Top issues
Detected presence of severe vulnerabilities with active exploitation.
Causes risk: actively exploited vulnerabilities
vulnerabilities
Problem
Software composition analysis has identified a component with one or more known severe vulnerabilities. Available threat intelligence telemetry has confirmed that the reported high or critical severity vulnerabilities are actively being exploited by malicious actors.Prevalence in PyPI community
38 packages
found in 
Top 100
 303 packages
found in 
Top 1k
 2611 packages
found in 
Top 10k
 103184 packages
in community
Next steps
We strongly advise updating the component to the latest version.
If the update can't resolve the issue, create a plan to isolate or replace the affected component.
Detected presence of critical severity vulnerabilities.
Causes risk: critical severity vulnerabilities
vulnerabilities
Problem
Software composition analysis has identified a component with one or more known vulnerabilities. Based on the CVSS scoring, these vulnerabilities have been marked as critical severity.Prevalence in PyPI community
25 packages
found in 
Top 100
 212 packages
found in 
Top 1k
 1951 packages
found in 
Top 10k
 77976 packages
in community
Next steps
Perform impact analysis for the reported CVEs.
We strongly advise updating the component to the latest version.
If the update can't resolve the issue, create a plan to isolate or replace the affected component.
Detected presence of software components that can tamper with the system certificate stores.
hunting
Problem
Software components sometimes need to interact with higher privilege parts of the operating system, often requiring administrative access to accomplish a task. System certificate stores are databases that define the chain of trust for a machine. These databases control the list of websites the machine can securely connect to, and the list of applications that the operating system implicitly trusts. For that reason, attackers often abuse system certificate stores to ensure their malicious code executes without being detected by security solutions. While the presence of code that tampers with system certificate stores does not necessarily imply malicious intent, all of its uses in a software package should be documented and approved. Only select applications should consider using functions that interact with system certificate stores. One example of acceptable use for such functions is adding publisher certificates to the system trust store during software installation.Prevalence in PyPI community
2 packages
found in 
Top 100
 7 packages
found in 
Top 1k
 28 packages
found in 
Top 10k
 343 packages
in community
Next steps
Investigate reported detections as indicators of software tampering.
Consult Mitre ATT&CK documentation: T1553.004 - Install Root Certificate Subvert.
Consider rewriting the flagged code without using the marked behaviors.
Detected presence of software components that can tamper with the system network settings.
hunting
Problem
Software components sometimes need to interact with higher privilege parts of the operating system, often requiring administrative access to accomplish a task. Operating systems include a complete network stack with many services that allow the machine to connect to the internet. Some of these services are used to secure network access. For that reason, attackers often aim to tamper with system network settings. Disabling firewalls and other network security features enable the malicious code to execute without being blocked. While the presence of code that tampers with system network settings does not necessarily imply malicious intent, all of its uses in a software package should be documented and approved. Only select applications should consider using functions that interact with system network settings. One example of acceptable use for such functions is allowing specialized applications to use non-standard network ports by updating the firewall allowlist.Prevalence in PyPI community
2 packages
found in 
Top 100
 5 packages
found in 
Top 1k
 47 packages
found in 
Top 10k
 836 packages
in community
Next steps
Investigate reported detections as indicators of software tampering.
Consult Mitre ATT&CK documentation: T1562.004 - Disable or Modify System Firewall.
Consider rewriting the flagged code without using the marked behaviors.
Detected Linux executable files that were compiled without the recommended dynamic symbol hijacking protections.
Causes risk: execution hijacking concerns
hardening
Problem
On Linux, external symbols are resolved via the procedure linkage table (PLT) and the global offset table (GOT). Without any protection, both are writable at runtime and thus leave the executable vulnerable to pointer hijacking - an attack where the function address is overwritten with an address of a malicious function. Pointer hijacking can be mitigated by using full read-only relocations, which instruct the compiler to unify global offset tables into a single read-only table. This requires that all external function symbols are resolved at load-time instead of during execution, and may increase loading time for large programs.Prevalence in PyPI community
22 packages
found in 
Top 100
 122 packages
found in 
Top 1k
 767 packages
found in 
Top 10k
 16246 packages
in community
Next steps
In most cases, it's recommended to use full read-only relocations (in GCC: -Wl,-z,relro,-z,now).
If the executable load-time is an issue, you should use partial read-only relocations.
Top behaviors
Sends data on a connected TCP socket.
network
Prevalence in PyPI community
Behavior often found in this community (Common)
13 packages
found in 
Top 100
 99 packages
found in 
Top 1k
 566 packages
found in 
Top 10k
 19246 packages
in community
Receives data from a connected TCP socket.
network
Prevalence in PyPI community
Behavior often found in this community (Common)
9 packages
found in 
Top 100
 94 packages
found in 
Top 1k
 476 packages
found in 
Top 10k
 16117 packages
in community
Permits an incoming connection on a TCP socket.
network
Prevalence in PyPI community
Behavior often found in this community (Common)
8 packages
found in 
Top 100
 64 packages
found in 
Top 1k
 281 packages
found in 
Top 10k
 8972 packages
in community
Opens a socket listening for an incoming connection.
network
Prevalence in PyPI community
Behavior often found in this community (Common)
9 packages
found in 
Top 100
 75 packages
found in 
Top 1k
 309 packages
found in 
Top 10k
 9292 packages
in community
Writes data to the hosts file.
stealth
Prevalence in PyPI community
Behavior uncommon for this community (Uncommon)
2 packages
found in 
Top 100
 6 packages
found in 
Top 1k
 57 packages
found in 
Top 10k
 684 packages
in community
Top vulnerabilities
Vulnerability Exploitation Lifecycle
(3 Active Vulnerabilities)
None
1 (1 Fixable)
CVE-2022-37434c
None
None
Exploits Unknown
Exploits Exist
Exploited by Malware
Patching Mandated