A malicious release of litellm version 1.82.8 was published to PyPI on March 24, 2026.
The package contains a hidden .pth file that executes on every Python interpreter startup, spawning a subprocess that triggers the same .pth again, creating an exponential fork bomb.
The malware harvests credentials (SSH keys, cloud provider tokens, Kubernetes configs, environment variables, etc.), encrypts them with a hard‑coded RSA key, and exfiltrates them to a malicious domain.
Simon Willison introduces llm-smollm2, a plugin for LLM that includes a quantized version of the SmolLM2-135M-Instruct model. The article details how to install and use the model, discusses the process of finding, building, packaging, and publishing the plugin, and evaluates the model's capabilities.