Detection Library
mediumexperimentalLinuxOCIT1566

Linux Agent Ingesting Context From Downloaded Files

Detects AI agent processes reading files from download directories that may contain adversarial content designed to poison the agent's context window via indirect prompt injection.

Updated Jan 10, 2025 · OCI AI Security Team

agentic-aimemory-poisoningprompt-injectionindirect-injectionlinuxociowasp-asi06

Problem Statement

Indirect prompt injection occurs when adversarial instructions are embedded in content that the agent processes — documents, web pages, emails. By detecting when agents read files from download directories, defenders can identify the potential injection vector for subsequent behavioral anomalies.

Sample Logs

{"timestamp":"2025-01-10T14:00:00Z","computer_name":"oci-worker-26","user":"agent_svc","image":"/usr/bin/python3","target_filename":"/home/agent_svc/Downloads/report_with_injection.pdf","access_type":"read"}

Required Fields

image
target_filename
user
computer_name

False Positives

  • ·Agents that process user-supplied documents as part of their legitimate task (document analysis, summarization)

Tuning Guidance

This detection has high false positive potential for document-processing agents. Focus on correlating file reads with subsequent anomalous agent behavior rather than alerting on reads alone.