Telnyx package compromised on PyPI

Two bad updates, big finger‑pointing, and “real engineer” memes

TLDR: Two Telnyx Python package updates on PyPI (4.87.1 and 4.87.2) were briefly compromised, prompting downgrades and secret rotation while the core Telnyx platform stayed safe. Comments erupted into SDK vs. plain HTTP turf wars and AI-scanner dreams vs. basic-checker shade—proof supply-chain security is still a minefield.

Another day, another supply‑chain scare: two fresh Telnyx Python package updates on PyPI (4.87.1 and 4.87.2) were booby‑trapped for a few early‑morning hours before being yanked. Telnyx says their platform and customer data are fine; the mess was limited to the Python library. The guidance is blunt: check your version, downgrade to 4.87.0, rotate your secrets, and hunt for weird outbound traffic. Oh, and the malware allegedly hid stuff inside a WAV audio file—yes, spy‑audio—before calling home.

But the real show is in the comments. Investigator vibes from ramimac say multiple teams found it at once and PyPI quarantined the packages. Then the snark cannon fired: “real engineers” don’t use fancy libraries at all, they just call the API directly—cue instant flame war over convenience vs. risk. One camp preaches “pin your dependencies, kids,” while another swears off SDKs entirely.

Enter the futurists: some want Anthropic/OpenAI to run a safe mirror where AI models scan and sandbox every release before it hits your laptop. Skeptics clap back: this wasn’t subtle—“exec(base64.b64decode” allegedly screams “bad idea” to any basic checker. Meanwhile, folks noted Telnyx powers voice features for projects like OpenClaw, triggering the inevitable “how far did this spread?” speculation. Memes poured in—“pip install chaos,” “curl‑and‑pray starter pack,” and a lot of side‑eye at the eternal trade‑off between speed and safety. Drama? Absolutely. Lessons learned? We’ll see.

Key Points

  • Malicious Telnyx Python SDK versions 4.87.1 and 4.87.2 were briefly published to PyPI and have been removed.
  • The incident was limited to the PyPI distribution of the SDK; Telnyx’s platform, services, and production APIs were not compromised.
  • Affected installs occurred between 03:51 and 10:13 UTC on March 27, 2026, including unpinned direct or transitive dependencies.
  • Users should downgrade to telnyx==4.87.0, rotate all accessible secrets, audit for IOCs, and review CI/CD and Docker builds.
  • Indicators include a C2 server at 83.142.209.203:8080 and use of WAV steganography; further IOCs will follow.

Hottest takes

"Shoutouts to all the real engineers who use a generic http client to call APIs and weren’t impacted by this." — TZubiri
"a mirror with LLM scanned and sandbox-evaluated package" — carlsborg
"Every basic checker used by many security companies screams at `exec(base64.b64decode`" — f311a
Made with <3 by @siedrix and @shesho from CDMX. Powered by Forge&Hive.