Top issues
Detected digital signatures that rely on a weak digest algorithm for integrity validation.
signatures
Problem
Digital signatures are applied to applications, packages and documents as a cryptographically secured authenticity record. Signatures verify the origin and the integrity of the object they apply to. The integrity validation relies on the cryptographic strength of the encryption and the hash verification algorithm. If either of the two is considered weak by current standards, there is a chance the signed object could be maliciously modified, without triggering the integrity failure check.Prevalence in PowerShell Gallery community
87 packages
found in
Top 100
354 packages
found in
Top 1k
1060 packages
found in
Top 10k
1.69k packages
in community
Next steps
Create signatures with strong ECC key-length of at least 224 bits, or RSA key-length of at least 2048 bits, and use SHA256 as the hashing algorithm. While encryption key-length upgrade does require you to obtain a new certificate, the hashing algorithm can freely be selected during signing.
With Microsoft SignTool, you can specify the hashing algorithm using the /fd SHA256 parameter.
Detected digital signatures that have not been performed with an extended validation certificate.
signatures
Problem
Digital signatures are applied to applications, packages and documents as a cryptographically secured authenticity record. Signatures are made using digital certificates, which can either be purchased from certificate authorities or be self-issued. When a certificate is purchased from a certificate authority, the subject that requests it goes through an identity validation process. Depending on the certificate type, those checks can be basic or extended. Confirming the subject identity is a multi-step process, and the requesting subject can be mapped to its legal entity name only through extended validation of submitted documents. Extended identity validation typically costs more, and it takes longer for a certificate to be issued when this process is correctly followed.Prevalence in PowerShell Gallery community
89 packages
found in
Top 100
261 packages
found in
Top 1k
994 packages
found in
Top 10k
1.58k packages
in community
Next steps
Consider the benefits of acquiring extended validation certificates. Operating systems tend to be more trusting of software packages signed in this way. Certain security warnings and prompts might also be automatically suppressed. This reduces the number of support tickets for organizations that opt to use extended validation certificates.
Top behaviors
Encodes data using the Base64 algorithm.
packer
Prevalence in PowerShell Gallery community
Behavior often found in this community (Common)
76 packages
found in
Top 100
404 packages
found in
Top 1k
2152 packages
found in
Top 10k
3.59k packages
in community
Decodes data using the Base64 algorithm.
packer
Prevalence in PowerShell Gallery community
Behavior often found in this community (Common)
71 packages
found in
Top 100
370 packages
found in
Top 1k
1737 packages
found in
Top 10k
2.88k packages
in community
Downloads a file.
network
Prevalence in PowerShell Gallery community
Behavior often found in this community (Common)
20 packages
found in
Top 100
249 packages
found in
Top 1k
1492 packages
found in
Top 10k
2.42k packages
in community
Contains IP addresses.
network
Prevalence in PowerShell Gallery community
Behavior often found in this community (Common)
97 packages
found in
Top 100
694 packages
found in
Top 1k
4447 packages
found in
Top 10k
7.42k packages
in community
Enumerates system information.
search
Prevalence in PowerShell Gallery community
Behavior often found in this community (Common)
24 packages
found in
Top 100
254 packages
found in
Top 1k
1236 packages
found in
Top 10k
2.03k packages
in community
Top vulnerabilities
No vulnerabilities found.