Spectra Assure
Community
Docs
failIncident: Removal
Scanned: 20 days ago

langchain-deepseek

Artifact:
Using the deepseek model in langchain
License: Permissive (MIT)
Published: 9 months ago


SAFE Assessment

Compliance

Licenses
No license compliance issues
Secrets
No sensitive information found

Security

Vulnerabilities
No known vulnerabilities detected
Hardening
No application hardening issues

Threats

Tampering
1 components prone to hijacking
Malware
No evidence of malware inclusion

INCIDENTS:

removal
Reported By: Community

Popularity

2.5M
Total Downloads
Contributor
Declared Dependencies
59
Dependents

Top issues

Problem

Software developers use programming and design knowledge to build reusable software components. Software components are the basic building blocks for modern applications. Software consumed by an enterprise consists of hundreds, and sometimes even thousands of open source components. Software developers publish components they have authored to public repositories. Open source projects are the intellectual property of their respective authors. At any time, the authors may choose to completely remove the software component from a public repository. This often occurs when a software project reaches its end-of-life stage, or when the software authors lose interest in maintaining the project. This kind of removal frees up the software package name, its unique software identifier in the public repository, for other developers to use. However, new software project owners might have malicious intent. Threat actors are continuously monitoring popular package names in case their unique identifiers suddenly become available for hijacking. Once the software projects falls under new ownership, the new maintainers may opt to use the project popularity to spread malware to unsuspecting users.

Prevalence in PyPI community

No prevalence information at this time

Next steps

Inspect behaviors exhibited by the detected software components.
If the software behaviors differ from expected, investigate the build and release environment for software supply chain compromise.
Revise the use of components that raise these alarms. If you can't deprecate those components, make sure that their versions are pinned.
Avoid using this software package until it is vetted as safe.

Top behaviors

Prevalence in PyPI community

Behavior often found in this community (Common)
75 packages
found in
Top 100
451 packages
found in
Top 1k
3488 packages
found in
Top 10k
109392 packages
in community

Prevalence in PyPI community

Behavior often found in this community (Common)
24 packages
found in
Top 100
163 packages
found in
Top 1k
1243 packages
found in
Top 10k
72644 packages
in community

Prevalence in PyPI community

Behavior often found in this community (Common)
32 packages
found in
Top 100
280 packages
found in
Top 1k
2165 packages
found in
Top 10k
147011 packages
in community

Prevalence in PyPI community

Behavior often found in this community (Common)
1 packages
found in
Top 100
11 packages
found in
Top 1k
85 packages
found in
Top 10k
3307 packages
in community

Prevalence in PyPI community

Behavior often found in this community (Common)
74 packages
found in
Top 100
606 packages
found in
Top 1k
4422 packages
found in
Top 10k
171320 packages
in community

Top vulnerabilities

No vulnerabilities found.