技能 编程开发 软件供应链攻击模拟

软件供应链攻击模拟

v20260328
performing-supply-chain-attack-simulation
通过检测错别名、依赖混淆、哈希校验及 pip-audit 漏洞扫描,模拟软件供应链攻击并输出 JSON 风险报告,助力安全评估与响应流程。
获取技能
93 次下载
概览

Performing Supply Chain Attack Simulation

Overview

Software supply chain attacks exploit trust in package registries through typosquatting (registering names similar to popular packages), dependency confusion (publishing higher-version public packages matching private names), and compromised package distribution. This skill detects these attack vectors by computing Levenshtein distance between package names and popular PyPI packages, verifying package integrity via SHA-256 hash comparison, scanning for known CVEs with pip-audit, and testing dependency resolution order for confusion vulnerabilities.

When to Use

  • When conducting security assessments that involve performing supply chain attack simulation
  • When following incident response procedures for related security events
  • When performing scheduled security testing or auditing activities
  • When validating security controls through hands-on testing

Prerequisites

  • Python 3.9+ with pip-audit, Levenshtein, requests
  • Access to PyPI JSON API (https://pypi.org/pypi/{package}/json)
  • Network access for package metadata retrieval

Legal Notice: This skill is for authorized security testing and educational purposes only. Unauthorized use against systems you do not own or have written permission to test is illegal and may violate computer fraud laws.

Key Detection Areas

  1. Typosquatting — compare package names against top PyPI packages using edit distance thresholds
  2. Dependency confusion — check if internal package names exist on public PyPI with higher version numbers
  3. Hash verification — download packages and verify SHA-256 digests match published hashes
  4. Vulnerability scanning — audit installed packages against OSV and PyPA advisory databases
  5. Metadata anomalies — flag packages with suspicious author emails, missing homepages, or very recent first upload dates

Output

JSON report with risk scores per package, detected attack vectors, hash verification results, and CVE findings.

信息
Category 编程开发
Name performing-supply-chain-attack-simulation
版本 v20260328
大小 10.1KB
更新时间 2026-03-31
语言