tinix 2 days ago these links trigger prefetch in chrome (doesn't respect nofollow rel).I got popped by our security team, they were convinced I had this malware because my machine attempted to connect to the checkmarx domain.clearly a false positive but I still had to roll credentials and wipe my machine.
tinix 2 days ago these links trigger prefetch in chrome (doesn't respect nofollow rel).I got popped by our security team, they were convinced I had this malware because my machine attempted to connect to the checkmarx domain.clearly a false positive but I still had to roll credentials and wipe my machine.
Two URLs found in the exploit: https://checkmarx.zone/raw https://models.litellm.cloud/
these links trigger prefetch in chrome (doesn't respect nofollow rel).
I got popped by our security team, they were convinced I had this malware because my machine attempted to connect to the checkmarx domain.
clearly a false positive but I still had to roll credentials and wipe my machine.