Detection Library

Detection Knowledge Base

Searchable library of production-grade detections with full logic, tuning guidance, and deployment notes.

60 detections

Suspicious PowerShell Encoded Command Execution

high

Detects execution of PowerShell with base64-encoded commands, commonly used by attackers to obfuscate malicious payloads.

productionWindowsEndpointT1059.001T1027Execution

LSASS Memory Dump via Task Manager or ProcDump

critical

Detects attempts to dump LSASS process memory for credential harvesting using common tools.

stableWindowsEndpointT1003.001Credential Access

AWS CloudTrail — Suspicious IAM Policy Attachment

high

Detects when overly permissive IAM policies (AdministratorAccess, FullAccess) are attached to roles or users.

productionAWSCloudT1098T1078.004Privilege Escalation

LLM Prompt Injection via API Gateway Logs

high

Detects potential prompt injection attacks targeting LLM-backed API endpoints by identifying known injection patterns in request bodies.

experimentalCloudAI/MLT1190T1059AI Security

Lateral Movement via WMI Remote Execution

high

Detects remote WMI execution commonly used for lateral movement, persistence, and command execution across network hosts.

productionWindowsNetworkT1047Lateral Movement

OCI Object Storage Mass Download — Data Exfiltration

high

Detects bulk GetObject requests against OCI Object Storage buckets, indicating potential data exfiltration via the OCI API or console.

stableOCICloudT1530Exfiltration

OCI IAM Policy Change by Non-Admin Principal

critical

Detects creation, modification, or deletion of OCI IAM policies by principals that are not designated IAM administrators.

productionOCICloudT1098T1078.004Privilege Escalation

OCI API Key Created for Existing User — Credential Persistence

high

Detects creation of new API keys for existing IAM users, a common persistence mechanism after initial compromise.

stableOCICloudT1098.001T1556Persistence

OCI Console Login from New Country or Tor Exit Node

high

Detects OCI console sign-in events originating from a country not previously seen for the user, or from known Tor exit node IP ranges.

productionOCICloudT1078.004Initial Access

OCI Cross-Compartment Resource Access Anomaly

medium

Detects a principal accessing resources in compartments outside their normal operational scope, indicating potential lateral movement or policy misconfiguration exploitation.

experimentalOCICloudT1078.004T1021Lateral Movement

AI Agent Spawning Shell Interpreter

high

Detects AI agent runtimes (Python, Node) spawning interactive shell interpreters — a strong indicator of agent goal hijacking, prompt injection leading to code execution, or unsafe tool invocation.

experimentalLinuxOCIT1059.004AI Security

Linux Agent Connecting To Non-OCI External Destination

medium

Detects AI agent processes establishing network connections to external destinations outside the expected OCI network space, which may indicate exfiltration, C2 communication, or prompt-injection-driven outbound calls.

experimentalLinuxOCIT1071.001AI Security

Linux Agent Accessing OCI CLI Config Or API Keys

high

Detects AI agent processes reading OCI CLI configuration files or API key material, which may indicate credential harvesting driven by goal hijacking or prompt injection.

experimentalLinuxOCIT1552.001AI Security

Linux Agent Writing Temporary Execution Script

medium

Detects AI agent runtimes writing script files to temporary directories, a common pattern when an agent has been hijacked into generating and executing arbitrary code payloads.

experimentalLinuxOCIT1059.004AI Security

Linux Agent Reading Browser Or Session Storage

high

Detects AI agent processes accessing browser profile directories or session storage files, which may indicate credential or token theft driven by a hijacked agent goal.

experimentalLinuxOCIT1552.001AI Security

Linux Agent Spawning Curl Wget Or Netcat

high

Detects AI agent runtimes spawning network utility tools such as curl, wget, or netcat, indicating potential data exfiltration, payload download, or reverse shell establishment driven by tool misuse or prompt injection.

experimentalLinuxOCIT1105AI Security

Linux Agent Invoking OCI CLI With Destructive Verbs

high

Detects AI agent processes executing OCI CLI commands with destructive action verbs (delete, terminate, disable, purge), indicating potential misuse of cloud management tools to destroy infrastructure or data.

