The litellm supply chain attack: how MCP servers got compromised and how to check if you're affected

📰 Dev.to · Gus

litellm 1.82.7 and 1.82.8 were compromised on PyPI via a .pth file. MCP clients auto-download deps via uvx without pins. Here's how to check and clean up.

Published 25 Mar 2026
Read full article → ← Back to Reads