Detection Library
mediumexperimentalLinuxOCIT1059.004
Linux Agent Running User Downloaded Scripts
Detects AI agent processes executing scripts located in user download directories, which may indicate execution of malicious content retrieved from the internet as part of a hijacked agent task.
Updated Jan 10, 2025 · OCI AI Security Team
agentic-aicode-executiondownloadslinuxociowasp-asi05
Problem Statement
Executing downloaded scripts without verification is a fundamental security risk. An AI agent that downloads and executes scripts may have been directed via prompt injection to retrieve and run attacker-controlled code from the internet.
Sample Logs
{"timestamp":"2025-01-10T15:00:00Z","computer_name":"oci-desktop-02","user":"agent_svc","image":"/home/agent_svc/Downloads/install.sh","command_line":"/home/agent_svc/Downloads/install.sh"}Required Fields
image
command_line
user
computer_name
False Positives
- ·Users who legitimately download and run installation scripts as part of software setup tasks
Tuning Guidance
Alert when the downloading agent process and executing agent process are the same (download followed by execute within a short window). Suppress known-safe installer scripts by hash.