Spectra Assure
Community
Docs
passEverything is awesome!
Scanned: 27 days ago

@parcel/rust-darwin-arm64

latest
License: Permissive (MIT)
Published: about 1 month ago



SAFE Assessment

Compliance

Licenses
No license compliance issues
Secrets
No sensitive information found

Security

Vulnerabilities
No known vulnerabilities detected
Hardening
No application hardening issues

Threats

Tampering
No evidence of software tampering
Malware
No evidence of malware inclusion

Popularity

308.51k
Recorded Downloads Since 2021
Contributor
Declared Dependencies
2
Dependents

Top issues

Problem

Operating systems execute application code in multiple privilege access levels. Separation of privileges is designed to protect the stability and integrity of the operating system by shielding it from issues that the user run applications may cause. However, some users may need to interact with higher privilege parts of the operating system to accomplish specific tasks. For this purpose, operating systems provide facilities that users may leverage to temporarily elevate their running privileges. Users with higher privileges can run any application with the same privilege level as their own. Attackers often try to trick privileged users into running malicious code, enabling them to infect the operating system. While the presence of code that elevates user privileges does not necessarily imply malicious intent, all of its uses in a software package should be documented and approved. Only select applications should consider using functions that can elevate user privileges. One example of acceptable use for such functions is allowing the users to install software packages and updates.

Prevalence in npm community

0 packages
found in
Top 100
0 packages
found in
Top 1k
66 packages
found in
Top 10k
10036 packages
in community

Next steps

Investigate reported detections as indicators of software tampering.
Consult Mitre ATT&CK documentation: T1548 - Abuse Elevation Control Mechanism.
Consider rewriting the flagged code without using the marked behaviors.

Top behaviors

Prevalence in npm community

Behavior often found in this community (Common)
0 packages
found in
Top 100
2 packages
found in
Top 1k
140 packages
found in
Top 10k
26292 packages
in community

Prevalence in npm community

Behavior often found in this community (Common)
0 packages
found in
Top 100
0 packages
found in
Top 1k
59 packages
found in
Top 10k
8883 packages
in community

Prevalence in npm community

Behavior often found in this community (Common)
16 packages
found in
Top 100
80 packages
found in
Top 1k
1432 packages
found in
Top 10k
442524 packages
in community

Prevalence in npm community

Behavior often found in this community (Common)
3 packages
found in
Top 100
30 packages
found in
Top 1k
512 packages
found in
Top 10k
315846 packages
in community

Prevalence in npm community

Behavior often found in this community (Common)
0 packages
found in
Top 100
0 packages
found in
Top 1k
85 packages
found in
Top 10k
16391 packages
in community

Top vulnerabilities

No vulnerabilities found.