{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreidk72r2r5twm3hy3l4wwmvgete3qejd6tjzyiffvwohllrqlpabtm",
    "uri": "at://did:plc:6wtxqaikjf62unmnajbfbq5v/app.bsky.feed.post/3mi26m2kklzb2"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreidlhqiej7tapp7p72ljiv66xpa7mx26mb5qkpyjuu65q7kshuuz4e"
    },
    "mimeType": "image/webp",
    "size": 26528
  },
  "path": "/litellm-pypi-breach-exposed-ai-credentials-after-attackers-pushed-malicious-versions-1-82-7-and-1-82-8/",
  "publishedAt": "2026-03-27T10:15:40.000Z",
  "site": "https://vpncentral.com",
  "tags": [
    "News",
    "LiteLLM PyPI breach exposed AI credentials after attackers pushed malicious versions 1.82.7 and 1.82.8",
    "VPN Central"
  ],
  "textContent": "LiteLLM, a widely used Python library for routing requests across multiple LLM providers, was compromised on PyPI after attackers published two malicious releases, versions 1.82.7 and 1.82.8. LiteLLM’s own incident update says the packages were unauthorized, were later removed from PyPI, and may have exposed credentials on any system that installed or ran them during […]\n\nThe post LiteLLM PyPI breach exposed AI credentials after attackers pushed malicious versions 1.82.7 and 1.82.8 appeared first on VPN Central.",
  "title": "LiteLLM PyPI breach exposed AI credentials after attackers pushed malicious versions 1.82.7 and 1.82.8"
}