Supply Chain Vulnerabilities
Description
Compromised models, datasets, libraries, or pre-trained components introduce risk into LLM applications.
⚠️ Risk Impact
LLM apps stack 80%+ third-party components: foundation models, embedding models, vector stores, orchestration libraries (LangChain, LlamaIndex), hosted APIs. Each is a supply-chain attack surface.
🔍 How EchelonGraph Detects This
EchelonGraph's Tier 1 Cloud Scanner automatically checks for this condition across all connected cloud accounts. Violations are flagged as critical-severity findings with remediation guidance.
🖥️ Manual Verification
# Scan an LLM workload for known CVEs
trivy image --severity HIGH,CRITICAL your-llm-workload:latest🔧 Remediation
Pin model versions; verify signatures. Scan dependencies (pip-audit, Snyk, Trivy). Maintain SBOM for LLM workloads. Restrict model-provider list. Cosign-verify container images.
💀 Real-World Attack Scenario
PyTorch supply-chain attack (Dec 2022): malicious 'torchtriton' uploaded to PyPI matching the legitimate Triton release name. Nightly PyTorch builds pulled the malicious package over the weekend; the package exfiltrated SSH + GPG keys via DNS. Estimated affected: high thousands of ML developers worldwide.
💰 Cost of Non-Compliance
Avg LLM supply-chain breach in 2024: $4.6M (IBM). PyTorch incident: widespread but undisclosed total cost.
📋 Audit Questions
- 1.Show me the SBOM for your top LLM application.
- 2.How are LLM model versions pinned and verified?
- 3.What is the CVE remediation SLA for LLM dependencies?
- 4.Who reviews new LLM library additions?
🎯 MITRE ATT&CK Mapping
⚡ Common Pitfalls
- ⛔Pinning by version tag (mutable) rather than hash (immutable)
- ⛔Skipping SBOM for ML workloads — only the container is scanned
- ⛔Auto-updating to 'latest' on schedule without review
📈 Business Value
Supply-chain hardening prevents the highest-frequency 2024 LLM attack vector. Reduces avg breach risk by 60-80%.
⏱️ Effort Estimate
3-4 weeks for SBOM + scanning + signature verification
EchelonGraph SBOM + LLM supply-chain monitor with auto-CVE correlation
🔗 Cross-Framework References
Automate OWASP LLM Top 10 LLM03 compliance
EchelonGraph continuously monitors this control across all your cloud accounts.
Start Free →