Top issues
Detected presence of plaintext credentials within network protocol strings.
Causes risk: web service credentials found
secrets
Problem
Various network communication protocols allow including plaintext authentication credentials. Information such as user names and passwords could be passed through a non-encrypted channel, and therefore intercepted by malicious actors. Credentials are considered secrets, and should be kept encrypted until they are used. This policy control matches the following URI pattern protocol://username:password@domain within any software package component.Prevalence in RubyGems community
6 packages
found in
Top 100
16 packages
found in
Top 1k
69 packages
found in
Top 10k
401 packages
in community
Next steps
Review the reported matches. If the warning refers to a placeholder credential value, it can be safely ignored.
Problem
Uniform Resource Locators (URLs) are structured addresses that point to locations and assets on the internet. URLs allow software developers to build complex applications that exchange data with servers that can be hosted in multiple geographical regions. URLs can commonly be found embedded in documentation, configuration files, source code and compiled binaries. A port number is associated with a network address of a host, such as an IP address, and the type of network protocol used for communication. Within URLs, the ports are optional. Ports can be specified in a URL immediately following the domain name. Each network protocol, or schema, has a set of standard ports on which the service operates. This issue is raised when a mismatch between a network protocol and its expected port number is detected. While the presence of non-standard ports does not imply malicious intent, all of their uses in a software package should be documented and approved.Prevalence in RubyGems community
27 packages
found in
Top 100
375 packages
found in
Top 1k
1571 packages
found in
Top 10k
15785 packages
in community
Next steps
Investigate reported detections.
If the software should not include these network references, investigate your build and release environment for software supply chain compromise.
You should delay the software release until the investigation is completed, or until the issue is risk accepted.
Consider changing the port to one that is standard for the networking protocol.
Top behaviors
Contains URLs that use non-standard ports.
network
Prevalence in RubyGems community
Behavior often found in this community (Common)
27 packages
found in
Top 100
376 packages
found in
Top 1k
1574 packages
found in
Top 10k
15826 packages
in community
Contains URLs that contain basic authentication credentials.
network
Prevalence in RubyGems community
Behavior often found in this community (Common)
13 packages
found in
Top 100
54 packages
found in
Top 1k
440 packages
found in
Top 10k
3598 packages
in community
Contains IP addresses.
network
Prevalence in RubyGems community
Behavior often found in this community (Common)
68 packages
found in
Top 100
566 packages
found in
Top 1k
3736 packages
found in
Top 10k
43562 packages
in community
Contains URLs with unusual hostname lengths.
network
Prevalence in RubyGems community
Behavior often found in this community (Common)
24 packages
found in
Top 100
102 packages
found in
Top 1k
760 packages
found in
Top 10k
6608 packages
in community
Contains URLs that reference the host by IP address.
network
Prevalence in RubyGems community
Behavior often found in this community (Common)
20 packages
found in
Top 100
127 packages
found in
Top 1k
989 packages
found in
Top 10k
8764 packages
in community
Top vulnerabilities
No vulnerabilities found.