package
0.2.161
Repository: https://github.com/kubescape/node-agent.git
Documentation: pkg.go.dev

# README

IDRuleDescriptionTagsPriorityApplication profileParameters
R0001Unexpected process launchedDetecting exec calls that are not whitelisted by application profile[exec whitelisted]10truefalse
R0002Unexpected file accessDetecting file access that are not whitelisted by application profile. File access is defined by the combination of path and flags[open whitelisted]5true[ignoreMounts: bool ignorePrefixes: string[]]
R0003Unexpected system callDetecting unexpected system calls that are not whitelisted by application profile. Every unexpected system call will be alerted only once.[syscall whitelisted]5truefalse
R0004Unexpected capability usedDetecting unexpected capabilities that are not whitelisted by application profile. Every unexpected capability is identified in context of a syscall and will be alerted only once per container.[capabilities whitelisted]8truefalse
R0005Unexpected domain requestDetecting unexpected domain requests that are not whitelisted by application profile.[dns whitelisted]5truefalse
R0006Unexpected service account token accessDetecting unexpected service account token access that are not whitelisted by application profile.[token malicious whitelisted]8truefalse
R0007Kubernetes Client ExecutedDetecting exececution of kubernetes client[exec malicious whitelisted]10falsefalse
R1000Exec from malicious sourceDetecting exec calls that are from malicious source like: /dev/shm, /run, /var/run, /proc/self[exec signature]10falsefalse
R1001Exec Binary Not In Base ImageDetecting exec calls of binaries that are not included in the base image[exec malicious binary base image]10falsefalse
R1002Kernel Module LoadDetecting Kernel Module Load.[syscall kernel module load]10falsefalse
R1003Malicious SSH ConnectionDetecting ssh connection to disallowed port[ssh connection port malicious]8falsefalse
R1004Exec from mountDetecting exec calls from mounted paths.[exec mount]5falsefalse
R1006Unshare System Call usageDetecting Unshare System Call usage.[syscall escape unshare]8falsefalse
R1007Crypto MinersDetecting Crypto Miners.[network crypto miners malicious dns]8falsefalse

# Functions

No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
ReadPortRange reads the two port numbers from /proc/sys/net/ipv4/ip_local_port_range.

# Constants

No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author

# Variables

No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
SensitiveFiles is a list of sensitive files that should not be accessed by the application unexpectedly.

# Structs

No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author