Protect against supply-chain exploits using uv

LiteLLM was recently victim of a supply-chain exploit, where an attacker was able to run arbitrary code on infected machines.

In the aftermath, I saw how uv provides a safety setting for this, and it would be good practice to add this to your pyproject.toml

[tool.uv]
exclude-newer = "1 week"

or uv.toml:

exclude-newer = "1 week"

The docs provide multiple options to protect yourself.