Litellm versions 1.82.7 and 1.82.8 on PyPI were compromised in a supply chain attack, injecting a malicious `.pth` file that steals sensitive data like API keys, SSH keys, and cloud credentials upon Python process start. The attacker gained access by compromising Trivy, a vulnerability scanner, to steal Litellm's publish token. This incident poses a significant risk, affecting over 2000 downstream packages including dspy and mlflow.