Spectra Assure
Community
Docs
passEverything is awesome!
Scanned: 4 days ago

Kelverion.ServiceDeskPlus

latest
Top 10k
This Integration Module provides cmdlets for automating interaction with ManageEngine ServiceDesk Plus and is designed to be used with Runbook Studio and Azure Automation. Get more information and download the Runbook Studio from (https://www.kelverion.com/runbook-studio/). For a free evaluation licence please email info@kelverion.com.
License: unknown
Published: almost 2 years ago




SAFE Assessment

Compliance

Licenses
No license compliance issues
Secrets
No sensitive information found

Security

Vulnerabilities
No known vulnerabilities detected
Hardening
No application hardening issues

Threats

Tampering
No evidence of software tampering
Malware
No evidence of malware inclusion

Popularity

550
Total Downloads
Contributors
Declared Dependencies
0
Dependents

Top issues

Problem

Digital signatures are applied to applications, packages and documents as a cryptographically secured authenticity record. Signatures verify the origin and the integrity of the object they apply to. The integrity validation relies on the cryptographic strength of the encryption and the hash verification algorithm. If either of the two is considered weak by current standards, there is a chance the signed object could be maliciously modified, without triggering the integrity failure check.

Prevalence in PowerShell Gallery community

85 packages
found in
Top 100
354 packages
found in
Top 1k
1054 packages
found in
Top 10k
1674 packages
in community

Next steps

Create signatures with strong ECC key-length of at least 224 bits, or RSA key-length of at least 2048 bits, and use SHA256 as the hashing algorithm. While encryption key-length upgrade does require you to obtain a new certificate, the hashing algorithm can freely be selected during signing.
With Microsoft SignTool, you can specify the hashing algorithm using the /fd SHA256 parameter.

Problem

Digital signatures are applied to applications, packages and documents as a cryptographically secured authenticity record. Signatures are made using digital certificates, which can either be purchased from certificate authorities or be self-issued. When a certificate is purchased from a certificate authority, the subject that requests it goes through an identity validation process. Depending on the certificate type, those checks can be basic or extended. Confirming the subject identity is a multi-step process, and the requesting subject can be mapped to its legal entity name only through extended validation of submitted documents. Extended identity validation typically costs more, and it takes longer for a certificate to be issued when this process is correctly followed.

Prevalence in PowerShell Gallery community

86 packages
found in
Top 100
259 packages
found in
Top 1k
991 packages
found in
Top 10k
1561 packages
in community

Next steps

Consider the benefits of acquiring extended validation certificates. Operating systems tend to be more trusting of software packages signed in this way. Certain security warnings and prompts might also be automatically suppressed. This reduces the number of support tickets for organizations that opt to use extended validation certificates.

Problem

Private keys and certificates are considered sensitive information that should not be included in released software packages. However, developers frequently release sensitive information alongside their applications to facilitate automated software testing. Testing keys and certificates often proliferate through the software supply chain. When such information gets shared publicly, it is catalogued by file reputation databases. Any private key and certificate files seen by a file reputation database prior to configured time threshold can be automatically suppressed. Commonly shared sensitive information is not considered to be secret.

Prevalence in PowerShell Gallery community

5 packages
found in
Top 100
126 packages
found in
Top 1k
372 packages
found in
Top 10k
632 packages
in community

Next steps

Review the commonly shared sensitive information for evidence of inadvertently exposed secrets.
If the keys were published unintentionally and the software has been made public, you should revoke the keys and file a security incident.

Top behaviors

Prevalence in PowerShell Gallery community

Behavior often found in this community (Common)
5 packages
found in
Top 100
50 packages
found in
Top 1k
480 packages
found in
Top 10k
686 packages
in community

Prevalence in PowerShell Gallery community

Behavior often found in this community (Common)
4 packages
found in
Top 100
46 packages
found in
Top 1k
401 packages
found in
Top 10k
576 packages
in community

Prevalence in PowerShell Gallery community

Behavior often found in this community (Common)
74 packages
found in
Top 100
404 packages
found in
Top 1k
2154 packages
found in
Top 10k
3540 packages
in community

Prevalence in PowerShell Gallery community

Behavior often found in this community (Common)
68 packages
found in
Top 100
371 packages
found in
Top 1k
1732 packages
found in
Top 10k
2838 packages
in community

Prevalence in PowerShell Gallery community

Behavior often found in this community (Common)
6 packages
found in
Top 100
53 packages
found in
Top 1k
515 packages
found in
Top 10k
740 packages
in community

Top vulnerabilities

No vulnerabilities found.