Detection Library
mediumexperimentalLinuxOCINetworkT1071.001
Linux Agent Connecting To Peer Workstation Style Ports
Detects AI agent processes connecting to ports commonly used for inter-agent or peer-to-peer communication (including Docker daemon ports), which may indicate unauthorized agent orchestration or container escape attempts.
Updated Jan 10, 2025 · OCI AI Security Team
agentic-aiinter-agentpeer-to-peerdockerlinuxociowasp-asi07
Problem Statement
Connections to Docker daemon ports from an AI agent indicate a potential container escape attempt — the agent may be trying to spawn new containers, modify container configurations, or pivot to the host system through the Docker API.
Sample Logs
{"timestamp":"2025-01-10T13:10:00Z","computer_name":"oci-worker-31","user":"agent_svc","image":"/usr/bin/python3","destination_hostname":"oci-worker-32.internal","destination_ip":"10.0.1.32","destination_port":2375,"initiated":true}Required Fields
image
destination_hostname
destination_ip
destination_port
user
computer_name
False Positives
- ·Legitimate multi-agent orchestration systems where agents communicate with peer agents via HTTP APIs
- ·Microservice architectures where the agent connects to backend services on these ports
Tuning Guidance
Alert specifically on connections to Docker daemon ports (2375/2376) as these have no legitimate agent use case. For other ports, apply destination allowlisting.