Detection Library
lowexperimentalLinuxOCIT1071.001

Linux Agent Writing Shared Socket Or IPC Artifacts

Detects AI agent processes creating Unix socket files or named pipes that could be used as unmonitored inter-agent communication channels, bypassing network-layer security controls.

Updated Jan 10, 2025 · OCI AI Security Team

agentic-aiinter-agentipcsocketlinuxociowasp-asi07

Problem Statement

Unix sockets and named pipes provide IPC channels that bypass network monitoring entirely. An AI agent creating ad hoc socket files may be establishing a covert communication channel with another agent or process, outside the visibility of network security controls.

Sample Logs

{"timestamp":"2025-01-10T08:45:00Z","computer_name":"oci-worker-32","user":"agent_svc","image":"/usr/bin/python3","target_filename":"/tmp/agent_ipc_7a3f.sock","event_type":"CreateFile"}

Required Fields

image
target_filename
user
computer_name

False Positives

  • ·Python web frameworks (Flask, FastAPI, Gunicorn) that create Unix socket files for efficient local communication
  • ·Database clients that create socket files for local database connections

Tuning Guidance

Allowlist known legitimate socket paths (e.g., database sockets). Alert on sockets with non-standard or randomized names that suggest dynamic creation for covert communication.