Top issues
Problem
Software developers use programming and design knowledge to build reusable software components. Software components are the basic building blocks for modern applications. Software consumed by an enterprise consists of hundreds, and sometimes even thousands of open source components. Open source communities depend on the work of thousands of software developers that volunteer their time to maintain software components. Software developers build up the reputation of their open source projects by developing in public. Modern source code repositories have many social features that allow software developers to handle bug reports, have discussions with their users, and convey reaching significant project milestones. It is uncommon to find open source projects that omit linking their component to a publicly accessible source code repository.Prevalence in RubyGems community
60 packages
found in
Top 100
570 packages
found in
Top 1k
6510 packages
found in
Top 10k
173.74k packages
in community
Next steps
Check the software component behaviors for anomalies.
Consider exploratory software component testing within a sandbox environment.
Consider replacing the software component with a more widely used alternative.
Avoid using this software package until it is vetted as safe.
Detected presence of software components that have code outside of the common screen width.
hunting
Problem
Diligent software developers audit the source code of a component before it gets included in the software project. This audit often includes reviewing key pieces of code hosted in a public source repository. Aiming to avoid detection through spot-checks, attackers often hide malicious payloads by placing the code outside the common screen width. Depending on how the code editor used for review is configured, the malicious code might never be shown to the developer during the audit. Since many programming languages allow multiple statements to be made in the same line of code, both visible and off-screen code will be executed. While presence of code outside the common screen width does not imply malicious intent, all of its uses in a software package should be documented and approved. When a software package has behavior traits similar to malicious software, it may become flagged by security solutions.Prevalence in RubyGems community
0 packages
found in
Top 100
1 packages
found in
Top 1k
13 packages
found in
Top 10k
61 packages
in community
Next steps
Investigate reported detections as indicators of software tampering.
Consult Mitre ATT&CK documentation: T1027 - Obfuscated Files or Information.
Consider rewriting the flagged code without using the marked behaviors.
Top behaviors
Might contain potentially obfuscated code or data.
anomaly
Prevalence in RubyGems community
Behavior often found in this community (Common)
7 packages
found in
Top 100
38 packages
found in
Top 1k
449 packages
found in
Top 10k
5.42k packages
in community
Contains code outside of a common screen width.
stealth
Prevalence in RubyGems community
Behavior uncommon for this community (Uncommon)
0 packages
found in
Top 100
1 packages
found in
Top 1k
13 packages
found in
Top 10k
61 packages
in community
Contains Korean Local credit card numbers.
steal
Prevalence in RubyGems community
Behavior often found in this community (Common)
1 packages
found in
Top 100
5 packages
found in
Top 1k
63 packages
found in
Top 10k
562 packages
in community
Might evaluate code dynamically.
anomaly
Prevalence in RubyGems community
Behavior often found in this community (Common)
7 packages
found in
Top 100
59 packages
found in
Top 1k
558 packages
found in
Top 10k
8.58k packages
in community
Contains unusually long strings.
anomaly
Prevalence in RubyGems community
Behavior often found in this community (Common)
3 packages
found in
Top 100
51 packages
found in
Top 1k
595 packages
found in
Top 10k
8.29k packages
in community
Top vulnerabilities
No vulnerabilities found.