experimentalLinuxOCIT1485AI Security

Linux Agent Compressing User Data

medium

Detects AI agent runtimes spawning archive utilities (tar, zip, gzip) which may indicate data staging prior to exfiltration, a common tool misuse pattern in AI agent attacks.

experimentalLinuxOCIT1560AI Security

Linux Agent Modifying Hosts File

high

Detects AI agent processes writing to /etc/hosts, which could redirect DNS resolution to attacker-controlled infrastructure or disable security tool connectivity.

experimentalLinuxOCIT1565.001AI Security

Linux Agent Invoking SSH Or SFTP

high

Detects AI agent runtimes spawning SSH or SFTP processes, which may indicate lateral movement, unauthorized remote code execution, or data exfiltration via encrypted channels.

experimentalLinuxOCIT1021.004AI Security

Linux Agent Accessing OCI Security Token Or API Material

high

Detects AI agent processes reading OCI session tokens, security credentials, or API key files, indicating potential identity theft or privilege escalation driven by an agent operating outside its authorized scope.

experimentalLinuxOCIT1552.001AI Security

Linux Agent Reading SSH Private Keys

high

Detects AI agent processes accessing SSH private key files, which could enable unauthorized lateral movement to other hosts in the OCI environment.

experimentalLinuxOCIT1552.004AI Security

Linux Agent Invoking Sudo Or Su

high

Detects AI agent runtimes executing sudo or su to escalate privileges, a strong indicator that the agent is attempting to gain root access beyond its intended operational scope.

experimentalLinuxOCIT1548.003AI Security

Linux Agent Reading Cloud Credentials Beyond OCI

high

Detects AI agent processes accessing credential files for cloud providers other than OCI (AWS, Azure, GCP), which may indicate multi-cloud credential harvesting.

experimentalLinuxOCIT1552.001AI Security

Linux Agent Invoking Credential Enumeration Commands

medium

Detects AI agent processes running commands associated with credential discovery and enumeration (env, printenv, id, whoami, getent), which may indicate an agent performing reconnaissance on its execution environment.

experimentalLinuxOCIT1552.007AI Security

Linux Agent Installing Packages From Non-Approved Repositories

medium

Detects AI agent processes establishing network connections to package repository hosts other than approved mirrors, indicating potential supply chain compromise via installation of malicious packages.

experimentalLinuxOCIT1588AI Security

Linux Agent Writing Tool Plugin Or MCP Artifacts

medium

Detects AI agent processes writing files to known tool plugin or MCP (Model Context Protocol) directories, which may indicate unauthorized modification of the agent's tool set or injection of malicious tool definitions.

experimentalLinuxOCIT1588AI Security

Linux Agent Executing From Site-Packages Node Modules Or Temporary Paths

medium

Detects AI agent activity originating from Python site-packages, node_modules, or temporary directories, indicating potential execution of recently installed or dropped malicious packages.

experimentalLinuxOCIT1588AI Security

Linux Agent Connecting To Unapproved MCP Or Tool Endpoints

high

Detects AI agent processes connecting to MCP server ports or tool endpoint addresses that are not in the approved configuration, which may indicate tool hijacking or connection to a rogue MCP server.

experimentalLinuxOCIT1071.001AI Security

Linux Agent Modifying Dependency Or Runtime Configuration

medium

Detects AI agent processes modifying Python or Node.js dependency configuration files (requirements.txt, package.json, pip.conf), which could be used to introduce malicious dependencies or redirect package sources.

experimentalLinuxOCIT1588AI Security

Linux Agent Executing From Temporary Or Shared Memory Paths

high

Detects AI agent runtimes spawning processes from temporary or shared memory paths (/tmp, /dev/shm), indicating execution of dynamically dropped payloads — a hallmark of fileless malware or prompt-injection-driven code execution.

experimentalLinuxOCIT1059.004AI Security

Linux Agent Launching Inline Shell Or Interpreter Commands

high

Detects AI agent runtimes passing inline code (-c flag) to shell or interpreter commands, which is commonly used to execute injected or dynamically generated payloads without writing files to disk.

