Incident Scoping Via Reproducible Ecosystem Measurement
Sources: 1 • Confidence: Medium • Updated: 2026-04-13 03:53
Key takeaways
- Exposure to the compromised LiteLLM releases was estimated by querying the BigQuery PyPI dataset for the specific time window when the packages were live on PyPI.
- During the 46-minute period when exploited LiteLLM versions 1.82.7 and 1.82.8 were live on PyPI, there were 46,996 downloads across those versions.
- 88% of packages that depend on LiteLLM did not pin versions in a way that would have avoided the exploited version.
Sections
Incident Scoping Via Reproducible Ecosystem Measurement
- Exposure to the compromised LiteLLM releases was estimated by querying the BigQuery PyPI dataset for the specific time window when the packages were live on PyPI.
Blast Radius Bounded By Time-Windowed Download Exposure
- During the 46-minute period when exploited LiteLLM versions 1.82.7 and 1.82.8 were live on PyPI, there were 46,996 downloads across those versions.
Systemic Risk Factor: Weak Version Constraints In Dependents
- 88% of packages that depend on LiteLLM did not pin versions in a way that would have avoided the exploited version.
Unknowns
- What exact BigQuery query (including filters, identifiers, and dataset tables) was used to produce the exposure estimate?
- How many of the 46,996 downloads correspond to unique environments or organizations versus repeated downloads by the same automated systems?
- What fraction of downloading environments actually installed and executed the compromised code (as opposed to downloading without execution)?
- Which packages were included in the computation of "packages that depend on LiteLLM," and what criteria were used to determine whether pinning would have avoided the exploited version?
- What is the absolute number (not just the percentage) of dependent packages evaluated for the 88% pinning statistic?