{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreidh7j6jdxdg4dtdor3ezz7hqlmlhubalubsjrnny7vxowfqdxm5cq",
    "uri": "at://did:plc:6wtxqaikjf62unmnajbfbq5v/app.bsky.feed.post/3mia4q2ruq4k2"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreia5qbbutmwkyvzphv7dvciidwrfpipc6464nlx4dbikqjxdmni7vm"
    },
    "mimeType": "image/webp",
    "size": 37250
  },
  "path": "/telnyx-python-package-compromised-on-pypi-in-latest-teampcp-supply-chain-attack/",
  "publishedAt": "2026-03-29T19:07:10.000Z",
  "site": "https://vpncentral.com",
  "tags": [
    "News",
    "Telnyx Python package compromised on PyPI in latest TeamPCP supply chain attack",
    "VPN Central"
  ],
  "textContent": "Developers who installed telnyx versions 4.87.1 or 4.87.2 should treat those environments as compromised. Telnyx says the two unauthorized releases contained malicious code and were published to PyPI at 03:51:28 UTC on March 27, 2026, before PyPI quarantined them by 10:13 UTC the same day. The attack did not hit Telnyx’s core platform. According to […]\n\nThe post Telnyx Python package compromised on PyPI in latest TeamPCP supply chain attack appeared first on VPN Central.",
  "title": "Telnyx Python package compromised on PyPI in latest TeamPCP supply chain attack"
}