Detection Library
lowexperimentalLinuxOCINetworkT1071.001
Linux Agent Connecting To Localhost Tooling Services
Detects AI agent processes establishing connections to localhost on common tooling and inter-agent communication ports, which may indicate unmonitored agent-to-tool or agent-to-agent communication channels.
Updated Jan 10, 2025 · OCI AI Security Team
agentic-aiinter-agentlocalhosttoolinglinuxociowasp-asi07
Problem Statement
Localhost connections between an AI agent and local tooling services may lack authentication or encryption, creating attack opportunities. Unmonitored inter-process communication channels can be exploited to inject malicious tool responses or intercept sensitive data exchanged between agent components.
Sample Logs
{"timestamp":"2025-01-10T10:30:00Z","computer_name":"oci-worker-29","user":"agent_svc","image":"/usr/bin/python3","destination_ip":"127.0.0.1","destination_port":11434,"initiated":true}Required Fields
image
destination_ip
destination_port
user
computer_name
False Positives
- ·Legitimate local Ollama LLM inference on port 11434
- ·Development web servers and API services on ports 5000/8000/8080
- ·Local monitoring agents or health check endpoints
Tuning Guidance
Build an allowlist of approved localhost services and their ports per host. Alert only on connections to ports not in the allowlist for that host.