Incident Exposure Quantification Via Public Telemetry
Sources: 1 • Confidence: Medium • Updated: 2026-04-12 10:19
Key takeaways
- During the 46-minute period when exploited LiteLLM versions 1.82.7 and 1.82.8 were live on PyPI, there were 46,996 downloads across those versions.
- 88% of packages that depend on LiteLLM did not pin versions in a way that would have avoided the exploited version.
- Download counts for the compromised LiteLLM releases were estimated using the BigQuery PyPI dataset for the time window when the packages were live on PyPI.
Sections
Incident Exposure Quantification Via Public Telemetry
- During the 46-minute period when exploited LiteLLM versions 1.82.7 and 1.82.8 were live on PyPI, there were 46,996 downloads across those versions.
- Download counts for the compromised LiteLLM releases were estimated using the BigQuery PyPI dataset for the time window when the packages were live on PyPI.
Ecosystem Susceptibility From Permissive Dependency Constraints
- 88% of packages that depend on LiteLLM did not pin versions in a way that would have avoided the exploited version.
Unknowns
- What specific BigQuery query, dataset snapshot, and filtering rules were used to derive the download estimate (e.g., exact package names, version filters, timestamp boundaries, and de-duplication)?
- How many of the recorded downloads correspond to unique environments and actual installations (as opposed to caching, CI pipelines, mirrors, retries, or bots)?
- What was the exploit behavior in the compromised LiteLLM versions, and what concrete indicators of compromise (IOCs) were observed?
- What portion of the ecosystem actually resolved to the exploited versions during the 46-minute window given typical resolver behavior and lockfile usage?
- How was the 88% figure computed (dependency graph source, package sampling frame, and how requirement specifiers were parsed and classified as protective vs non-protective)?