Top issues
Detected presence of potentially unwanted applications.
Causes risk: undesirable applications found
threats
Problem
Potentially unwanted applications (PUAs) can be considered a risk by some software users. This threat type typically collects private user data, or in more extreme cases, tampers with system security settings. Most threat prevention solutions detect and block PUAs. Software packages that trigger security solution detections also tend to increase the number of support calls and open tickets from users.Prevalence in PyPI community
1 packages
found in
Top 100
5 packages
found in
Top 1k
18 packages
found in
Top 10k
1306 packages
in community
Next steps
Revise the use of components that raise these alarms. If you can't deprecate those components, make sure they are well-documented.
Detected presence of known software supply chain attack artifacts.
Causes risk: supply chain attack artifacts
threats
Problem
Proprietary ReversingLabs malware detection algorithms have determined that the software package contains one or more malicious components. The detection was made by either a static byte signature, software component identity, or a complete file hash. This malware detection method is considered highly accurate, and can typically attribute malware to previously discovered software supply chain attacks. It is common to have multiple supply chain attack artifacts that relate to a single malware incident.Prevalence in PyPI community
0 packages
found in
Top 100
0 packages
found in
Top 1k
5 packages
found in
Top 10k
13913 packages
in community
Next steps
If the software intent does not relate to malicious behavior, investigate the build and release environment for software supply chain compromise.
Avoid using this software package.
Detected presence of malicious files through analyst-vetted file reputation.
Causes risk: analyst-vetted malware found
threats
Problem
Threat researchers have manually inspected the software package and determined that it contains one or more malicious files. The detection was made by a hash-based file reputation lookup. This malware detection method is considered highly accurate, and can typically identify the malware family by name.Prevalence in PyPI community
0 packages
found in
Top 100
0 packages
found in
Top 1k
7 packages
found in
Top 10k
13959 packages
in community
Next steps
Investigate the build and release environment for software supply chain compromise.
Avoid using this software package.
Detected presence of files with behaviors that match the infostealer malware profile.
Causes risk: malware-like behaviors found
hunting
Problem
Software components contain executable code that performs actions implemented during its development. These actions are called behaviors. In the analysis report, behaviors are presented as human-readable descriptions that best match the underlying code intent. While most behaviors are benign, some are exclusively used by malicious software with the intent to cause harm. When a software package matches behavior traits of malicious software, it becomes flagged by security solutions. It is highly likely that the software package was tampered with by a malicious actor or a rogue insider. Detected threat type matches the behaviors typically exhibited by the infostealer malware profile. Infostealers are commonly used to steal sensitive user data such as stored login details, financial information, and other personally identifiable information.Prevalence in PyPI community
0 packages
found in
Top 100
0 packages
found in
Top 1k
1 packages
found in
Top 10k
1960 packages
in community
Next steps
Investigate reported detections.
Investigate your build and release environment for software supply chain compromise.
You should delay the software release until the investigation is completed.
In the case this behavior is intended, rewrite the flagged code without using the malware-like behaviors.
Detected presence of software installers with unusual networking functionality.
Causes risk: dangerous install procedures
hunting
Problem
Most software applications use standardized installation formats for their distribution. Software installers are built from instructions written within installation scripts that act as blueprints for the distribution format assembly. Installation scripts declare the most important software properties, such as the default installation location, its external dependencies, and various actions that may occur during the installation process. Actions defined within the installation script are executed automatically during events such as software deployment, update, or removal. These events are used by software developers to set up the environment for nominal software use, or to perform cleanup upon software removal. It is unusual for certain types of software installers to invoke commands that download additional content from a remote server. Attackers commonly abuse software installers to fetch malicious payloads from public code repositories, file sharing websites, or their own infrastructure. Remotely hosted content is not immutable, allowing the attackers to change the type of malware they deploy at any time.Prevalence in PyPI community
No prevalence information at this timeNext steps
Investigate reported detections.
If the software intent does not relate to the reported behavior, investigate your build and release environment for software supply chain compromise.
You should delay the software release until the investigation is completed, or until the issue is risk accepted.
Consider rewriting the installation procedure without using the marked behaviors.
Top behaviors
Makes HTTP POST requests during the package installation process.
network
Prevalence in PyPI community
No behavior prevalence information at this timeMakes HTTP GET requests during the package installation process.
network
Prevalence in PyPI community
No behavior prevalence information at this timeQueries the host name of the computer during the package installation process.
search
Prevalence in PyPI community
No behavior prevalence information at this timeOverrides the default behavior of Python setuptool commands.
anomaly
Prevalence in PyPI community
Behavior often found in this community (Common)
26 packages
found in
Top 100
157 packages
found in
Top 1k
1202 packages
found in
Top 10k
28931 packages
in community
Makes HTTP POST requests.
network
Prevalence in PyPI community
Behavior often found in this community (Common)
24 packages
found in
Top 100
163 packages
found in
Top 1k
1243 packages
found in
Top 10k
72644 packages
in community
Top vulnerabilities
No vulnerabilities found.