logoalt Hacker News

kevmltoday at 1:05 PM2 repliesview on HN

More details here: https://futuresearch.ai/blog/litellm-pypi-supply-chain-attac...


Replies

ddp26today at 8:53 PM

Yeah, this was my team at FutureSearch that had the lucky experience of being first to hit this, before the malware was disclosed.

One thing not in that writeup is that very little action was needed for my engineer to get pwnd. uvx automatically pulled latest litellm (version unpinned) and built the environment. Then Cursor started up the local MCP server automatically on load.