Top issues
Problem
Software developers use programming and design knowledge to build reusable software components. Software components are the basic building blocks for modern applications. Software consumed by an enterprise consists of hundreds, and sometimes even thousands of open source components. Open source communities depend on the work of thousands of software developers that volunteer their time to maintain software components. Software developers build up the reputation of their open source projects by developing in public. Modern source code repositories have many social features that allow software developers to handle bug reports, have discussions with their users, and convey reaching significant project milestones. It is uncommon to find open source projects that omit linking their component to a publicly accessible source code repository.Prevalence in PowerShell Gallery community
2 packages
found in
Top 100
22 packages
found in
Top 1k
836 packages
found in
Top 10k
2.54k packages
in community
Next steps
Check the software component behaviors for anomalies.
Consider exploratory software component testing within a sandbox environment.
Consider replacing the software component with a more widely used alternative.
Avoid using this software package until it is vetted as safe.
Problem
Operating systems allow multiple user accounts to coexist on a single computer system. Each registered user has identity information associated with their account. At the very least, user accounts consist of a user name and an optional password. In some cases, user account data may also include personally identifiable information. Extended personal information may include user's given and last name, their email and mailing address, personal photo and their telephone number. Financially motivated attackers may seek to collect personal information for purposes of selling the private data to a third-party. Malicious code that typically exhibits these behavior traits is commonly referred to as an information stealer. While the presence of code that accesses identity information does not necessarily imply malicious intent, all of its uses in a software package should be documented and approved. Accessing identity information is a very common behavior for software packages. One example of acceptable use for such functions is verifying that the active user has purchased a software license that allows them to run the application.Prevalence in PowerShell Gallery community
7 packages
found in
Top 100
96 packages
found in
Top 1k
432 packages
found in
Top 10k
768 packages
in community
Next steps
Investigate reported detections as indicators of software tampering.
Consult Mitre ATT&CK documentation: T1033 - System Owner/User Discovery.
Top behaviors
Tampers with storage subsystem.
settings
Prevalence in PowerShell Gallery community
Behavior uncommon for this community (Uncommon)
2 packages
found in
Top 100
28 packages
found in
Top 1k
160 packages
found in
Top 10k
253 packages
in community
Executes commands on a local or remote computer.
execution
Prevalence in PowerShell Gallery community
Behavior often found in this community (Common)
3 packages
found in
Top 100
97 packages
found in
Top 1k
797 packages
found in
Top 10k
1.25k packages
in community
Enumerates operating system information using WMI.
search
Prevalence in PowerShell Gallery community
Behavior often found in this community (Common)
4 packages
found in
Top 100
54 packages
found in
Top 1k
276 packages
found in
Top 10k
476 packages
in community
The software package does not declare any source code repository.
anomaly
Prevalence in PowerShell Gallery community
Behavior often found in this community (Common)
2 packages
found in
Top 100
22 packages
found in
Top 1k
836 packages
found in
Top 10k
2.54k packages
in community
Enumerates user information.
search
Prevalence in PowerShell Gallery community
Behavior uncommon for this community (Uncommon)
0 packages
found in
Top 100
2 packages
found in
Top 1k
1 packages
found in
Top 10k
6 packages
in community
Top vulnerabilities
No vulnerabilities found.