Detection Library
highexperimentalLinuxOCIT1552.001
Linux Agent Reading Browser Or Session Storage
Detects AI agent processes accessing browser profile directories or session storage files, which may indicate credential or token theft driven by a hijacked agent goal.
Updated Jan 10, 2025 · OCI AI Security Team
agentic-aibrowser-datasession-theftlinuxociowasp-asi01
Problem Statement
Browser session storage contains authentication cookies and saved credentials for cloud consoles including OCI. An AI agent accessing these files is almost certainly operating outside its sanctioned scope and may be attempting to harvest tokens for unauthorized access.
Sample Logs
{"timestamp":"2025-01-10T13:18:44Z","computer_name":"oci-desktop-01","user":"agent_svc","image":"/usr/bin/python3","target_filename":"/home/agent_svc/.config/google-chrome/Default/Login Data","access_type":"read"}Required Fields
image
target_filename
user
computer_name
False Positives
- ·Browser automation agents (Selenium, Playwright) that legitimately access browser profiles as part of their task
- ·Backup or sync utilities running under a Python wrapper
Tuning Guidance
Allowlist known browser automation service accounts and correlate with job metadata. Flag reads of Cookies and Login Data files specifically as these have no legitimate agent use case.