Detection Library
mediumexperimentalLinuxOCIT1059
Linux Agent Invoking Perl Ruby Or PHP Interpreters
Detects AI agent runtimes spawning alternative scripting interpreters (Perl, Ruby, PHP), which may indicate execution of code in a language designed to evade Python/Node-centric detection rules.
Updated Jan 10, 2025 · OCI AI Security Team
agentic-aicode-executionperlrubyphplinuxociowasp-asi05
Problem Statement
Most AI agent runtimes are Python or Node.js based; there is no legitimate reason to invoke Perl, Ruby, or PHP. Use of these interpreters suggests an attacker is trying to execute scripts in a language that may evade Python/Node-focused security controls.
Sample Logs
{"timestamp":"2025-01-10T09:30:00Z","computer_name":"oci-worker-23","user":"agent_svc","image":"/usr/bin/perl","command_line":"perl -e 'use Socket;...'","parent_image":"/usr/bin/python3"}Required Fields
image
command_line
parent_image
user
computer_name
False Positives
- ·Agents that coordinate legacy scripts requiring Perl or Ruby interpreters as part of a multi-language workflow
Tuning Guidance
These interpreters have very limited legitimate use cases in agent environments. Treat all occurrences as high-priority events requiring analyst review unless explicitly whitelisted.