Yeah, this was my team at FutureSearch that had the lucky experience of being first to hit this, before the malware was disclosed.
One thing not in that writeup is that very little action was needed for my engineer to get pwnd. uvx automatically pulled latest litellm (version unpinned) and built the environment. Then Cursor started up the local MCP server automatically on load.