Top issues
Detected presence of high severity vulnerabilities.
Causes risk: high severity vulnerabilities
vulnerabilities
Problem
Software composition analysis has identified a component with one or more known vulnerabilities. Based on the CVSS scoring, these vulnerabilities have been marked as high severity.Prevalence in PyPI community
50 packages
found in 
Top 100
 352 packages
found in 
Top 1k
 2858 packages
found in 
Top 10k
 108771 packages
in community
Next steps
Perform impact analysis for the reported CVEs.
Update the component to the latest version.
If the update can't resolve the issue, create a plan to isolate or replace the affected component.
Detected Windows shared library files that do not suppress exports which reduces CFG vulnerability mitigation protection effectiveness.
Causes risk: low priority mitigations absent
hardening
Problem
Control Flow Guard (CFG/CFI) protects the code flow integrity by ensuring that dynamic calls are made only to vetted functions. Trusted execution paths rely on the ability of the operating system to build a list of valid function targets. Certain functions can intentionally be disallowed to prevent malicious code from deactivating vulnerability mitigation features. A list of such invalid function targets can include publicly exported symbols. Applications that enhance control flow integrity through export suppression rely on libraries to mark their publicly visible symbols as suppressed. This is done for all symbols that are considered to be sensitive functions, and to which access should be restricted. It is considered dangerous to mix applications that perform export suppression with libraries that do not.Prevalence in PyPI community
26 packages
found in 
Top 100
 130 packages
found in 
Top 1k
 732 packages
found in 
Top 10k
 14459 packages
in community
Next steps
To enable this mitigation on library code, refer to your programming language toolchain documentation.
In Microsoft VisualStudio, you can enable CFG mitigation by passing the /guard:cf parameter to the compiler and linker.
Detected Windows executable files that do not implement long jump control flow vulnerability mitigation protection.
Causes risk: low priority mitigations absent
hardening
Problem
Control Flow Guard (CFG/CFI) protects the code flow integrity by ensuring that indirect calls are made only to vetted functions. This mitigation protects dynamically resolved function targets by instrumenting the code responsible for transferring execution control. Higher-level programming languages implement structured exception handling by managing their own code flow execution paths. As such, they are subject to code flow hijacking during runtime. Language-specific exception handling mitigation enforces execution integrity by instrumenting calls to manage execution context switching. Any deviation from the known and trusted code flow paths will cause the application to terminate. This makes malicious code less likely to execute.Prevalence in PyPI community
30 packages
found in 
Top 100
 141 packages
found in 
Top 1k
 779 packages
found in 
Top 10k
 16437 packages
in community
Next steps
It's highly recommended to enable this option for all software components used at security boundaries, or those that process user controlled inputs.
To enable this mitigation, refer to your programming language toolchain documentation.
In Microsoft VisualStudio, you can enable CFG mitigation by passing the /guard:cf parameter to the compiler and linker.
Problem
Operating systems allow multiple user accounts to coexist on a single computer system. Each registered user has identity information associated with their account. At the very least, user accounts consist of a user name and an optional password. In some cases, user account data may also include personally identifiable information. Extended personal information may include user's given and last name, their email and mailing address, personal photo and their telephone number. Financially motivated attackers may seek to collect personal information for purposes of selling the private data to a third-party. Malicious code that typically exhibits these behavior traits is commonly referred to as an information stealer. While the presence of code that accesses identity information does not necessarily imply malicious intent, all of its uses in a software package should be documented and approved. Accessing identity information is a very common behavior for software packages. One example of acceptable use for such functions is verifying that the active user has purchased a software license that allows them to run the application.Prevalence in PyPI community
14 packages
found in 
Top 100
 94 packages
found in 
Top 1k
 529 packages
found in 
Top 10k
 17318 packages
in community
Next steps
Investigate reported detections as indicators of software tampering.
Consult Mitre ATT&CK documentation: T1033 - System Owner/User Discovery.
Top behaviors
Encodes data using the Base64 algorithm.
packer
Prevalence in PyPI community
Behavior often found in this community (Common)
39 packages
found in 
Top 100
 280 packages
found in 
Top 1k
 1754 packages
found in 
Top 10k
 67026 packages
in community
Decodes hex or base64-encoded streams.
packer
Prevalence in PyPI community
Behavior often found in this community (Common)
34 packages
found in 
Top 100
 145 packages
found in 
Top 1k
 550 packages
found in 
Top 10k
 10949 packages
in community
Compresses data using the Zlib algorithm.
packer
Prevalence in PyPI community
Behavior often found in this community (Common)
14 packages
found in 
Top 100
 67 packages
found in 
Top 1k
 370 packages
found in 
Top 10k
 7297 packages
in community
Contains IP addresses.
network
Prevalence in PyPI community
Behavior often found in this community (Common)
67 packages
found in 
Top 100
 520 packages
found in 
Top 1k
 3993 packages
found in 
Top 10k
 158349 packages
in community
Renames a file or directory.
file
Prevalence in PyPI community
Behavior often found in this community (Common)
68 packages
found in 
Top 100
 540 packages
found in 
Top 1k
 3644 packages
found in 
Top 10k
 154572 packages
in community
Top vulnerabilities
Vulnerability Exploitation Lifecycle
(1 Active Vulnerabilities)
1 (1 Fixable)
CVE-2024-39689h
None
None
None
Exploits Unknown
Exploits Exist
Exploited by Malware
Patching Mandated