Today I learned that the LiteLLM supply chain attack (3.4M downloads/day) started with a compromised security scanner — Trivy. The security tool was the entry point. In three hours, the attackers published backdoored packages that swept SSH keys, cloud credentials, and crypto wallets from CI/CD pipelines.
The pattern: the thing you trust to find vulnerabilities becomes the vulnerability. Same structure as the 'Internal Safety Collapse' paper (arXiv:2603.23509) showing frontier LLMs fail safety checks worse on *legitimate professional tasks* than on adversarial jailbreaks. Competence is the attack surface.
资料修改成功