experimentalLinuxOCIT1059.004AI Security

Linux Agent Dropping And Launching Executable Content

high

Detects AI agent processes writing executable files (binaries, scripts with execute permissions) to disk, which is the dropper stage of an agent-mediated malware delivery attack.

experimentalLinuxOCIT1105AI Security

Linux Agent Invoking Perl Ruby Or PHP Interpreters

medium

Detects AI agent runtimes spawning alternative scripting interpreters (Perl, Ruby, PHP), which may indicate execution of code in a language designed to evade Python/Node-centric detection rules.

experimentalLinuxOCIT1059AI Security

Linux Agent Running User Downloaded Scripts

medium

Detects AI agent processes executing scripts located in user download directories, which may indicate execution of malicious content retrieved from the internet as part of a hijacked agent task.

experimentalLinuxOCIT1059.004AI Security

Linux Agent Modifying Local Memory Or Context Stores

medium

Detects AI agent processes writing to local vector store or memory database files, which may indicate an agent poisoning its own context memory to influence future behavior.

experimentalLinuxOCIT1565.001AI Security

Linux Agent Overwriting Prompt Template Or System Instruction Files

high

Detects AI agent processes modifying prompt template files or system instruction configurations, which represents a direct attempt to alter the agent's core behavioral guidelines.

experimentalLinuxOCIT1565.001AI Security

Linux Agent Ingesting Context From Downloaded Files

medium

Detects AI agent processes reading files from download directories that may contain adversarial content designed to poison the agent's context window via indirect prompt injection.

experimentalLinuxOCIT1566AI Security

Linux Agent Modifying Vector Database Files

medium

Detects AI agent processes directly modifying vector database files used for RAG (Retrieval Augmented Generation) memory, which may indicate deliberate poisoning of the agent's knowledge retrieval layer.

experimentalLinuxOCIT1565.001AI Security

Linux Agent Writing Retrieved Web Content Into Memory Stores

low

Detects AI agent processes writing fetched web content directly into memory or context store directories, which may indicate content containing indirect prompt injection instructions is being persisted in agent memory.

experimentalLinuxOCIT1566AI Security

Linux Agent Connecting To Localhost Tooling Services

low

Detects AI agent processes establishing connections to localhost on common tooling and inter-agent communication ports, which may indicate unmonitored agent-to-tool or agent-to-agent communication channels.

experimentalLinuxOCIT1071.001AI Security

Linux Agent Opening Listener Port

medium

Detects AI agent processes binding to network ports as a listener, which may indicate the agent has established an unauthorized service endpoint for receiving commands or relaying inter-agent communication.

experimentalLinuxOCIT1071.001AI Security

Linux Agent Connecting To Peer Workstation Style Ports

medium

Detects AI agent processes connecting to ports commonly used for inter-agent or peer-to-peer communication (including Docker daemon ports), which may indicate unauthorized agent orchestration or container escape attempts.

experimentalLinuxOCIT1071.001AI Security

Linux Agent Writing Shared Socket Or IPC Artifacts

low

Detects AI agent processes creating Unix socket files or named pipes that could be used as unmonitored inter-agent communication channels, bypassing network-layer security controls.

experimentalLinuxOCIT1071.001AI Security

Linux Agent Invoking Queue Or Broker Clients

medium

Detects AI agent runtimes spawning message queue or broker client tools (kafka, rabbitmq, nats, mqtt, redis-cli), which may indicate unauthorized use of messaging infrastructure for inter-agent coordination or data exfiltration.

experimentalLinuxOCIT1071.001AI Security

Linux Agent Excessive Child Process Burst (Seed Rule)

low

Baseline seed rule to detect AI agent runtimes spawning an unusual number of child processes in a short time window, which may indicate runaway agent loops, denial of service behavior, or cascading failure conditions.

experimentalLinuxOCIT1499AI Security

Linux Agent Repeated External Connection (Seed Rule)

low

Baseline seed rule to detect AI agent processes making high-frequency repeated external network connections, which may indicate beaconing behavior, an infinite retry loop, or API hammering that causes cascading service failures.

