LiteLLM's PyPI Poison: How Hackers Turned an AI Gateway into a Secret-Scavenger
Two PyPI uploads in March 2026 transformed LiteLLM – your go-to AI proxy – into a data vacuum. It rifled through servers for AWS creds, DB configs, even crypto wallets, all while you imported it blindly.
⚡ Key Takeaways
- LiteLLM PyPI packages 1.82.7/1.82.8 delivered sophisticated malware stealing runtime cloud secrets like AWS IMDS creds. 𝕏
- Supply chain attacks via maintainer account compromises are surging; PyPI remains a high-risk vector for devs. 𝕏
- Audit dependencies now – pin versions, use scanners; AI rush is breeding insecure gateways. 𝕏
Worth sharing?
Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.
Originally reported by Securelist Kaspersky