Wow, TeamPCP is hacking open-source developers faster than we can report on them. The latest (that I'm aware of, anyway) is LiteLLM. They worked with Trivy but didn't bother to change their credentials after Trivy was hacked, despite an ample amount of advice to do so.

Folks, if any of you used LiteLLM, now is the time to change your credentials, in an atomic way. Now, as in immediately.

https://news.ycombinator.com/item?id=47501729

LiteLLM Python package compromised by supply-chain attack | Hacker News

Self-propagating malware poisons open source software and wipes Iran-based machines

Development houses: It's time to check your networks for infections.

Ars Technica

@dangoodin I think it's "in an atomic way", meaning "rotate all credentials in one operation", so that attackers cannot use the still working creds to observe the new ones while they are being updated one after another.

And I agree, it's absolutely crazy right now.

@dubbel

Yes, you're right, of course. Rotating creds at an atomic level would be quite a thing, no?

@dangoodin does only affect the pip install, right?