LiteLLM Hack: Were You One of the 47,000?

Simon Willison's Blog / 3/26/2026

💬 OpinionDeveloper Stack & InfrastructureSignals & Early TrendsTools & Practical Usage

Key Points

  • The post estimates that the exploited LiteLLM packages received 46,996 downloads over the roughly 46-minute window they were live on PyPI across versions 1.82.7 and 1.82.8.
  • It used the BigQuery PyPI dataset to quantify how many users likely pulled the compromised releases during that brief period.
  • The analysis found 2,337 packages that depended on LiteLLM, with about 88% failing to pin dependency versions in a way that would have prevented installing the exploited versions.
  • The findings highlight supply-chain risk in Python packaging, where unpinned dependencies can allow short-lived malicious releases to propagate widely.
Sponsored by: WorkOS — The infrastructure fast-growing B2B companies use to sell to Enterprise.

25th March 2026 - Link Blog

LiteLLM Hack: Were You One of the 47,000? (via) Daniel Hnyk used the BigQuery PyPI dataset to determine how many downloads there were of the exploited LiteLLM packages during the 46 minute period they were live on PyPI. The answer was 46,996 across the two compromised release versions (1.82.7 and 1.82.8).

They also identified 2,337 packages that depended on LiteLLM - 88% of which did not pin versions in a way that would have avoided the exploited version.

Posted 25th March 2026 at 5:21 pm

This is a link post by Simon Willison, posted on 25th March 2026.

packaging 46 pypi 45 python 1238 security 584 supply-chain 13

Monthly briefing

Sponsor me for $10/month and get a curated email digest of the month's most important LLM developments.

Pay me to send you less!

Sponsor & subscribe