LiteLLM PyPI has been compromised an hour ago, do not update
Bullhorn9268
23 points
4 comments
March 24, 2026
Related Discussions
Found 5 related stories in 49.9ms across 3,471 title embeddings via pgvector HNSW
- Tell HN: Litellm 1.82.7 and 1.82.8 on PyPI are compromised dot_treo · 582 pts · March 24, 2026 · 65% similar
- Malicious litellm_init.pth in litellm 1.82.8 PyPI package – credential stealer theanonymousone · 722 pts · March 24, 2026 · 59% similar
- Telnyx package compromised on PyPI ramimac · 95 pts · March 27, 2026 · 58% similar
- Telnyx package compromised on PyPI overflowy · 84 pts · March 27, 2026 · 57% similar
- My minute-by-minute response to the LiteLLM malware attack Fibonar · 336 pts · March 26, 2026 · 55% similar
Discussion Highlights (2 comments)
rgambee
It's also been reported to their GitHub: https://github.com/BerriAI/litellm/issues/24512
darkteflon
We recently switched to pnpm, in part to guard against supply chain attacks ( https://pnpm.io/supply-chain-security ). Reading this got me wondering whether uv has something similar, and indeed it does appear to ( https://docs.astral.sh/uv/reference/settings/#exclude-newer )