check_pypi_package_exposure
Checks monitored GitHub repositories within an organization for usage of a specified PyPI package at given versions, identifying affected CI pipelines. Use with developer machine checks for full coverage.
Instructions
Org-wide (CI-side) 'Am I Affected?' check for a PyPI (Python) package. Searches all monitored repos — workflow runs, PRs, and default branches — for uses of the package at the given versions. Pass an empty versions array to match any version. IMPORTANT: this only covers CI. For a complete 'am I affected' answer, also call check_python_package_on_dev_machines in parallel to cover developer laptops. Use this (not check_npm_package_exposure) when the threat-center incident's ecosystem is 'pypi'.
Input Schema
| Name | Required | Description | Default |
|---|---|---|---|
| owner | Yes | GitHub organization | |
| packageName | Yes | PyPI package name, e.g. 'xinference', 'requests' | |
| versions | No | Specific versions to check. Omit or empty to match any version. | |
| seenOnlyInPrs | No | Restrict results to PR-only sightings | |
| startTime | No | Unix timestamp (seconds) — lower bound | |
| endTime | No | Unix timestamp (seconds) — upper bound |