Good use-case for https://datatracker.ietf.org/doc/draft-ietf-grow-bmp-adj-rib-out and snapshot auditing before and after changes. Leak didn't last long but it could have been caught within milliseconds verses minutes via oh sh** alarms.
[ i happen to like bmp, but ... ] if the sender did not have the automation or the mops to not leak in the first place, how well will they apply post hoc detection and repair? if the receiver did not filter, and an tier-1 as-path filter would have sufficed in this case, how well do you think they will be at applying post hoc detection and repair? this was an easily preventable ops failure. but what we will do is go to idr and grow and invent 42 more hacks, kinda like ipv6 transition mechanisms. </snark> randy