Spectra Assure
Community
warningRisk: Licenses
Scanned: 9 days ago

scapy

Artifact:
latest
Top 10k
Scapy: interactive packet manipulation tool
License: Copyleft (GPL-2.0-only)
Published: 9 days ago




SAFE Assessment

Compliance

Licenses
1 copyleft licensed components
Secrets
No sensitive information found

Security

Vulnerabilities
No known vulnerabilities detected
Hardening
No application hardening issues

Threats

Tampering
No evidence of software tampering
Malware
No evidence of malware inclusion

Popularity

151.39M
Total Downloads
Contributors
Declared Dependencies
401
Dependents

Top issues

Problem

Uniform Resource Locators (URLs) are structured addresses that point to locations and assets on the internet. URLs allow software developers to build complex applications that exchange data with servers that can be hosted in multiple geographical regions. URLs can commonly be found embedded in documentation, configuration files, source code and compiled binaries. One or more embedded URLs were discovered to link to raw files hosted on GitHub. Attackers often abuse popular web services to host malicious payloads. Since code-sharing services URLs are typically allowed by security solutions, using them for payload delivery increases the odds that the malicious code will reach the user. While the presence of code-sharing service locations does not imply malicious intent, all of their uses in a software package should be documented and approved. An increasing number of software supply chain attacks in the open source space leverages the GitHub service to deliver malicious payloads.

Prevalence in PyPI community

36 packages
found in
Top 100
219 packages
found in
Top 1k
1678 packages
found in
Top 10k
63.41k packages
in community

Next steps

Investigate reported detections.
If the software should not include these network references, investigate your build and release environment for software supply chain compromise.
You should delay the software release until the investigation is completed, or until the issue is risk accepted.
Consider an alternative delivery mechanism for software packages.

Problem

Software license is a legal instrument that governs the use and distribution of software source code and its binary representation. Software publishers have the freedom to choose any commonly used or purposefully written license to publish their work under. While some licenses are liberal and allow almost any kind of distribution, with or without code modification, other licenses are more restrictive and impose rules for their inclusion in other software projects. Copyleft licenses in particular impose substantial restrictions on the licensee. They typically require that any derived works, and even software code that merely interacts with copyleft code, be licensed under the same license. Since copyleft licenses are commonly applied to open source code, their inclusion requires that the entire software package becomes open sourced. For commercial applications, this is typically undesirable. Therefore, the inclusion of copyleft code is commonly avoided or even prohibited by the organization policy.

Prevalence in PyPI community

4 packages
found in
Top 100
42 packages
found in
Top 1k
659 packages
found in
Top 10k
89.98k packages
in community

Next steps

Confirm that the software package includes a copyleft component.
Investigate if the software publisher provides this component under a non-copyleft license.
Consider replacing the software component with an alternative that offers a license compatible with commercial use.

Problem

Software license is a legal instrument that governs the use and distribution of software source code and its binary representation. Software publishers have the freedom to choose any commonly used or purposefully written license to publish their work under. While some licenses are liberal and allow almost any kind of distribution, with or without code modification, other licenses are more restrictive and impose rules for their inclusion in other software projects. Some software licenses place restrictions on software distribution of the code they apply to. These restrictions may extend to the services built upon the code licensed under such restrictive licenses. Some restrictive licenses explicitly state that the licensee may not provide the software to third parties as a hosted or managed service, where the service provides users with access to any substantial set of the features or functionality of the licensed software. When building commercial applications, this is typically undesirable. Therefore, the inclusion of any code that may impose limits on software distribution is commonly avoided or even prohibited by the organization policy.

Prevalence in PyPI community

7 packages
found in
Top 100
82 packages
found in
Top 1k
1208 packages
found in
Top 10k
109.57k packages
in community

Next steps

Confirm that the software package references a component or a dependency with a restrictive license.
Consider replacing the software component with an alternative that offers a license compatible with organization policy.

Problem

Uniform Resource Locators (URLs) are structured addresses that point to locations and assets on the internet. URLs allow software developers to build complex applications that exchange data with servers that can be hosted in multiple geographical regions. URLs can commonly be found embedded in documentation, configuration files, source code and compiled binaries. Attackers often try to obfuscate URLs with the aim of avoiding detection by security solutions. One common obfuscation technique attackers use is crafting deceptive links to externally hosted files. Users are more likely to click the links they deem trustworthy. Having two or more file extensions in a URL increases the odds of a deceptive link being perceived as trustworthy, especially if the first extension is commonly encountered by the user (such as the file extension of a popular document format). The reason why these links are considered deceptive is because the operating system will download the linked file and execute it with the last extension it detects, not the first. Attackers abuse this file naming quirk to trick users into running their malicious code. While presence of deceptive file format references does not imply malicious intent, all of their uses in a software package should be documented and approved. It is recommended to avoid double file format extensions altogether.

Prevalence in PyPI community

0 packages
found in
Top 100
1 packages
found in
Top 1k
6 packages
found in
Top 10k
73 packages
in community

Next steps

Investigate reported detections.
If the software should not include these network references, investigate your build and release environment for software supply chain compromise.
You should delay the software release until the investigation is completed, or until the issue is risk accepted.
Consider changing the file extension for self-hosted files.

Top behaviors

Prevalence in PyPI community

Behavior uncommon for this community (Uncommon)
0 packages
found in
Top 100
1 packages
found in
Top 1k
6 packages
found in
Top 10k
73 packages
in community

Prevalence in PyPI community

Behavior often found in this community (Common)
14 packages
found in
Top 100
98 packages
found in
Top 1k
585 packages
found in
Top 10k
18.68k packages
in community

Prevalence in PyPI community

Behavior often found in this community (Common)
10 packages
found in
Top 100
93 packages
found in
Top 1k
490 packages
found in
Top 10k
15.62k packages
in community

Prevalence in PyPI community

Behavior often found in this community (Common)
9 packages
found in
Top 100
66 packages
found in
Top 1k
290 packages
found in
Top 10k
8.75k packages
in community

Prevalence in PyPI community

Behavior often found in this community (Common)
10 packages
found in
Top 100
78 packages
found in
Top 1k
317 packages
found in
Top 10k
9.18k packages
in community

Top vulnerabilities

Vulnerability Exploitation Lifecycle
(1 Active Vulnerabilities)
None
None
None
None
Exploits Unknown
Exploits Exist
Exploited by Malware
Patching Mandated