Top issues
Detected presence of licenses that place restrictions on software distribution.
Causes risk: software distribution restrictions
licenses
Problem
Software license is a legal instrument that governs the use and distribution of software source code and its binary representation. Software publishers have the freedom to choose any commonly used or purposefully written license to publish their work under. While some licenses are liberal and allow almost any kind of distribution, with or without code modification, other licenses are more restrictive and impose rules for their inclusion in other software projects. Some software licenses place restrictions on software distribution of the code they apply to. These restrictions may extend to the services built upon the code licensed under such restrictive licenses. Some restrictive licenses explicitly state that the licensee may not provide the software to third parties as a hosted or managed service, where the service provides users with access to any substantial set of the features or functionality of the licensed software. When building commercial applications, this is typically undesirable. Therefore, the inclusion of any code that may impose limits on software distribution is commonly avoided or even prohibited by the organization policy.Prevalence in PyPI community
7 packages
found in
Top 100
82 packages
found in
Top 1k
1208 packages
found in
Top 10k
109.57k packages
in community
Next steps
Confirm that the software package references a component or a dependency with a restrictive license.
Consider replacing the software component with an alternative that offers a license compatible with organization policy.
Detected Windows shared library files that do not suppress exports which reduces CFG vulnerability mitigation protection effectiveness.
Causes risk: low priority mitigations absent
hardening
Problem
Control Flow Guard (CFG/CFI) protects the code flow integrity by ensuring that dynamic calls are made only to vetted functions. Trusted execution paths rely on the ability of the operating system to build a list of valid function targets. Certain functions can intentionally be disallowed to prevent malicious code from deactivating vulnerability mitigation features. A list of such invalid function targets can include publicly exported symbols. Applications that enhance control flow integrity through export suppression rely on libraries to mark their publicly visible symbols as suppressed. This is done for all symbols that are considered to be sensitive functions, and to which access should be restricted. It is considered dangerous to mix applications that perform export suppression with libraries that do not.Prevalence in PyPI community
30 packages
found in
Top 100
143 packages
found in
Top 1k
833 packages
found in
Top 10k
15.19k packages
in community
Next steps
To enable this mitigation on library code, refer to your programming language toolchain documentation.
In Microsoft VisualStudio, you can enable CFG mitigation by passing the /guard:cf parameter to the compiler and linker.
Detected Windows executable files that do not implement long jump control flow vulnerability mitigation protection.
Causes risk: low priority mitigations absent
hardening
Problem
Control Flow Guard (CFG/CFI) protects the code flow integrity by ensuring that indirect calls are made only to vetted functions. This mitigation protects dynamically resolved function targets by instrumenting the code responsible for transferring execution control. Higher-level programming languages implement structured exception handling by managing their own code flow execution paths. As such, they are subject to code flow hijacking during runtime. Language-specific exception handling mitigation enforces execution integrity by instrumenting calls to manage execution context switching. Any deviation from the known and trusted code flow paths will cause the application to terminate. This makes malicious code less likely to execute.Prevalence in PyPI community
36 packages
found in
Top 100
164 packages
found in
Top 1k
932 packages
found in
Top 10k
17.86k packages
in community
Next steps
It's highly recommended to enable this option for all software components used at security boundaries, or those that process user controlled inputs.
To enable this mitigation, refer to your programming language toolchain documentation.
In Microsoft VisualStudio, you can enable CFG mitigation by passing the /guard:cf parameter to the compiler and linker.
Problem
Operating systems allow multiple user accounts to coexist on a single computer system. Each registered user has identity information associated with their account. At the very least, user accounts consist of a user name and an optional password. In some cases, user account data may also include personally identifiable information. Extended personal information may include user's given and last name, their email and mailing address, personal photo and their telephone number. Financially motivated attackers may seek to collect personal information for purposes of selling the private data to a third-party. Malicious code that typically exhibits these behavior traits is commonly referred to as an information stealer. While the presence of code that accesses identity information does not necessarily imply malicious intent, all of its uses in a software package should be documented and approved. Accessing identity information is a very common behavior for software packages. One example of acceptable use for such functions is verifying that the active user has purchased a software license that allows them to run the application.Prevalence in PyPI community
16 packages
found in
Top 100
113 packages
found in
Top 1k
669 packages
found in
Top 10k
19.67k packages
in community
Next steps
Investigate reported detections as indicators of software tampering.
Consult Mitre ATT&CK documentation: T1033 - System Owner/User Discovery.
Top behaviors
Requests permission to open other processes.
permissions
Prevalence in PyPI community
Behavior uncommon for this community (Uncommon)
1 packages
found in
Top 100
3 packages
found in
Top 1k
14 packages
found in
Top 10k
357 packages
in community
Queries the passwd database entry for a given user ID.
steal
Prevalence in PyPI community
Behavior often found in this community (Common)
12 packages
found in
Top 100
75 packages
found in
Top 1k
385 packages
found in
Top 10k
8.9k packages
in community
Enumerates users that are connected on the system.
search
Prevalence in PyPI community
Behavior uncommon for this community (Uncommon)
1 packages
found in
Top 100
3 packages
found in
Top 1k
8 packages
found in
Top 10k
311 packages
in community
Contains URLs related to online payment services.
network
Prevalence in PyPI community
Behavior often found in this community (Common)
5 packages
found in
Top 100
28 packages
found in
Top 1k
146 packages
found in
Top 10k
4.05k packages
in community
Decodes data using the Base16 algorithm.
file
Prevalence in PyPI community
Behavior often found in this community (Common)
3 packages
found in
Top 100
32 packages
found in
Top 1k
232 packages
found in
Top 10k
5.86k packages
in community
Top vulnerabilities
No vulnerabilities found.