OPEN_SOURCE ↗
HN · HACKER_NEWS// 14d agoSECURITY INCIDENT
Telnyx Python SDK compromised on PyPI
Telnyx says unauthorized versions 4.87.1 and 4.87.2 of its Python SDK were briefly published to PyPI on March 27, 2026, and both contained malicious code. The company says its platform and APIs were untouched, but anyone who installed the package during that window should downgrade and rotate secrets.
// ANALYSIS
This is the worst kind of supply-chain incident: a normal `pip install` can become malware delivery, even when the vendor's core service is fine. The narrow time window helps, but unpinned dependencies and CI automation can still make the blast radius surprisingly wide.
- –The bad releases were live for only a few hours, so floating version ranges are the biggest risk.
- –Aikido reports the payload runs at import time and hides a second stage in `.wav` files, which is exactly the sort of trick that slips past naive scanners.
- –Telnyx says the platform, APIs, and infrastructure were not compromised, so the incident is about package distribution and publishing credentials, not backend access.
- –The incident fits the same March 2026 supply-chain wave that hit Trivy, Checkmarx, and LiteLLM, which is a reminder to review CI/CD tokens, build caches, and dependency pinning together.
- –Teams that touched `telnyx` in the window should treat the environment as compromised, not merely outdated.
// TAGS
telnyx-python-sdksdkapidevtool
DISCOVERED
14d ago
2026-03-28
PUBLISHED
15d ago
2026-03-27
RELEVANCE
7/ 10
AUTHOR
overflowy