Detection Library
mediumexperimentalLinuxOCIT1588
Linux Agent Modifying Dependency Or Runtime Configuration
Detects AI agent processes modifying Python or Node.js dependency configuration files (requirements.txt, package.json, pip.conf), which could be used to introduce malicious dependencies or redirect package sources.
Updated Jan 10, 2025 · OCI AI Security Team
agentic-aisupply-chaindependency-tamperinglinuxociowasp-asi04
Problem Statement
Dependency configuration files control what software is installed in the agent runtime. Unauthorized modifications can introduce malicious packages that execute within the agent's security context, potentially gaining access to all data and credentials the agent handles.
Sample Logs
{"timestamp":"2025-01-10T14:30:00Z","computer_name":"oci-worker-19","user":"agent_svc","image":"/usr/bin/python3","target_filename":"/opt/agent/requirements.txt","event_type":"file_modify"}Required Fields
image
target_filename
user
computer_name
False Positives
- ·Development agents that dynamically update dependency files as part of a software development task
- ·Dependency management bots that automatically update package versions
Tuning Guidance
Make dependency files read-only in production environments. Alert on any modifications in production and treat all changes in development as requiring review.