Detection Library
highexperimentalLinuxOCIT1059.004
Linux Agent Executing From Temporary Or Shared Memory Paths
Detects AI agent runtimes spawning processes from temporary or shared memory paths (/tmp, /dev/shm), indicating execution of dynamically dropped payloads — a hallmark of fileless malware or prompt-injection-driven code execution.
Updated Jan 10, 2025 · OCI AI Security Team
agentic-aicode-executiontemp-pathfilelesslinuxociowasp-asi05
Problem Statement
Execution from /tmp or /dev/shm is the defining behavior of a dropper attack. When an AI agent spawns processes from these paths it indicates the agent has been directed to download, stage, and execute an unauthorized payload — a critical security event requiring immediate investigation.
Sample Logs
{"timestamp":"2025-01-10T16:20:00Z","computer_name":"oci-worker-20","user":"agent_svc","image":"/tmp/agent_payload_x7k2","command_line":"/tmp/agent_payload_x7k2","parent_image":"/usr/bin/python3"}Required Fields
image
command_line
parent_image
user
computer_name
False Positives
- ·Test frameworks that compile and execute temporary test binaries in /tmp
- ·Some legitimate agent frameworks that extract bundled native extensions to /tmp at startup
Tuning Guidance
Use noexec mount options on /tmp and /dev/shm where possible to prevent execution. Alert on executions from these paths in environments where noexec cannot be enforced.