Dependency Cooldowns As A Mainstream Supply-Chain Mitigation
Sources: 1 • Confidence: High • Updated: 2026-04-12 10:19
Key takeaways
- A supply chain attack affecting LiteLLM prompted renewed focus on dependency cooldowns.
- Relative duration support for pip’s --uploaded-prior-to has been requested but is not yet implemented.
- An Andrew Nesbitt article published March 4 reviews the current state of dependency cooldown mechanisms across packaging tools.
- Between September 2025 and February 2026, multiple package managers added or highlighted minimum dependency age controls, including pnpm, Yarn, Bun, Deno, uv, pip, and npm.
- Dependency cooldowns reduce supply-chain risk by delaying installation of newly updated dependencies for a few days to allow time for community detection of subversion.
Sections
Dependency Cooldowns As A Mainstream Supply-Chain Mitigation
- A supply chain attack affecting LiteLLM prompted renewed focus on dependency cooldowns.
- Between September 2025 and February 2026, multiple package managers added or highlighted minimum dependency age controls, including pnpm, Yarn, Bun, Deno, uv, pip, and npm.
- Dependency cooldowns reduce supply-chain risk by delaying installation of newly updated dependencies for a few days to allow time for community detection of subversion.
- Dependency cooldown support is described as surprisingly well supported with a recent flurry of activity across major packaging tools.
Operational Details: Exemptions And Pip Ergonomics Gaps
- Relative duration support for pip’s --uploaded-prior-to has been requested but is not yet implemented.
- pnpm and Yarn support dependency age gating with exemption mechanisms for trusted or preapproved packages.
- A workaround for pip’s lack of relative dates is to run a scheduled cron job that keeps an absolute date in pip.conf up to date.
State-Of-The-World Consolidation Reference
- An Andrew Nesbitt article published March 4 reviews the current state of dependency cooldown mechanisms across packaging tools.
Watchlist
- Relative duration support for pip’s --uploaded-prior-to has been requested but is not yet implemented.
Unknowns
- What were the specific indicators of compromise, timeline, and downstream impact (if any) of the LiteLLM supply-chain attack referenced here?
- What is the actual effectiveness of dependency cooldowns (e.g., reduction in incident rate or blast radius), and under what conditions do they fail (targeted attacks, low visibility packages, rapid exploitation)?
- For each mentioned package manager, what are the exact semantics (age threshold definition, transitive dependency handling, lockfile interactions, registry metadata trust assumptions) of the minimum-age controls?
- How commonly are age-gating controls enabled by default versus requiring explicit opt-in, and what is the real-world adoption rate among organizations?
- Will pip implement relative duration support for --uploaded-prior-to, and if so on what timeline and with what interface guarantees?