Top issues
Detected presence of severe vulnerabilities with active exploitation.
Causes risk: actively exploited vulnerabilities
vulnerabilities
Problem
Software composition analysis has identified a component with one or more known severe vulnerabilities. Available threat intelligence telemetry has confirmed that the reported high or critical severity vulnerabilities are actively being exploited by malicious actors.Prevalence in PyPI community
38 packages
found in 
Top 100
 303 packages
found in 
Top 1k
 2611 packages
found in 
Top 10k
 103184 packages
in community
Next steps
We strongly advise updating the component to the latest version.
If the update can't resolve the issue, create a plan to isolate or replace the affected component.
Detected presence of critical severity vulnerabilities.
Causes risk: critical severity vulnerabilities
vulnerabilities
Problem
Software composition analysis has identified a component with one or more known vulnerabilities. Based on the CVSS scoring, these vulnerabilities have been marked as critical severity.Prevalence in PyPI community
25 packages
found in 
Top 100
 212 packages
found in 
Top 1k
 1951 packages
found in 
Top 10k
 77976 packages
in community
Next steps
Perform impact analysis for the reported CVEs.
We strongly advise updating the component to the latest version.
If the update can't resolve the issue, create a plan to isolate or replace the affected component.
Detected presence of high severity vulnerabilities.
Causes risk: high severity vulnerabilities
vulnerabilities
Problem
Software composition analysis has identified a component with one or more known vulnerabilities. Based on the CVSS scoring, these vulnerabilities have been marked as high severity.Prevalence in PyPI community
50 packages
found in 
Top 100
 352 packages
found in 
Top 1k
 2858 packages
found in 
Top 10k
 108771 packages
in community
Next steps
Perform impact analysis for the reported CVEs.
Update the component to the latest version.
If the update can't resolve the issue, create a plan to isolate or replace the affected component.
Detected presence of licenses that place restrictions on software distribution.
Causes risk: software distribution restrictions
licenses
Problem
Software license is a legal instrument that governs the use and distribution of software source code and its binary representation. Software publishers have the freedom to choose any commonly used or purposefully written license to publish their work under. While some licenses are liberal and allow almost any kind of distribution, with or without code modification, other licenses are more restrictive and impose rules for their inclusion in other software projects. Some software licenses place restrictions on software distribution of the code they apply to. These restrictions may extend to the services built upon the code licensed under such restrictive licenses. Some restrictive licenses explicitly state that the licensee may not provide the software to third parties as a hosted or managed service, where the service provides users with access to any substantial set of the features or functionality of the licensed software. When building commercial applications, this is typically undesirable. Therefore, the inclusion of any code that may impose limits on software distribution is commonly avoided or even prohibited by the organization policy.Prevalence in PyPI community
6 packages
found in 
Top 100
 50 packages
found in 
Top 1k
 737 packages
found in 
Top 10k
 99544 packages
in community
Next steps
Confirm that the software package references a component or a dependency with a restrictive license.
Consider replacing the software component with an alternative that offers a license compatible with organization policy.
Detected Linux executable files compiled without any kind of buffer overrun protection while using banned string functions.
Causes risk: misconfigured toolchains detected
hardening
Problem
Buffer overrun protection on Linux is achieved in two ways. The most common solution is to use the stack canary (also called cookie). The stack canary is a special value written onto the stack that allows the operating system to detect and terminate the program if a stack overrun occurs. In most cases, compilers will apply the stack canary conservatively in order to avoid a negative performance impact. Therefore, stack canaries are often used together with another stack overrun mitigation - fortified functions. Fortified functions are usually wrappers around standard glibc functions (such as memcpy) which perform boundary checks either at compile time or run time to determine if a memory violation has occurred. The compiler needs additional context to generate such calls (for example, array size that needs to be known at compile time). Because of this, the compiler will virtually never substitute all viable functions with their fortified counterparts in complex programs. However, when combined with the stack canary, fortified functions provide a good measure of buffer overrun protection.Prevalence in PyPI community
13 packages
found in 
Top 100
 74 packages
found in 
Top 1k
 456 packages
found in 
Top 10k
 7612 packages
in community
Next steps
Presence of unfortified string functions may indicate use of unsafe programming practices, and you should avoid it if possible.
In GCC, enable fortified functions with -fstack-protector and -D_FORTIFY_SOURCE=2 flag, while using at least -O1 optimization level.
Top behaviors
Queries the passwd database entry for a given user name.
steal
Prevalence in PyPI community
Behavior often found in this community (Common)
10 packages
found in 
Top 100
 50 packages
found in 
Top 1k
 265 packages
found in 
Top 10k
 5875 packages
in community
Queries the passwd database entry for a given user ID.
steal
Prevalence in PyPI community
Behavior often found in this community (Common)
11 packages
found in 
Top 100
 73 packages
found in 
Top 1k
 368 packages
found in 
Top 10k
 8619 packages
in community
Contains common certificate strings.
settings
Prevalence in PyPI community
Behavior uncommon for this community (Uncommon)
1 packages
found in 
Top 100
 19 packages
found in 
Top 1k
 129 packages
found in 
Top 10k
 2361 packages
in community
Listens on incoming network connections.
network
Prevalence in PyPI community
Behavior often found in this community (Common)
3 packages
found in 
Top 100
 32 packages
found in 
Top 1k
 197 packages
found in 
Top 10k
 4489 packages
in community
Executes a file.
execution
Prevalence in PyPI community
Behavior often found in this community (Common)
34 packages
found in 
Top 100
 169 packages
found in 
Top 1k
 1256 packages
found in 
Top 10k
 55955 packages
in community
Top vulnerabilities
Vulnerability Exploitation Lifecycle
(8 Active Vulnerabilities)
1 (1 Fixable)
CVE-2017-14952c
7 (7 Fixable)
CVE-2016-6293c
CVE-2016-7415c
CVE-2020-10531h
None
None
Exploits Unknown
Exploits Exist
Exploited by Malware
Patching Mandated