Spectra Assure
Community
passEverything is awesome!
Scanned: 9 days ago

PSWikiClient

latest
Top 10k
Access MediaWiki-base sites with PowerShell.
License: unknown
Published: about 8 years ago




SAFE Assessment

Compliance

Licenses
No license compliance issues
Secrets
No sensitive information found

Security

Vulnerabilities
No known vulnerabilities detected
Hardening
No application hardening issues

Threats

Tampering
No evidence of software tampering
Malware
No evidence of malware inclusion

Popularity

495
Total Downloads
Contributor
Declared Dependencies
0
Dependents

Top issues

Problem

Digital signatures are applied to applications, packages and documents as a cryptographically secured authenticity record. Signatures verify the origin and the integrity of the object they apply to. The integrity validation relies on the cryptographic strength of the encryption and the hash verification algorithm. If either of the two is considered weak by current standards, there is a chance the signed object could be maliciously modified, without triggering the integrity failure check.

Prevalence in PowerShell Gallery community

87 packages
found in
Top 100
354 packages
found in
Top 1k
1060 packages
found in
Top 10k
1.69k packages
in community

Next steps

Create signatures with strong ECC key-length of at least 224 bits, or RSA key-length of at least 2048 bits, and use SHA256 as the hashing algorithm. While encryption key-length upgrade does require you to obtain a new certificate, the hashing algorithm can freely be selected during signing.
With Microsoft SignTool, you can specify the hashing algorithm using the /fd SHA256 parameter.

Problem

Digital signatures are applied to applications, packages and documents as a cryptographically secured authenticity record. Signatures are made using digital certificates, which can either be purchased from certificate authorities or be self-issued. When a certificate is purchased from a certificate authority, the subject that requests it goes through an identity validation process. Depending on the certificate type, those checks can be basic or extended. Confirming the subject identity is a multi-step process, and the requesting subject can be mapped to its legal entity name only through extended validation of submitted documents. Extended identity validation typically costs more, and it takes longer for a certificate to be issued when this process is correctly followed.

Prevalence in PowerShell Gallery community

89 packages
found in
Top 100
261 packages
found in
Top 1k
994 packages
found in
Top 10k
1.58k packages
in community

Next steps

Consider the benefits of acquiring extended validation certificates. Operating systems tend to be more trusting of software packages signed in this way. Certain security warnings and prompts might also be automatically suppressed. This reduces the number of support tickets for organizations that opt to use extended validation certificates.

Top behaviors

Prevalence in PowerShell Gallery community

Behavior often found in this community (Common)
76 packages
found in
Top 100
404 packages
found in
Top 1k
2152 packages
found in
Top 10k
3.59k packages
in community

Prevalence in PowerShell Gallery community

Behavior often found in this community (Common)
71 packages
found in
Top 100
370 packages
found in
Top 1k
1737 packages
found in
Top 10k
2.88k packages
in community

Prevalence in PowerShell Gallery community

Behavior often found in this community (Common)
20 packages
found in
Top 100
249 packages
found in
Top 1k
1492 packages
found in
Top 10k
2.42k packages
in community

Prevalence in PowerShell Gallery community

Behavior often found in this community (Common)
97 packages
found in
Top 100
694 packages
found in
Top 1k
4447 packages
found in
Top 10k
7.42k packages
in community

Prevalence in PowerShell Gallery community

Behavior often found in this community (Common)
24 packages
found in
Top 100
254 packages
found in
Top 1k
1236 packages
found in
Top 10k
2.03k packages
in community

Top vulnerabilities

No vulnerabilities found.