experimentalLinuxOCIT1499AI Security

Linux Agent Repeated Launch Of Browser Or Desktop Apps

medium

Detects AI agent runtimes repeatedly spawning browser or desktop application processes, indicating a potential runaway automation loop that may exhaust system resources or trigger cascading UI-automation failures.

experimentalLinuxOCIT1499AI Security

Linux Agent Mass File Write (Seed Rule)

low

Baseline seed rule to detect AI agent processes writing an unusually large number of files in a short time window, which may indicate a runaway file generation loop, ransomware-like behavior, or uncontrolled data staging.

experimentalLinuxOCIT1485AI Security

Linux Agent Recursive Self-Spawn

high

Detects AI agent Python or Node processes where both the parent and child process are the same interpreter binary, indicating recursive self-spawning that can rapidly exhaust process table limits and trigger cascading system failures.

experimentalLinuxOCIT1499AI Security

Linux Agent Creating Approval Or Authorization Themed Files

medium

Detects AI agent processes creating files with names suggesting urgency, approval requests, or authorization actions, which may be an attempt to socially engineer human operators into approving malicious agent actions.

experimentalLinuxOCIT1566AI Security

Linux Agent Launching Mail Or Chat Clients

medium

Detects AI agent runtimes spawning email or messaging applications (Thunderbird, Slack, Teams, Zoom), which may indicate the agent is attempting to communicate directly with humans to manipulate trust or request unauthorized approvals.

experimentalLinuxOCIT1566AI Security

Linux Agent Opening Browser To OCI Console Or Identity Pages

medium

Detects AI agent processes launching browsers with URLs pointing to OCI console, identity, or authentication pages, which may indicate the agent is attempting to perform unauthorized actions via the OCI web console.

experimentalLinuxOCIT1566AI Security

Linux Agent Dropping User-Facing Scripts On Desktop

high

Detects AI agent processes creating script files (.sh, .desktop, .url, .py) in user Desktop directories, which may represent an attempt to trick users into executing malicious scripts by placing them in a visible, trusted location.

experimentalLinuxOCIT1204.002AI Security

Linux Agent Launching Remote Support Or Meeting Tools

medium

Detects AI agent runtimes spawning remote support or meeting applications (Teams, Zoom, AnyDesk, TeamViewer), which may indicate the agent is attempting to establish unauthorized remote access or manipulate a human into sharing screen access.

experimentalLinuxOCIT1219AI Security

Linux Agent Creating Launch Agent Or Cron Persistence

critical

Detects AI agent processes writing files to persistence-related paths (cron directories, systemd unit directories, autostart), indicating an attempt to establish persistent code execution that survives reboots and agent restarts.

experimentalLinuxOCIT1543.002AI Security

Linux Agent Writing Shell Startup Persistence

high

Detects AI agent processes modifying shell initialization files (.bashrc, .profile, .zshrc, .bash_profile), which can be used to execute malicious code whenever a user or automated process opens a new shell session.

experimentalLinuxOCIT1546.004AI Security

Linux Agent Periodic External Beacon (Seed Rule)

low

Baseline seed rule to detect AI agent processes making periodic external connections at regular intervals, which is the characteristic pattern of a C2 beacon from a rogue agent maintaining contact with attacker infrastructure.

experimentalLinuxOCIT1071.001AI Security

Linux Agent Copying Itself Into Hidden Or Support Paths

high

Detects AI agent processes writing executable files (.sh, .py, .bin, .service) to hidden directories or common persistence staging paths, which indicates the agent is replicating itself to establish alternative execution points.

experimentalLinuxOCIT1036.005AI Security

Linux Agent Attempting To Disable Security Controls

critical

Detects AI agent processes executing commands that disable security software (Falcon sensor), clear firewall rules, or disable host-based firewalls — the highest-severity indicator of a fully rogue agent actively attempting to remove its detection surface.

experimentalLinuxOCIT1562.001AI Security