Top issues
Detected presence of web service access tokens.
Causes risk: web service credentials found
secrets
Problem
Software as a Service (SaaS) platforms expose programmable interfaces to their authenticated users. These web services enable action automation and secure exchange of information. For authorization, web service users provide a unique token that confirms their access rights. These tokens are considered secrets. They should never be included in a software release package, even if they are obfuscated by encryption on the client-side.Prevalence in PyPI community
4 packages
found in
Top 100
14 packages
found in
Top 1k
81 packages
found in
Top 10k
2.82k packages
in community
Next steps
You should securely store web service access tokens, and fully automate their management and periodic rotation.
If tokens were published unintentionally and the software has been made public, you should revoke exposed tokens and file a security incident.
Examples of service tokens that may have been detected include AWS, Facebook, JWT, SWT, Slack and others.
Detected presence of plaintext credentials within network protocol strings.
Causes risk: web service credentials found
secrets
Problem
Various network communication protocols allow including plaintext authentication credentials. Information such as user names and passwords could be passed through a non-encrypted channel, and therefore intercepted by malicious actors. Credentials are considered secrets, and should be kept encrypted until they are used. This policy control matches the following URI pattern protocol://username:password@domain within any software package component.Prevalence in PyPI community
21 packages
found in
Top 100
86 packages
found in
Top 1k
378 packages
found in
Top 10k
7.36k packages
in community
Next steps
Review the reported matches. If the warning refers to a placeholder credential value, it can be safely ignored.
Problem
Software developers use programming and design knowledge to build reusable software components. Software components are the basic building blocks for modern applications. Software consumed by an enterprise consists of hundreds, and sometimes even thousands of open source components. Open source communities depend on the work of thousands of software developers that volunteer their time to maintain software components. Software developers build up the reputation of their open source projects by developing in public. Modern source code repositories have many social features that allow software developers to handle bug reports, have discussions with their users, and convey reaching significant project milestones. It is uncommon to find open source projects that omit linking their component to a publicly accessible source code repository.Prevalence in PyPI community
70 packages
found in
Top 100
472 packages
found in
Top 1k
4207 packages
found in
Top 10k
413.79k packages
in community
Next steps
Check the software component behaviors for anomalies.
Consider exploratory software component testing within a sandbox environment.
Consider replacing the software component with a more widely used alternative.
Avoid using this software package until it is vetted as safe.
Top behaviors
Encodes data using the Base64 algorithm.
packer
Prevalence in PyPI community
Behavior often found in this community (Common)
36 packages
found in
Top 100
281 packages
found in
Top 1k
1802 packages
found in
Top 10k
66.4k packages
in community
Decodes data using the Base64 algorithm.
packer
Prevalence in PyPI community
Behavior often found in this community (Common)
39 packages
found in
Top 100
252 packages
found in
Top 1k
1477 packages
found in
Top 10k
53.15k packages
in community
Contains URLs that link to interesting file formats.
network
Prevalence in PyPI community
Behavior often found in this community (Common)
76 packages
found in
Top 100
459 packages
found in
Top 1k
3531 packages
found in
Top 10k
105.97k packages
in community
Creates a process.
execution
Prevalence in PyPI community
Behavior often found in this community (Common)
69 packages
found in
Top 100
506 packages
found in
Top 1k
3612 packages
found in
Top 10k
163.85k packages
in community
Contains URLs that contain basic authentication credentials.
network
Prevalence in PyPI community
Behavior often found in this community (Common)
26 packages
found in
Top 100
118 packages
found in
Top 1k
563 packages
found in
Top 10k
12.66k packages
in community
Top vulnerabilities
Vulnerability Exploitation Lifecycle
(2 Active Vulnerabilities)
None
None
None
None
Exploits Unknown
Exploits Exist
Exploited by Malware
Patching Mandated