Spectra Assure
Community
Docs
passEverything is awesome!
Scanned: 15 days ago

sisimai

latest
Top 10k
Mail Analyzing Interface
License: Permissive (BSD-2-Clause)
Published: 2 months ago



SAFE Assessment

Compliance

Licenses
No license compliance issues
Secrets
No sensitive information found

Security

Vulnerabilities
No known vulnerabilities detected
Hardening
No application hardening issues

Threats

Tampering
No evidence of software tampering
Malware
No evidence of malware inclusion

Popularity

525.77k
Total Downloads
Contributor
Declared Dependencies
1
Dependents

Top issues

Problem

Software developers use programming and design knowledge to build reusable software components. Software components are the basic building blocks for modern applications. Software consumed by an enterprise consists of hundreds, and sometimes even thousands of open source components. Software developers publish components they have authored to public repositories. While a new software project is a welcome addition to the open source community. it is not always prudent to indiscriminately use the latest components when building a commercial application. Irrespective of the software quality, the danger of using components that are rarely used to build applications lies in the fact that the software component may contain novel, currently undetected malicious code. Therefore, it is prudent to review software component behaviors and even try out software component in a sandbox, an environment meant for testing untrusted code.

Prevalence in RubyGems community

No prevalence information at this time

Next steps

Check the software component behaviors for anomalies.
Consider exploratory software component testing within a sandbox environment.
Consider replacing the software component with a more widely used alternative.
Avoid using this software package until it is vetted as safe.

Problem

Proprietary ReversingLabs analysis engine supports a wide range of commonly used archive and software packaging formats. Using automated static file decomposition technologies, the engine recursively analyzes complex software packages. Software analysis is typically conducted in multiple steps. Content identification, unpacking, validation, and classification are some of the steps performed on each analyzed file. The analysis engine may sometimes identify archive or software packaging formats that are not supported for deep file inspection or unpacking. This issue is reported for files that might contain additional software components that were not listed in the Software Bill of Materials (SBOM) due to lack of packaging format support. File reputation lookup and surface level analysis are still performed for all unsupported file formats. Therefore, some files might get detected as malicious even though they are packaged in an unsupported format.

Prevalence in RubyGems community

0 packages
found in
Top 100
2 packages
found in
Top 1k
6 packages
found in
Top 10k
38 packages
in community

Next steps

Consult the ReversingLabs product documentation for a list of supported archive and software packaging formats.
Consider repackaging the software in an alternative file format to increase the analysis coverage.
Contact the ReversingLabs product management team to discuss our format coverage roadmap.

Problem

Private keys and certificates are considered sensitive information that should not be included in released software packages. However, developers frequently release sensitive information alongside their applications to facilitate automated software testing. Testing keys and certificates often proliferate through the software supply chain. When such information gets shared publicly, it is catalogued by file reputation databases. Any private key and certificate files seen by a file reputation database prior to configured time threshold can be automatically suppressed. Commonly shared sensitive information is not considered to be secret.

Prevalence in RubyGems community

16 packages
found in
Top 100
83 packages
found in
Top 1k
671 packages
found in
Top 10k
5227 packages
in community

Next steps

Review the commonly shared sensitive information for evidence of inadvertently exposed secrets.
If the keys were published unintentionally and the software has been made public, you should revoke the keys and file a security incident.

Top behaviors

Prevalence in RubyGems community

Behavior uncommon for this community (Uncommon)
1 packages
found in
Top 100
3 packages
found in
Top 1k
34 packages
found in
Top 10k
242 packages
in community

Prevalence in RubyGems community

Behavior often found in this community (Common)
15 packages
found in
Top 100
74 packages
found in
Top 1k
454 packages
found in
Top 10k
3816 packages
in community

Prevalence in RubyGems community

Behavior often found in this community (Common)
53 packages
found in
Top 100
247 packages
found in
Top 1k
2209 packages
found in
Top 10k
16324 packages
in community

Prevalence in RubyGems community

Behavior uncommon for this community (Uncommon)
0 packages
found in
Top 100
0 packages
found in
Top 1k
5 packages
found in
Top 10k
9 packages
in community

Prevalence in RubyGems community

Behavior often found in this community (Common)
13 packages
found in
Top 100
54 packages
found in
Top 1k
440 packages
found in
Top 10k
3598 packages
in community

Top vulnerabilities

No vulnerabilities found.