Top issues
Detected digital signatures used for code signing that do not have code signing listed for their intended use.
Causes risk: signature compliance mistakes
signatures
Problem
Digital signatures are applied to applications, packages and documents as a cryptographically secured authenticity record. Signatures are made using digital certificates, which can either be purchased from certificate authorities or be self-issued. Certificates consist of various object fields, some of which describe the allowed certificate uses. Digital certificates can only be used for code signing if that property is found in its list of extended key usage policies. It is possible to mistakenly use an SSL certificate as a code signing certificate during software publishing.Prevalence in RubyGems community
0 packages
found in
Top 100
0 packages
found in
Top 1k
12 packages
found in
Top 10k
196 packages
in community
Next steps
Review the certificate information passed to the code signing application.
If the problem persists, re-sign the software component with a newly acquired certificate, then publish the software package again.
Detected expired digital signatures that have not been countersigned for time-stamping.
signatures
Problem
Digital signatures are applied to applications, packages and documents as a cryptographically secured authenticity record. Signatures are made using digital certificates, which can either be purchased from certificate authorities or be self-issued. Certificates have a validity period during which they can be used to create signatures. For application signatures, or digital code signing, it is recommended to countersign the signatures for time-stamping. Countersigned software components have their signature period validity extended past the signing certificate expiration date. Such signatures are considered valid indefinitely. We detected that the digital signature was not countersigned for time-stamping, and that the signing certificate has expired. Failing to countersign software components may result in application errors and availability outages.Prevalence in RubyGems community
2 packages
found in
Top 100
2 packages
found in
Top 1k
18 packages
found in
Top 10k
261 packages
in community
Next steps
Acquire a new certificate and re-sign the software component.
Apply the optional time-stamping countersignature during signing.
With Microsoft SignTool, you can specify the trusted remote time-stamping server using the /t or /tr parameter.
Detected digital signatures that do not contain a reference to a certificate revocation server.
signatures
Problem
Digital signatures are applied to applications, packages and documents as a cryptographically secured authenticity record. Signatures are made using digital certificates, which can either be purchased from certificate authorities or be self-issued. When purchased from a certificate authority, a certificate must conform to industry standards and best practices. One such requirement is that a certificate authority must be able revoke a certificate if its misuse was reported and independently confirmed. Software users rely on the certificate revocation process to defend from malicious actors that might be controlling a certificate issued to a trusted publisher. Operating systems periodically refresh local copies of certificate revocation lists. If the signature does not include a hyperlink to the certificate revocation server, its status cannot be checked. While a commercial certificate authority is unlikely to omit this information, some policy deviations can occur in practice.Prevalence in RubyGems community
0 packages
found in
Top 100
0 packages
found in
Top 1k
16 packages
found in
Top 10k
191 packages
in community
Next steps
Communicate the detected issue to your certificate issuer, and have a new certificate created to resolve it.
Use your newly issued certificate to re-sign the software component.
Detected presence of high severity vulnerabilities.
Causes risk: high severity vulnerabilities
vulnerabilities
Problem
Software composition analysis has identified a component with one or more known vulnerabilities. Based on the CVSS scoring, these vulnerabilities have been marked as high severity.Prevalence in RubyGems community
36 packages
found in
Top 100
157 packages
found in
Top 1k
1717 packages
found in
Top 10k
29.81k packages
in community
Next steps
Perform impact analysis for the reported CVEs.
Update the component to the latest version.
If the update can't resolve the issue, create a plan to isolate or replace the affected component.
Problem
Digital signatures are applied to applications, packages and documents as a cryptographically secured authenticity record. Signatures verify the origin and the integrity of the object they apply to. For application signatures, or digital code signing, it is recommended to countersign the signatures for time-stamping. Countersigned software components have their signature period validity extended past the signing certificate expiration date. Such signatures are considered valid indefinitely. Failing to countersign software components may result in application errors and availability outages.Prevalence in RubyGems community
2 packages
found in
Top 100
3 packages
found in
Top 1k
20 packages
found in
Top 10k
303 packages
in community
Next steps
Consult the certificate authority code signing documentation.
With Microsoft SignTool, you can specify the trusted remote time-stamping server using the /t or /tr parameter.
Top behaviors
Contains IP addresses.
network
Prevalence in RubyGems community
Behavior often found in this community (Common)
68 packages
found in
Top 100
564 packages
found in
Top 1k
3722 packages
found in
Top 10k
59.26k packages
in community
Contains URLs with an unusual number of subdomains.
network
Prevalence in RubyGems community
Behavior often found in this community (Common)
9 packages
found in
Top 100
59 packages
found in
Top 1k
417 packages
found in
Top 10k
5.78k packages
in community
Connects through HTTP.
network
Prevalence in RubyGems community
Behavior often found in this community (Common)
17 packages
found in
Top 100
58 packages
found in
Top 1k
745 packages
found in
Top 10k
9.85k packages
in community
The software package does not declare any source code repository.
anomaly
Prevalence in RubyGems community
Behavior often found in this community (Common)
60 packages
found in
Top 100
570 packages
found in
Top 1k
6510 packages
found in
Top 10k
173.74k packages
in community
Queries the system time.
settings
Prevalence in RubyGems community
Behavior often found in this community (Common)
17 packages
found in
Top 100
77 packages
found in
Top 1k
439 packages
found in
Top 10k
19.07k packages
in community
Top vulnerabilities
Vulnerability Exploitation Lifecycle
(19 Active Vulnerabilities)
18 (18 Fixable)
CVE-2016-1000338h
CVE-2016-1000342h
CVE-2016-1000343h
1 (0 Fixable)
CVE-2023-33202m
None
None
Exploits Unknown
Exploits Exist
Exploited by Malware
Patching Mandated