☁️ Cloud Security

LiteLLM's PyPI Poison: How Hackers Turned an AI Gateway into a Secret-Scavenger

Two PyPI uploads in March 2026 transformed LiteLLM – your go-to AI proxy – into a data vacuum. It rifled through servers for AWS creds, DB configs, even crypto wallets, all while you imported it blindly.

Malicious LiteLLM Python code scanning for AWS keys and database configs in a server terminal

⚡ Key Takeaways

  • LiteLLM PyPI packages 1.82.7/1.82.8 delivered sophisticated malware stealing runtime cloud secrets like AWS IMDS creds. 𝕏
  • Supply chain attacks via maintainer account compromises are surging; PyPI remains a high-risk vector for devs. 𝕏
  • Audit dependencies now – pin versions, use scanners; AI rush is breeding insecure gateways. 𝕏
Published by

theAIcatchup

Threat intelligence. Zero noise.

Worth sharing?

Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.

Originally reported by Securelist Kaspersky

Stay in the loop

The week's most important stories from theAIcatchup, delivered once a week.