{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreidh7j6jdxdg4dtdor3ezz7hqlmlhubalubsjrnny7vxowfqdxm5cq",
"uri": "at://did:plc:6wtxqaikjf62unmnajbfbq5v/app.bsky.feed.post/3mia4q2ruq4k2"
},
"coverImage": {
"$type": "blob",
"ref": {
"$link": "bafkreia5qbbutmwkyvzphv7dvciidwrfpipc6464nlx4dbikqjxdmni7vm"
},
"mimeType": "image/webp",
"size": 37250
},
"path": "/telnyx-python-package-compromised-on-pypi-in-latest-teampcp-supply-chain-attack/",
"publishedAt": "2026-03-29T19:07:10.000Z",
"site": "https://vpncentral.com",
"tags": [
"News",
"Telnyx Python package compromised on PyPI in latest TeamPCP supply chain attack",
"VPN Central"
],
"textContent": "Developers who installed telnyx versions 4.87.1 or 4.87.2 should treat those environments as compromised. Telnyx says the two unauthorized releases contained malicious code and were published to PyPI at 03:51:28 UTC on March 27, 2026, before PyPI quarantined them by 10:13 UTC the same day. The attack did not hit Telnyx’s core platform. According to […]\n\nThe post Telnyx Python package compromised on PyPI in latest TeamPCP supply chain attack appeared first on VPN Central.",
"title": "Telnyx Python package compromised on PyPI in latest TeamPCP supply chain attack"
}