SiteShadow
Back to vulnerability library

CWE-829 Inclusion of Functionality from Untrusted Control Sphere

What this means

SiteShadow flagged code or dependencies being pulled from an untrusted control sphere (untrusted registries, unchecked remote includes, dynamic plugin loading, downloading and executing code at runtime).

Why it matters

Untrusted sources can introduce malicious functionality.

Safer examples

1) Pin and verify dependencies

Use lockfiles, checksums/signatures where supported, and controlled registries (see A08 / SBOM01).

2) Don't download-and-execute at runtime

Avoid "fetch plugin code from URL" patterns. If you need extensibility, ship vetted plugins or use server-side allowlisted modules.

3) Restrict plugin/module loading

Allowlist module names and load only from a trusted, read-only directory.

How SiteShadow detects it (high level)

References

---

← Back to Vulnerability Library

Request access View coverage