Top issues
Detected Windows executable files that embed PDB files whose integrity is verified with an insecure hashing algorithm.
Causes risk: outdated toolchains detected
hardening
Problem
Program database (PDB) files are typically only used during software development. They contain private debug symbols that make it significantly easier to reverse engineer a closed-source application. In some cases, having a program database file is equivalent to having access to the source code. Presence of program databases could indicate that one or more software components have been built using a debug profile, instead of the release.Prevalence in PowerShell Gallery community
3 packages
found in
Top 100
28 packages
found in
Top 1k
129 packages
found in
Top 10k
229 packages
in community
Next steps
Private debug database files should not be embedded within executables, and you should remove them from the software package before releasing it.
The integrity verification of the embedded database files should not be done with insecure hashing algorithms. SHA1 and MD5 hashes should be deprecated throughout the application, and a more secure SHA256 algorithm should be used instead.
Problem
Uniform Resource Locators (URLs) are structured addresses that point to locations and assets on the internet. URLs allow software developers to build complex applications that exchange data with servers that can be hosted in multiple geographical regions. URLs can commonly be found embedded in documentation, configuration files, source code and compiled binaries. Top-level domains (TLD) are a part of the Domain Name System (DNS), and are used to lookup an Internet Protocol (IP) address of a requested website. There are a few different types of top-level domains. Generic, sponsored and country-code TLDs are generally accessible to the public. Registrars that govern the assignment of domain names within the TLD may choose to sell specific domain names to an interested party. However, some registrars are known to have less strict rules for assigning domain names. Attackers often abuse gaps in governance and actively seek to register their malicious domains in such TLDs. This issue is raised for all domains registered within TLDs that harbor an excessive number of malicious sites. While the presence of suspicious TLDs does not imply malicious intent, all of its uses in a software package should be documented and approved.Prevalence in PowerShell Gallery community
2 packages
found in
Top 100
35 packages
found in
Top 1k
181 packages
found in
Top 10k
325 packages
in community
Next steps
Investigate reported detections.
If the software should not include these network references, investigate your build and release environment for software supply chain compromise.
You should delay the software release until the investigation is completed, or until the issue is risk accepted.
Consider changing the top-level domain to avoid being flagged by security solutions.
Problem
Software developers use programming and design knowledge to build reusable software components. Software components are the basic building blocks for modern applications. Software consumed by an enterprise consists of hundreds, and sometimes even thousands of open source components. Open source communities depend on the work of thousands of software developers that volunteer their time to maintain software components. Software developers build up the reputation of their open source projects by developing in public. Modern source code repositories have many social features that allow software developers to handle bug reports, have discussions with their users, and convey reaching significant project milestones. It is uncommon to find open source projects that omit linking their component to a publicly accessible source code repository.Prevalence in PowerShell Gallery community
100 packages
found in
Top 100
900 packages
found in
Top 1k
8992 packages
found in
Top 10k
17108 packages
in community
Next steps
Check the software component behaviors for anomalies.
Consider exploratory software component testing within a sandbox environment.
Consider replacing the software component with a more widely used alternative.
Avoid using this software package until it is vetted as safe.
Problem
Debug databases are typically only used during software development. On Windows, they are usually files embedded into the executable (PDB), while on Linux, they're contained inside special executable sections. The databases contain private debug symbols that make it significantly easier to reverse-engineer a closed-source application. In some cases, having a debug database is equivalent to having access to the source code. Presence of debug databases could indicate that one or more software components have been built using a debug profile, instead of the release. Private debug databases can be embedded into software components by programming language tools.Prevalence in PowerShell Gallery community
3 packages
found in
Top 100
38 packages
found in
Top 1k
172 packages
found in
Top 10k
321 packages
in community
Next steps
To remediate this issue and remove private debugging information, refer to your programming language toolchain documentation.
Top behaviors
Decodes data using the Base64 algorithm.
packer
Prevalence in PowerShell Gallery community
Behavior often found in this community (Common)
68 packages
found in
Top 100
371 packages
found in
Top 1k
1732 packages
found in
Top 10k
2838 packages
in community
Contains URLs that use suspicious top-level domains.
network
Prevalence in PowerShell Gallery community
Behavior uncommon for this community (Uncommon)
2 packages
found in
Top 100
35 packages
found in
Top 1k
183 packages
found in
Top 10k
328 packages
in community
Contains IP addresses.
network
Prevalence in PowerShell Gallery community
Behavior often found in this community (Common)
97 packages
found in
Top 100
693 packages
found in
Top 1k
4437 packages
found in
Top 10k
7330 packages
in community
Contains URLs.
network
Prevalence in PowerShell Gallery community
Behavior often found in this community (Common)
90 packages
found in
Top 100
516 packages
found in
Top 1k
2293 packages
found in
Top 10k
3528 packages
in community
Contains URLs related to URL shortener services.
network
Prevalence in PowerShell Gallery community
Behavior often found in this community (Common)
88 packages
found in
Top 100
346 packages
found in
Top 1k
1005 packages
found in
Top 10k
1856 packages
in community
Top vulnerabilities
No vulnerabilities found.