Top issues
Problem
Uniform Resource Locators (URLs) are structured addresses that point to locations and assets on the internet. URLs allow software developers to build complex applications that exchange data with servers that can be hosted in multiple geographical regions. URLs can commonly be found embedded in documentation, configuration files, source code and compiled binaries. A port number is associated with a network address of a host, such as an IP address, and the type of network protocol used for communication. Within URLs, the ports are optional. Ports can be specified in a URL immediately following the domain name. Each network protocol, or schema, has a set of standard ports on which the service operates. This issue is raised when a mismatch between a network protocol and its expected port number is detected. While the presence of non-standard ports does not imply malicious intent, all of their uses in a software package should be documented and approved.Prevalence in npm community
6 packages
found in
Top 100
41 packages
found in
Top 1k
869 packages
found in
Top 10k
490844 packages
in community
Next steps
Investigate reported detections.
If the software should not include these network references, investigate your build and release environment for software supply chain compromise.
You should delay the software release until the investigation is completed, or until the issue is risk accepted.
Consider changing the port to one that is standard for the networking protocol.
Problem
Unicode is a text encoding standard designed to support the use of text written in all of the major languages and writing systems. While most languages are written from left to right, some are written in alternative directions. To accommodate encoding text written in such languages, the Unicode standard includes a number of special characters that allow the text direction to be specified. However, changing text direction can have adverse effects on how the encoded text is displayed and interpreted. For this reason, bidirectional Unicode control characters are commonly abused by malicious actors as a means of bypassing security solutions and avoiding detection. While presence of special Unicode characters does not imply malicious intent, all of its uses in a software package should be documented and approved. One example of acceptable use for these special characters is in script files that parse, validate, and transform Unicode-encoded text.Prevalence in npm community
5 packages
found in
Top 100
20 packages
found in
Top 1k
367 packages
found in
Top 10k
106764 packages
in community
Next steps
Investigate reported detections as indicators of software tampering.
Consult Mitre ATT&CK documentation: T1036.002 - Masquerading: Right-to-Left Override.
Consult publicly available materials on the Trojan Source vulnerability.
Top behaviors
Might contain potentially obfuscated code or data.
anomaly
Prevalence in npm community
Behavior often found in this community (Common)
21 packages
found in
Top 100
136 packages
found in
Top 1k
1248 packages
found in
Top 10k
390529 packages
in community
Encodes data using the Base64 algorithm.
packer
Prevalence in npm community
Behavior often found in this community (Common)
7 packages
found in
Top 100
61 packages
found in
Top 1k
956 packages
found in
Top 10k
319930 packages
in community
Decrypts data using Advanced Encryption Standard (AES).
packer
Prevalence in npm community
Behavior often found in this community (Common)
1 packages
found in
Top 100
3 packages
found in
Top 1k
125 packages
found in
Top 10k
25907 packages
in community
Decodes data using the Base64 algorithm.
packer
Prevalence in npm community
Behavior often found in this community (Common)
6 packages
found in
Top 100
44 packages
found in
Top 1k
657 packages
found in
Top 10k
175209 packages
in community
Opens a TCP connection to a remote server.
network
Prevalence in npm community
Behavior often found in this community (Common)
4 packages
found in
Top 100
23 packages
found in
Top 1k
360 packages
found in
Top 10k
53222 packages
in community
Top vulnerabilities
No vulnerabilities found.