CDK routines for easily assigning correct and minimal IAM permissions
License: Permissive (Apache-2.0)
Published: over 2 years ago
Licenses
No license compliance issues
Secrets
No sensitive information found
Vulnerabilities
No known vulnerabilities detected
Hardening
No application hardening issues
Tampering
No evidence of software tampering
Malware
No evidence of malware inclusion
List of software behaviors discovered with static code analysis.
Opens a TCP connection to a remote server.2network
Prevalence in PyPI community
Behavior often found in this community (Common) 25.62k packages
in community
Contains URLs that link to raw files on GitHub.3network
Prevalence in PyPI community
Behavior often found in this community (Common) 63.42k packages
in community
Executes files during installation or upon launch.1execution
Prevalence in PyPI community
Behavior uncommon for this community (Uncommon) 7.25k packages
in community
Creates a new TLS socket from an existing TCP socket.2network
Prevalence in PyPI community
Behavior uncommon for this community (Uncommon) Gets the local TLS certificate.2network
Prevalence in PyPI community
Behavior uncommon for this community (Uncommon) Connects through HTTP.2network
Prevalence in PyPI community
Behavior often found in this community (Common) 46.1k packages
in community
Contains Unicode-escaped characters that are otherwise printable.3evasion
Prevalence in PyPI community
Behavior often found in this community (Common) 5.33k packages
in community
Queries the value of an environment variable.18search
Prevalence in PyPI community
Behavior often found in this community (Common) 173.79k packages
in community
Converts binary data to its string representation, commonly used in obfuscation.10packer
Prevalence in PyPI community
Behavior often found in this community (Common) 146.39k packages
in community
Serializes data into the JSON format.15file
Prevalence in PyPI community
Behavior often found in this community (Common) 88.86k packages
in community