Security Privacy And RiskRisk

LiteLLM PyPI supply chain attack exfiltrating keys and credentials

March 24, 2026Andrej Karpathy, Gergely Orosz, Aakash Gupta

Techmeme and Josh Schultz highlight a LiteLLM supply chain incident where malicious PyPI versions were pulled after injecting credential-stealing code, reinforcing the risk of dependency-heavy agent stacks.

Software horror: litellm PyPI supply chain attack.
Simple `pip install litellm` was enough to exfiltrate SSH keys, AWS/GCP/Azure creds
git credentials, env vars (all your API keys)
LiteLLM *really* was "Secured by Delve"
And so unspririsingly LiteLLM was compromised, badly
Simple `pip install litellm` was enough to exfiltrate SSH keys, AWS/GCP/Azure creds, Kubernetes configs, git credentials, env vars (all your API keys)
Oh damn, I thought this WAS a joke
Someone just poisoned the Python package that manages AI API keys for NASA, Netflix, Stripe, and NVIDIA.. 97 million downloads a month.. and a simple pip install was enough to steal everything on your machine.
Two versions of LiteLLM, an interface for accessing LLMs, have been removed from PyPI after a supply chain attack injected them with credential-stealing code
With code supply chain attacks like the LiteLLM one today... the more imports, the more risk
This is why we rebuilt pi-ai, pi-agent-core, and openclaw imports
Andrej Karpathy
Gergely Orosz
Aakash Gupta
Techmeme
Josh Schultz
supply chaindependenciescredentialsopenclawlitellmgitpypisupply chainchain attackapi keyspip installpypi supplyprivate keysaws gcpgcp azure

See what experts are saying right now

This finding is one of many signals tracked across Indiehacking. The live feed updates every few hours with new expert voices, debates, and emerging ideas.

← Back to Indiehacking