Organizations using LiteLLM for AI model routing
OrganizationEntity Summary
- Entity ID
- ENT-ORGANIZATION
- Type
- Organization
- Roles
- Deployer
- Sectors
- —
- Incidents
- 1
- First Incident
- 2026-03-24
Incident Activity
Incidents Involved as Developer/Deployer (1)
| Incident ID | Title | Severity | Date |
|---|---|---|---|
| INC-26-0015 | TeamPCP Compromises LiteLLM via Poisoned Trivy Security Scanner | critical | 2026-03-24 |
Context & Analysis
Organizations using LiteLLM for AI model routing appears in 1 documented incident spanning March 2026. 100% of incidents are rated critical or high severity. The dominant threat domain is Security & Cyber (1 incident). The most common pattern is AI Supply Chain Attack, appearing in 1 incident.
Threat Domains
Top Threat Patterns
Frequently Asked Questions
What AI incidents involve Organizations using LiteLLM for AI model routing, and what role did it play?
Organizations using LiteLLM for AI model routing appeared as deployer in 1 incident. Key incidents include: INC-26-0015 TeamPCP Compromises LiteLLM via Poisoned Trivy Security Scanner (critical severity, 2026-03-24) .
Which AI threat patterns involve Organizations using LiteLLM for AI model routing?
Organizations using LiteLLM for AI model routing's incidents involve AI Supply Chain Attack , Tool Misuse & Privilege Escalation . These are part of a taxonomy of 49 patterns across 8 domains.
Use in Retrieval
Organizations using LiteLLM for AI model routing (ENT-ORGANIZATION) is documented at /entities/organizations-using-litellm-for-ai-model-routing/ as
an organization in the TopAIThreats.com database.
Incidents span 1 domain: Security & Cyber.
When citing, reference the canonical URL and specific incident IDs (e.g., INC-26-0015) for traceability.