Use of software with malware
Description
One or more dependencies used in the project contains code or components suspected of being compromised by malware or malicious behavior.
Impact
- Unauthorized access and complete control of the application infrastructure. - Disruption of critical services and loss of availability. - Possible spread of malware to other applications, servers or networks, increasing the magnitude of the attack.
Recommendation
- Review the origin and integrity of affected dependencies. - Upgrade to secure versions or alternatives without known risks. - Perform security audits and code analysis for vulnerabilities. - Perform additional testing to verify that there are no compromises in the production environment.
Threat
Authenticated attacker from the Internet.
Expected Remediation Time
⏱️ 60 minutes.
Fixes