| Version | Supported |
|---|---|
| 0.3.x | ✅ |
| < 0.3 | ❌ |
If you discover a security vulnerability, please report it responsibly:
- Do NOT open a public issue
- Email security concerns to: Create a private security advisory
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Initial Response: Within 48 hours
- Status Update: Within 7 days
- Fix Timeline: Depends on severity
When using litellm-rs:
- Never commit API keys to version control
- Use environment variables for sensitive data
- Rotate keys regularly
- Use
.envfiles for local development (add to.gitignore) - Use secret managers in production (AWS Secrets Manager, HashiCorp Vault, etc.)
- Never use default passwords in production
- Enable TLS/HTTPS in production
- Use firewalls to restrict access
- Monitor for unusual traffic patterns
The library includes automatic sanitization of sensitive data in logs:
- API keys are masked
- Passwords are redacted
- Tokens are hidden
To enable verbose logging safely:
LITELLM_VERBOSE=true # Logs are sanitizedWe regularly update dependencies to address security vulnerabilities. Run:
cargo auditWe appreciate responsible disclosure and will acknowledge security researchers who report valid vulnerabilities.