2021
DOI: 10.48550/arxiv.2107.12699
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

A Large-Scale Security-Oriented Static Analysis of Python Packages in PyPI

Jukka Ruohonen,
Kalle Hjerppe,
Kalle Rindell

Abstract: Different security issues are a common problem for open source packages archived to and delivered through software ecosystems. These often manifest themselves as software weaknesses that may lead to concrete software vulnerabilities. This paper examines various security issues in Python packages with static analysis. The dataset is based on a snapshot of all packages stored to the Python Package Index (PyPI). In total, over 197 thousand packages and over 749 thousand security issues are covered. Even under the… Show more

Help me understand this report
View published versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(7 citation statements)
references
References 35 publications
0
7
0
Order By: Relevance
“…Ohm et al's study [20] explores the forms attacks can have on different registries. Others have focused on specific registries such as PyPI [1,3,25], or npm [34]. On one hand, mechanisms to understand the impact of malicious packages have been proposed [19,33].…”
Section: Related Workmentioning
confidence: 99%
“…Ohm et al's study [20] explores the forms attacks can have on different registries. Others have focused on specific registries such as PyPI [1,3,25], or npm [34]. On one hand, mechanisms to understand the impact of malicious packages have been proposed [19,33].…”
Section: Related Workmentioning
confidence: 99%
“…29 Vulnerable packages contain a flaw in their design, 30 unhandled code error, 31 or other bad practices that could be a future security risk. 32 , 33 Communities and commercial companies have vastly researched this widespread threat (e.g., Snyk and Mend). Usually this threat is based on common vulnerabilities and exposures (CVEs).…”
Section: Introductionmentioning
confidence: 99%
“…Studies have shown a rise in malicious functionalities appearing in public repositories and highly used packages. 32 , 36 , 37 These studies have shown that there are common injection methods for malicious actors to infect packages. As Ohm et al.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations