Behaviors
List of software behaviors discovered with static code analysis.
Requests permission required to perform restore operations. (x2)
permissions
Requests permission required to perform a number of security-related functions, such as controlling and viewing audit messages. (x2)
permissions
Prompts user for credentials. (x4)
behavior
Accesses the /etc/apt directory. (x1)
file
Requests permission required to create a symbolic link. (x2)
permissions
Tampers with user/account privileges. (x2)
permissions
Downloads files via HTTP. (x1)
network
Accesses the /dev/null pseudo-file. (x1)
file
Decompresses a Tar archive. (x1)
file
Runs a command in a new Docker container. (x1)
execution