Top issues
Detected presence of version control tool artifacts.
Causes risk: source control artifacts found
secrets
Problem
Source Code Management (SCM) tools provide version control tracking for application source code. They track development histories for each source code unit, and store them in a version-control-specific database format. For convenience, the source code repository and its version control database typically reside in the same folder. Because some programming languages package source code as an artifact during the build, it is possible to misconfigure the packaging step and include the version control database. Contents of this database include all historic changes for the version control tracked repository. This includes private keys, certificates, and other sensitive information that should be kept secret. Given the access to a version control database, an attacker could use its artifacts to extract sensitive information, and gain privileged access.Prevalence in PowerShell Gallery community
1 packages
found in
Top 100
53 packages
found in
Top 1k
346 packages
found in
Top 10k
511 packages
in community
Next steps
Remove all version control databases and their artifacts from the package before you release it.
Detected presence of software components that can tamper with the system security settings.
hunting
Problem
Software components sometimes need to interact with higher privilege parts of the operating system, often requiring administrative access to accomplish a task. System security settings are the first line of defense against the most common attack vectors. For that reason, attackers often aim to tamper with system security settings. Disabling User Access Controls (UAC) and other security settings enables malicious code to execute without being blocked. While the presence of code that tampers with system security settings does not necessarily imply malicious intent, all of its uses in a software package should be documented and approved. Only select applications should consider using functions that interact with system security settings. One example of acceptable use for such functions is allowing specialized applications to install as services that monitor the operating system events.Prevalence in PowerShell Gallery community
5 packages
found in
Top 100
86 packages
found in
Top 1k
726 packages
found in
Top 10k
1.29k packages
in community
Next steps
Investigate reported detections as indicators of software tampering.
Consult Mitre ATT&CK documentation: T1562.001 - Disable or Modify Tools.
Consider rewriting the flagged code without using the marked behaviors.
Problem
Uniform Resource Locators (URLs) are structured addresses that point to locations and assets on the internet. URLs allow software developers to build complex applications that exchange data with servers that can be hosted in multiple geographical regions. URLs can commonly be found embedded in documentation, configuration files, source code and compiled binaries. One or more embedded URLs were discovered to link to raw files hosted on GitHub. Attackers often abuse popular web services to host malicious payloads. Since code-sharing services URLs are typically allowed by security solutions, using them for payload delivery increases the odds that the malicious code will reach the user. While the presence of code-sharing service locations does not imply malicious intent, all of their uses in a software package should be documented and approved. An increasing number of software supply chain attacks in the open source space leverages the GitHub service to deliver malicious payloads.Prevalence in PowerShell Gallery community
7 packages
found in
Top 100
387 packages
found in
Top 1k
1476 packages
found in
Top 10k
2.58k packages
in community
Next steps
Investigate reported detections.
If the software should not include these network references, investigate your build and release environment for software supply chain compromise.
You should delay the software release until the investigation is completed, or until the issue is risk accepted.
Consider an alternative delivery mechanism for software packages.
Problem
Software components contain executable code that performs actions implemented during its development. These actions are called behaviors. In the analysis report, behaviors are presented as human-readable descriptions that best match the underlying code intent. While most behaviors are benign, some are commonly abused by malicious software with the intent to cause harm. When a software package shares behavior traits with malicious software, it may become flagged by security solutions. Any detection from security solutions can cause friction for the end-users during software deployment. While the behavior is likely intended by the developer, there is a small chance this detection is true positive, and an early indication of a software supply chain attack.Prevalence in PowerShell Gallery community
13 packages
found in
Top 100
176 packages
found in
Top 1k
997 packages
found in
Top 10k
1.61k packages
in community
Next steps
Investigate reported detections.
If the software intent does not relate to the reported behavior, investigate your build and release environment for software supply chain compromise.
You should delay the software release until the investigation is completed, or until the issue is risk accepted.
Consider rewriting the flagged code without using the marked behaviors.
Problem
Attackers commonly hide their malicious payloads in layers of packing and code obfuscation. Base-encoding is a common data transformation technique used to convert binary payloads into text. Detected software behaviors indicate that the code has the ability to decode and execute Base-encoded data. While presence of dynamic code execution does not imply malicious intent, all of its uses in a software package should be documented and approved. When a software package has behavior traits similar to malicious software, it may become flagged by security solutions. One example of acceptable use for dynamic Base-encoded data execution is transfer of software components over the network.Prevalence in PowerShell Gallery community
1 packages
found in
Top 100
15 packages
found in
Top 1k
137 packages
found in
Top 10k
200 packages
in community
Next steps
Investigate reported detections as indicators of software tampering.
Consult Mitre ATT&CK documentation: T1027 - Obfuscated Files or Information.
Consider rewriting the flagged code without using the marked behaviors.
Top behaviors
Tampers with network adapters.
settings
Prevalence in PowerShell Gallery community
Behavior uncommon for this community (Uncommon)
1 packages
found in
Top 100
24 packages
found in
Top 1k
112 packages
found in
Top 10k
217 packages
in community
Tampers with installed applications.
settings
Prevalence in PowerShell Gallery community
Behavior often found in this community (Common)
4 packages
found in
Top 100
54 packages
found in
Top 1k
328 packages
found in
Top 10k
518 packages
in community
Tampers with certificates and certificate store.
settings
Prevalence in PowerShell Gallery community
Behavior often found in this community (Common)
1 packages
found in
Top 100
38 packages
found in
Top 1k
171 packages
found in
Top 10k
292 packages
in community
Tampers with Windows features, roles or role services.
settings
Prevalence in PowerShell Gallery community
Behavior uncommon for this community (Uncommon)
1 packages
found in
Top 100
17 packages
found in
Top 1k
107 packages
found in
Top 10k
163 packages
in community
Tampers with NIC Teaming (load balancing and failover) settings.
settings
Prevalence in PowerShell Gallery community
Behavior uncommon for this community (Uncommon)
0 packages
found in
Top 100
5 packages
found in
Top 1k
16 packages
found in
Top 10k
25 packages
in community
Top vulnerabilities
No vulnerabilities found.