Detection Library
mediumexperimentalLinuxOCIT1588

Linux Agent Modifying Dependency Or Runtime Configuration

Detects AI agent processes modifying Python or Node.js dependency configuration files (requirements.txt, package.json, pip.conf), which could be used to introduce malicious dependencies or redirect package sources.

Updated Jan 10, 2025 · OCI AI Security Team

agentic-aisupply-chaindependency-tamperinglinuxociowasp-asi04

Problem Statement

Dependency configuration files control what software is installed in the agent runtime. Unauthorized modifications can introduce malicious packages that execute within the agent's security context, potentially gaining access to all data and credentials the agent handles.

Sample Logs

{"timestamp":"2025-01-10T14:30:00Z","computer_name":"oci-worker-19","user":"agent_svc","image":"/usr/bin/python3","target_filename":"/opt/agent/requirements.txt","event_type":"file_modify"}

Required Fields

image
target_filename
user
computer_name

False Positives

  • ·Development agents that dynamically update dependency files as part of a software development task
  • ·Dependency management bots that automatically update package versions

Tuning Guidance

Make dependency files read-only in production environments. Alert on any modifications in production and treat all changes in development as requiring review.