Detection Library
highexperimentalLinuxOCIT1552.004
Linux Agent Reading SSH Private Keys
Detects AI agent processes accessing SSH private key files, which could enable unauthorized lateral movement to other hosts in the OCI environment.
Updated Jan 10, 2025 · OCI AI Security Team
agentic-aicredential-accessssh-keysidentity-abuselinuxociowasp-asi03
Problem Statement
SSH private keys provide persistent authentication capability to any host that trusts the corresponding public key. An AI agent reading private key material has the ability to impersonate the key owner across the entire OCI environment, enabling broad lateral movement.
Sample Logs
{"timestamp":"2025-01-10T12:44:30Z","computer_name":"oci-worker-11","user":"agent_svc","image":"/usr/bin/python3","target_filename":"/home/agent_svc/.ssh/id_rsa","access_type":"read"}Required Fields
image
target_filename
user
computer_name
False Positives
- ·Deployment automation using Paramiko that reads private keys to authenticate SSH sessions as part of a legitimate deployment task
Tuning Guidance
There are very few legitimate reasons for an AI agent to read raw private key files. Alert on all occurrences and suppress only approved deployment automation service accounts with documented justification.