Litellm PyPI Package Compromised: Malicious Version 1.82.8 Exfiltrated Credentials

Security Alert: Litellm Package Compromise
The litellm Python package, which has approximately 97 million downloads per month and is used to unify API calls to OpenAI, Anthropic, Cohere, and other LLM providers, was compromised on PyPI. A malicious version (1.82.8) was uploaded that exfiltrated sensitive data from affected systems.
What Happened
For approximately one hour, running pip install litellm or installing any package that depends on it (such as DSPy) would trigger data exfiltration. The malicious version collected:
- SSH keys
- AWS, GCP, and Azure credentials
- Kubernetes configuration files
- Git credentials and shell history
- All environment variables (including API keys and secrets)
- Crypto wallet information
- SSL private keys
- CI/CD secrets
The attack was discovered when a user's machine crashed. Andrej Karpathy described it as "the scariest thing imaginable in modern software."
Immediate Action Required
If you installed any Python packages yesterday (especially DSPy or any litellm-dependent tool), assume your credentials are compromised. You should:
- Rotate all potentially affected credentials immediately
- Check your package versions for litellm 1.82.8
- Review the full breakdown in the source for specific remediation steps
The malicious version has been removed from PyPI, but credentials may already have been stolen during the hour the package was active.
📖 Read the full source: r/LocalLLaMA
👀 See Also

Wide OpenClaw: Security Risks from Loose Discord Bot Permissions
A security researcher demonstrates how OpenClaw can be exploited when users add the AI assistant bot to their Discord server with excessive permissions, targeting users who grant root/admin access without considering security controls.

McpVanguard Proxy Blocks OpenClaw Skill Data Exfiltration
A developer built McpVanguard, a proxy that sits between AI agents and their tools to block malicious call chains like data exfiltration, in response to Cisco finding OpenClaw skills performing silent data theft. It uses pattern matching, semantic intent scoring, and behavioral chain detection.

Exploring Risks of Google Account Usage with Gemini-Cli and Gemini Pro Subscription
Gemini-Cli and your Gemini Pro subscription might pose some risks to your Google account. Here's what you need to know about potential vulnerabilities when using these AI tools.

Proxy-layer isolation for local agent API key security
A developer shares an approach to API key isolation in local agent setups using a Rust proxy that swaps placeholder tokens for real credentials, preventing exposure in agent memory, logs, context windows, and tool environments.