Detection Library
mediumexperimentalLinuxOCIT1071.001
Linux Agent Invoking Queue Or Broker Clients
Detects AI agent runtimes spawning message queue or broker client tools (kafka, rabbitmq, nats, mqtt, redis-cli), which may indicate unauthorized use of messaging infrastructure for inter-agent coordination or data exfiltration.
Updated Jan 10, 2025 · OCI AI Security Team
agentic-aiinter-agentmessage-queuekafkaredislinuxociowasp-asi07
Problem Statement
Message queues provide a persistent, scalable channel for inter-agent communication that may lack access controls or audit logging. An AI agent using message brokers outside its specification may be participating in a distributed attack coordinated across multiple compromised agents.
Sample Logs
{"timestamp":"2025-01-10T11:40:00Z","computer_name":"oci-worker-33","user":"agent_svc","image":"/usr/bin/redis-cli","command_line":"redis-cli -h 10.0.2.50 PUBLISH agent_commands 'EXFIL /etc/passwd'","parent_image":"/usr/bin/python3"}Required Fields
image
command_line
parent_image
user
computer_name
False Positives
- ·Event-driven agent architectures that legitimately use message queues for task distribution
- ·Data pipeline agents that publish results to message brokers as part of approved workflows
Tuning Guidance
If message queue usage is expected, monitor the queue topics and message content for anomalous patterns. Alert on connections to broker hosts not in the approved infrastructure list.