Top issues
Detected presence of software installers that execute unusual system commands.
Causes risk: dangerous install procedures
hunting
Problem
Most software applications use standardized installation formats for their distribution. Software installers are built from instructions written within installation scripts that act as blueprints for the distribution format assembly. Installation scripts declare the most important software properties, such as the default installation location, its external dependencies, and various actions that may occur during the installation process. Actions defined within the installation script are executed automatically during events such as software deployment, update, or removal. These events are used by software developers to set up the environment for nominal software use, or to perform cleanup upon software removal. However, installation scripts are commonly abused by threat actors to execute arbitrary commands on the deployment machine. It was detected that an installation script could execute unusual operating system commands. Unusual commands resemble common threat actor tactics, such as destructive file deletion, elevation of privileges, or tampering with security settings. Unusual installation scripts often contain code obfuscation, anti-analysis features, and other detection evasion techniques.Prevalence in PyPI community
0 packages
found in
Top 100
1 packages
found in
Top 1k
1 packages
found in
Top 10k
5.41k packages
in community
Next steps
Investigate reported detections.
If the software intent does not relate to the reported behavior, investigate your build and release environment for software supply chain compromise.
You should delay the software release until the investigation is completed, or until the issue is risk accepted.
Consider rewriting the installation procedure without using the marked behaviors.
Detected presence of software components that were removed from the public package repository.
Causes risk: components prone to hijacking
hunting
Problem
Software developers use programming and design knowledge to build reusable software components. Software components are the basic building blocks for modern applications. Software consumed by an enterprise consists of hundreds, and sometimes even thousands of open source components. Software developers publish components they have authored to public repositories. Open source projects are the intellectual property of their respective authors. At any time, the authors may choose to completely remove the software component from a public repository. This often occurs when a software project reaches its end-of-life stage, or when the software authors lose interest in maintaining the project. This kind of removal frees up the software package name, its unique software identifier in the public repository, for other developers to use. However, new software project owners might have malicious intent. Threat actors are continuously monitoring popular package names in case their unique identifiers suddenly become available for hijacking. Once the software projects falls under new ownership, the new maintainers may opt to use the project popularity to spread malware to unsuspecting users.Prevalence in PyPI community
0 packages
found in
Top 100
1 packages
found in
Top 1k
20 packages
found in
Top 10k
83.87k packages
in community
Next steps
Inspect behaviors exhibited by the detected software components.
If the software behaviors differ from expected, investigate the build and release environment for software supply chain compromise.
Revise the use of components that raise these alarms. If you can't deprecate those components, make sure that their versions are pinned.
Avoid using this software package until it is vetted as safe.
Detected presence of software components that were recently published to the public package repository.
hunting
Problem
Software developers use programming and design knowledge to build reusable software components. Software components are the basic building blocks for modern applications. Software consumed by an enterprise consists of hundreds, and sometimes even thousands of open source components. Software developers publish components they have authored to public repositories. While a new software project is a welcome addition to the open source community, it is not always prudent to indiscriminately use the latest components when building a commercial application. Irrespective of the software quality, the danger of being the first to try out a new project lies in the fact that the software component may contain novel, currently undetected malicious code. Therefore, it is prudent to review software component behaviors and even try out software component in a sandbox, an environment meant for testing untrusted code.Prevalence in PyPI community
0 packages
found in
Top 100
0 packages
found in
Top 1k
5 packages
found in
Top 10k
38.63k packages
in community
Next steps
Check the software component behaviors for anomalies.
Consider exploratory software component testing within a sandbox environment.
Consider replacing the software component with a more widely used alternative.
Avoid using this software package until it is vetted as safe.
Detected presence of software components that are rarely included by other public software packages.
hunting
Problem
Software developers use programming and design knowledge to build reusable software components. Software components are the basic building blocks for modern applications. Software consumed by an enterprise consists of hundreds, and sometimes even thousands of open source components. Software developers publish components they have authored to public repositories. While a new software project is a welcome addition to the open source community. it is not always prudent to indiscriminately use the latest components when building a commercial application. Irrespective of the software quality, the danger of using components that are rarely used to build applications lies in the fact that the software component may contain novel, currently undetected malicious code. Therefore, it is prudent to review software component behaviors and even try out software component in a sandbox, an environment meant for testing untrusted code.Prevalence in PyPI community
1 packages
found in
Top 100
11 packages
found in
Top 1k
910 packages
found in
Top 10k
717.09k packages
in community
Next steps
Check the software component behaviors for anomalies.
Consider exploratory software component testing within a sandbox environment.
Consider replacing the software component with a more widely used alternative.
Avoid using this software package until it is vetted as safe.
Problem
Software developers use programming and design knowledge to build reusable software components. Software components are the basic building blocks for modern applications. Software consumed by an enterprise consists of hundreds, and sometimes even thousands of open source components. Open source communities depend on the work of thousands of software developers that volunteer their time to maintain software components. Software developers build up the reputation of their open source projects by developing in public. Modern source code repositories have many social features that allow software developers to handle bug reports, have discussions with their users, and convey reaching significant project milestones. It is uncommon to find open source projects that omit linking their component to a publicly accessible source code repository.Prevalence in PyPI community
70 packages
found in
Top 100
472 packages
found in
Top 1k
4207 packages
found in
Top 10k
413.79k packages
in community
Next steps
Check the software component behaviors for anomalies.
Consider exploratory software component testing within a sandbox environment.
Consider replacing the software component with a more widely used alternative.
Avoid using this software package until it is vetted as safe.
Top behaviors
Starts a PowerShell session during the package installation process.
execution
Prevalence in PyPI community
Behavior uncommon for this community (Uncommon)
0 packages
found in
Top 100
0 packages
found in
Top 1k
0 packages
found in
Top 10k
5.32k packages
in community
Creates a process.
execution
Prevalence in PyPI community
Behavior often found in this community (Common)
69 packages
found in
Top 100
506 packages
found in
Top 1k
3612 packages
found in
Top 10k
163.85k packages
in community
Overrides the default behavior of Python setuptool commands.
anomaly
Prevalence in PyPI community
Behavior often found in this community (Common)
24 packages
found in
Top 100
165 packages
found in
Top 1k
1180 packages
found in
Top 10k
29.66k packages
in community
The software package does not declare any source code repository.
anomaly
Prevalence in PyPI community
Behavior often found in this community (Common)
70 packages
found in
Top 100
472 packages
found in
Top 1k
4207 packages
found in
Top 10k
413.79k packages
in community
Schedules code execution for a later time.
execution
Prevalence in PyPI community
Behavior often found in this community (Common)
22 packages
found in
Top 100
117 packages
found in
Top 1k
712 packages
found in
Top 10k
16.27k packages
in community
Top vulnerabilities
No vulnerabilities found.