Detection Library
highexperimentalLinuxOCIT1552.001

Linux Agent Accessing OCI Security Token Or API Material

Detects AI agent processes reading OCI session tokens, security credentials, or API key files, indicating potential identity theft or privilege escalation driven by an agent operating outside its authorized scope.

Updated Jan 10, 2025 · OCI AI Security Team

agentic-aicredential-accessoci-tokenidentity-abuselinuxociowasp-asi03

Problem Statement

OCI session tokens and API keys grant access to cloud resources and services. An AI agent reading these credentials beyond the scope of its initial authentication represents identity abuse and could be used to perform unauthorized OCI operations under the agent's cloud identity.

Sample Logs

{"timestamp":"2025-01-10T11:02:18Z","computer_name":"oci-worker-10","user":"agent_svc","image":"/usr/bin/python3","target_filename":"/home/agent_svc/.oci/sessions/DEFAULT/security_token","access_type":"read"}

Required Fields

image
target_filename
user
computer_name

False Positives

  • ·OCI SDK initialization code that reads token files at startup for session-based authentication
  • ·Token refresh daemons that periodically update session tokens

Tuning Guidance

Baseline expected token reads at agent startup and suppress repeating patterns. Alert on reads from processes not in the approved agent binary list or reads occurring long after initialization.