Top issues
Detected presence of software components that are rarely included by other public software packages.
hunting
Problem
Software developers use programming and design knowledge to build reusable software components. Software components are the basic building blocks for modern applications. Software consumed by an enterprise consists of hundreds, and sometimes even thousands of open source components. Software developers publish components they have authored to public repositories. While a new software project is a welcome addition to the open source community. it is not always prudent to indiscriminately use the latest components when building a commercial application. Irrespective of the software quality, the danger of using components that are rarely used to build applications lies in the fact that the software component may contain novel, currently undetected malicious code. Therefore, it is prudent to review software component behaviors and even try out software component in a sandbox, an environment meant for testing untrusted code.Prevalence in PyPI community
No prevalence information at this timeNext steps
Check the software component behaviors for anomalies.
Consider exploratory software component testing within a sandbox environment.
Consider replacing the software component with a more widely used alternative.
Avoid using this software package until it is vetted as safe.
Problem
Software developers use programming and design knowledge to build reusable software components. Software components are the basic building blocks for modern applications. Software consumed by an enterprise consists of hundreds, and sometimes even thousands of open source components. Open source communities depend on the work of thousands of software developers that volunteer their time to maintain software components. Software developers build up the reputation of their open source projects by developing in public. Modern source code repositories have many social features that allow software developers to handle bug reports, have discussions with their users, and convey reaching significant project milestones. It is uncommon to find open source projects that omit linking their component to a publicly accessible source code repository.Prevalence in PyPI community
No prevalence information at this timeNext steps
Check the software component behaviors for anomalies.
Consider exploratory software component testing within a sandbox environment.
Consider replacing the software component with a more widely used alternative.
Avoid using this software package until it is vetted as safe.
Detected Windows executable files that might ineffectively implement CFG vulnerability mitigation protection.
hardening
Problem
Control Flow Guard (CFG/CFI) protects the code flow integrity by ensuring that dynamic calls are made only to vetted functions. This mitigation is detected as enabled, but its effectiveness is impacted by unexpected function alignment. For optimal protection, guarded functions must be aligned to the 16-byte boundary. Any misalignment leaves a small window for the malicious code to take advantage of an improperly secured code flow path.Prevalence in PyPI community
0 packages
found in
Top 100
4 packages
found in
Top 1k
26 packages
found in
Top 10k
326 packages
in community
Next steps
There are currently no programming language toolchain options to force proper function alignment. If this warning is issued for a file, it is likely that a future build, with some code changes, will make the compiler order the application code differently and eliminate the CFG coverage gaps.
Top behaviors
Deletes files in Windows system directories.
file
Prevalence in PyPI community
Behavior often found in this community (Common)
2 packages
found in
Top 100
20 packages
found in
Top 1k
125 packages
found in
Top 10k
2532 packages
in community
Contains common certificate strings.
settings
Prevalence in PyPI community
Behavior uncommon for this community (Uncommon)
1 packages
found in
Top 100
19 packages
found in
Top 1k
129 packages
found in
Top 10k
2361 packages
in community
Retrieves the local computer name.
search
Prevalence in PyPI community
Behavior uncommon for this community (Uncommon)
1 packages
found in
Top 100
14 packages
found in
Top 1k
102 packages
found in
Top 10k
2098 packages
in community
Decrypts data using the Windows Cryptography API.
packer
Prevalence in PyPI community
Behavior often found in this community (Common)
3 packages
found in
Top 100
8 packages
found in
Top 1k
48 packages
found in
Top 10k
821 packages
in community
Creates a process.
execution
Prevalence in PyPI community
Behavior often found in this community (Common)
68 packages
found in
Top 100
508 packages
found in
Top 1k
3570 packages
found in
Top 10k
165477 packages
in community
Top vulnerabilities
No vulnerabilities found.