Spectra Assure
Community
Docs
failRisk: Secrets
Scanned: about 3 hours ago

Microsoft.Windows.SDK.CPP

latest
Top 10k
The Windows SDK available as a NuGet package for more seamless acquisition and CI/CD integration. This package is designed for C++ applications. One or more architecture-specific packages are required (Microsoft.Windows.SDK.cpp.<.arch>).
License: unknown
Published: 9 days ago


SAFE Assessment

Compliance

Licenses
No license compliance issues
Secrets
3 plaintext private keys found

Security

Vulnerabilities
No known vulnerabilities detected
Hardening
93 ineffective mitigations detected

Threats

Tampering
No evidence of software tampering
Malware
No evidence of malware inclusion

Popularity

925.7k
Total Downloads
Contributors
Declared Dependencies
17
Dependents

Top issues

Problem

Private keys are used to protect sensitive information, digitally sign content, and to secure information transmission. Private keys are considered secrets, and as such should never be published. Depending on the private key type its exposure can carry a varying degree of risk. While it is common for private keys to be found as standalone files, the detected ones have been found embedded within another software package component. This could indicate an attempt to hide private key presence. Attackers abuse private keys to gain unauthorized server access, decrypt sensitive information, digitally sign content, or impersonate users whose private keys have been leaked.

Prevalence in NuGet community

0 packages
found in
Top 100
1 packages
found in
Top 1k
5 packages
found in
Top 10k
330 packages
in community

Next steps

Review the reported private keys and remove them from the software package if they were accidentally included.
If the keys were published unintentionally and the software has been made public, you should revoke the keys and file a security incident.

Problem

Address Space Layout Randomization (ASLR) is a vulnerability mitigation option that forces software components to load on a different memory base address each time they are used. This mitigation is detected as enabled, but rendered ineffective due to the lack of code relocations necessary for layout randomization. This issue is reported for native 32-bit applications that contain code and opt in to use ASLR. Reasons for relocation absence include forcing software component load on a fixed address, removing relocations post-build, and using non-ASLR-compliant executable packing solutions.

Prevalence in NuGet community

0 packages
found in
Top 100
0 packages
found in
Top 1k
3 packages
found in
Top 10k
1188 packages
in community

Next steps

Review the programming language linker documentation.
In Microsoft VisualStudio, make sure the linker option /FIXED is disabled (set to OFF).

Problem

Security Development Lifecycle (SDL) is a group of enhanced compile-time checks that report common coding mistakes as errors, preventing them from reaching production. These checks minimize the number of security issues by enforcing strict memory access checks. They also prevent the use of hard-to-secure string and memory manipulation functions. To prove the binary has been compiled with these checks enabled, the compiler emits a special debug object. Removing the debug table eliminates this proof. Therefore, this check only applies to binaries that still have their debug tables.

Prevalence in NuGet community

0 packages
found in
Top 100
3 packages
found in
Top 1k
47 packages
found in
Top 10k
13120 packages
in community

Next steps

You should keep the debug table to prove that the SDL process has been followed.
To enable these checks, refer to your programming language toolchain documentation.
In Microsoft VisualStudio, you can enable this feature by setting the compiler option /SDL to ON.

Problem

Software components contain executable code that performs actions implemented during its development. These actions are called behaviors. In the analysis report, behaviors are presented as human-readable descriptions that best match the underlying code intent. While most behaviors are benign, some are commonly abused by malicious software with the intent to cause harm. When a software package shares behavior traits with malicious software, it may become flagged by security solutions. Any detection from security solutions can cause friction for the end-users during software deployment. While the behavior is likely intended by the developer, there is a small chance this detection is true positive, and an early indication of a software supply chain attack.

Prevalence in NuGet community

0 packages
found in
Top 100
0 packages
found in
Top 1k
4 packages
found in
Top 10k
1095 packages
in community

Next steps

Investigate reported detections.
If the software intent does not relate to the reported behavior, investigate your build and release environment for software supply chain compromise.
You should delay the software release until the investigation is completed, or until the issue is risk accepted.
Consider rewriting the flagged code without using the marked behaviors.

Problem

Uniform Resource Locators (URLs) are structured addresses that point to locations and assets on the internet. URLs allow software developers to build complex applications that exchange data with servers that can be hosted in multiple geographical regions. URLs can commonly be found embedded in documentation, configuration files, source code and compiled binaries. URL paths provide additional information to a web service when making a request. They are an optional, but an important part of the URL, as they may define specific content or actions based on the data being passed. Some parameters they pass might be considered sensitive information. Since path components are not encrypted this might cause sensitive information to leak. This issue is raised for URL paths than might contain information that attackers can easily intercept. Examples of sensitive information fields include passwords and other similar parameters.

Prevalence in NuGet community

0 packages
found in
Top 100
0 packages
found in
Top 1k
9 packages
found in
Top 10k
2279 packages
in community

Next steps

Investigate reported detections.
If the software should not include these network references, investigate your build and release environment for software supply chain compromise.
You should delay the software release until the investigation is completed, or until the issue is risk accepted.
Consider removing all references to flagged network locations.

Top behaviors

Prevalence in NuGet community

Behavior uncommon for this community (Uncommon)
0 packages
found in
Top 100
0 packages
found in
Top 1k
4 packages
found in
Top 10k
133 packages
in community

Prevalence in NuGet community

Behavior often found in this community (Common)
0 packages
found in
Top 100
4 packages
found in
Top 1k
70 packages
found in
Top 10k
23059 packages
in community

Prevalence in NuGet community

Behavior uncommon for this community (Uncommon)
0 packages
found in
Top 100
1 packages
found in
Top 1k
26 packages
found in
Top 10k
6500 packages
in community

Prevalence in NuGet community

Behavior uncommon for this community (Uncommon)
0 packages
found in
Top 100
1 packages
found in
Top 1k
24 packages
found in
Top 10k
6811 packages
in community

Prevalence in NuGet community

Behavior uncommon for this community (Uncommon)
0 packages
found in
Top 100
3 packages
found in
Top 1k
48 packages
found in
Top 10k
10351 packages
in community

Top vulnerabilities

No vulnerabilities found.