Detection Library
lowexperimentalLinuxOCIT1566

Linux Agent Writing Retrieved Web Content Into Memory Stores

Detects AI agent processes writing fetched web content directly into memory or context store directories, which may indicate content containing indirect prompt injection instructions is being persisted in agent memory.

Updated Jan 10, 2025 · OCI AI Security Team

agentic-aimemory-poisoningweb-contentindirect-injectionlinuxociowasp-asi06

Problem Statement

When an agent fetches web content and stores it in its memory layer, any prompt injection embedded in that content becomes part of the agent's persistent context. This can cause the agent to carry out attacker instructions in subsequent sessions long after the initial injection.

Sample Logs

{"timestamp":"2025-01-10T16:00:00Z","computer_name":"oci-worker-28","user":"agent_svc","image":"/usr/bin/python3","target_filename":"/opt/agent/memory/fetched_page_20250110.html","event_type":"CreateFile"}

Required Fields

image
target_filename
user
computer_name

False Positives

  • ·Web research agents that cache fetched pages in memory directories as part of their normal research workflow

Tuning Guidance

This is a low-severity signal intended to be combined with behavioral correlation. Elevate priority when the source URL for the fetched content is a newly observed or suspicious domain.