Skip to content

DET0704 Detection of Compromise Software Dependencies and Development Tools

Item Value
ID DET0704
Version 1.0
Created 21 October 2025
Last Modified 21 October 2025

Technique Detected: T1474.001 (Compromise Software Dependencies and Development Tools)

Analytics

Android

AN1823

Usage of insecure or malicious third-party libraries could be detected by application vetting services. Malicious software development tools could be detected by enterprises that deploy endpoint protection software on computers that are used to develop mobile apps. Application vetting could detect the usage of insecure or malicious third-party libraries.

Log Sources
Data Component Name Channel
API Calls (DC0112) Application Vetting None
Mutable Elements
Field Description

iOS

AN1824

Usage of insecure or malicious third-party libraries could be detected by application vetting services. Malicious software development tools could be detected by enterprises that deploy endpoint protection software on computers that are used to develop mobile apps. Application vetting could detect the usage of insecure or malicious third-party libraries.

Log Sources
Data Component Name Channel
API Calls (DC0112) Application Vetting None
Mutable Elements
Field Description