Detection Library
highexperimentalLinuxOCIT1485
Linux Agent Invoking OCI CLI With Destructive Verbs
Detects AI agent processes executing OCI CLI commands with destructive action verbs (delete, terminate, disable, purge), indicating potential misuse of cloud management tools to destroy infrastructure or data.
Updated Jan 10, 2025 · OCI AI Security Team
agentic-aitool-misuseoci-clidestructivelinuxociowasp-asi02
Problem Statement
OCI CLI delete and terminate commands can irreversibly destroy compute instances, storage buckets, and databases. An AI agent issuing these commands represents an extreme risk of infrastructure destruction, whether through prompt injection or a compromised tool specification.
Sample Logs
{"timestamp":"2025-01-10T10:22:30Z","computer_name":"oci-worker-06","user":"agent_svc","image":"/usr/local/bin/oci","command_line":"oci compute instance terminate --instance-id ocid1.instance.oc1..aaaa --force","parent_image":"/usr/bin/python3"}Required Fields
image
command_line
parent_image
parent_command_line
user
computer_name
False Positives
- ·Legitimate infrastructure management agents that perform scheduled cleanup of expired resources
- ·DevOps automation pipelines that tear down test environments using OCI CLI
Tuning Guidance
Implement a change management allowlist: only flag OCI CLI destructive commands that occur outside approved maintenance windows or from unrecognized parent processes.