Detection Library
mediumexperimentalLinuxOCIT1588

Linux Agent Executing From Site-Packages Node Modules Or Temporary Paths

Detects AI agent activity originating from Python site-packages, node_modules, or temporary directories, indicating potential execution of recently installed or dropped malicious packages.

Updated Jan 10, 2025 · OCI AI Security Team

agentic-aisupply-chainpackage-executiontemp-pathlinuxociowasp-asi04

Problem Statement

Execution from package directories following a recent package installation is a strong indicator of supply chain compromise. Malicious packages may include post-install hooks or entry points that execute automatically when imported by the agent.

Sample Logs

{"timestamp":"2025-01-10T16:45:00Z","computer_name":"oci-worker-17","user":"agent_svc","image":"/usr/lib/python3/site-packages/malicious_pkg/runner.py","command_line":"python3 runner.py","parent_image":"/usr/bin/python3"}

Required Fields

image
command_line
user
computer_name

False Positives

  • ·Legitimate Python packages with entry-point scripts that execute from site-packages
  • ·Node.js CLI tools installed globally that execute from node_modules

Tuning Guidance

Maintain a hash allowlist of approved package entry points. Alert on executions from recently installed packages (installed within the last 24 hours) or packages not in the approved inventory.