Detection Library
highexperimentalLinuxOCIT1059.004
AI Agent Spawning Shell Interpreter
Detects AI agent runtimes (Python, Node) spawning interactive shell interpreters — a strong indicator of agent goal hijacking, prompt injection leading to code execution, or unsafe tool invocation.
Updated Jan 10, 2025 · OCI AI Security Team
agentic-aishell-executionlinuxociowasp-asi01
Problem Statement
AI agents running on Linux (Python/Node runtimes) should not spawn interactive shells under normal operation. Shell spawning from agent processes indicates goal hijacking, prompt injection, or unsafe code execution. Early detection prevents lateral movement and further compromise.
Sample Logs
{"timestamp":"2025-01-10T14:22:01Z","computer_name":"oci-worker-01","user":"agent_svc","image":"/bin/bash","command_line":"bash -i","parent_image":"/usr/bin/python3","parent_command_line":"python3 /opt/agent/run.py"}Required Fields
image
command_line
parent_image
parent_command_line
user
computer_name
False Positives
- ·Legitimate automation scripts that spawn shells for system administration
- ·Build systems or CI/CD pipelines using Python to orchestrate shell tasks
Tuning Guidance
Whitelist known CI/CD service accounts and approved automation pipelines. Focus on interactive sessions (TTY-attached shells) to reduce false positives from batch automation.