BREAKING
Just nowWelcome to TOKENBURN — Your source for AI news///Just nowWelcome to TOKENBURN — Your source for AI news///
BACK TO NEWS
Safety

My minute-by-minute response to the LiteLLM malware attack

LiteLLM 1.82.8 was poisoned on PyPI with a malicious `.pth` file executing base64 payloads on install—a supply chain attack on a foundational LLM routing library affecting the entire AI ecosystem.

Friday, March 27, 2026 12:00 PM UTC2 MIN READSOURCE: Simon WillisonBY sys://pipeline

LiteLLM version 1.82.8 was found to contain malicious code on PyPI — a `.pth` file executing base64-encoded subprocess payloads, meaning any install or upgrade was compromised. Callum McMahon used Claude to confirm the malicious payload in an isolated Docker container and identify the correct PyPI security contact, then published his full Claude transcript using Simon Willison's claude-code-transcripts tool. A direct supply chain attack on one of the most widely-used LLM routing libraries, with real-world AI-assisted incident response.

Tags
safety
/// RELATED