mirror of
https://github.com/falcosecurity/falco.git
synced 2025-08-12 11:32:39 +00:00
cleanup(rules): cleanup redundant use of always_true macros
Signed-off-by: Melissa Kilby <melissa.kilby.oss@gmail.com>
This commit is contained in:
parent
7387fffcef
commit
6c12cc655e
@ -2672,9 +2672,6 @@
|
|||||||
WARNING
|
WARNING
|
||||||
tags: [process, mitre_defense_evasion]
|
tags: [process, mitre_defense_evasion]
|
||||||
|
|
||||||
- macro: consider_all_chmods
|
|
||||||
condition: (always_true)
|
|
||||||
|
|
||||||
- list: user_known_chmod_applications
|
- list: user_known_chmod_applications
|
||||||
items: [hyperkube, kubelet, k3s-agent]
|
items: [hyperkube, kubelet, k3s-agent]
|
||||||
|
|
||||||
@ -2690,7 +2687,7 @@
|
|||||||
this means that the application will run with the privileges of the owning user or group respectively.
|
this means that the application will run with the privileges of the owning user or group respectively.
|
||||||
Detect setuid or setgid bits set via chmod
|
Detect setuid or setgid bits set via chmod
|
||||||
condition: >
|
condition: >
|
||||||
consider_all_chmods and chmod and (evt.arg.mode contains "S_ISUID" or evt.arg.mode contains "S_ISGID")
|
chmod and (evt.arg.mode contains "S_ISUID" or evt.arg.mode contains "S_ISGID")
|
||||||
and not proc.name in (user_known_chmod_applications)
|
and not proc.name in (user_known_chmod_applications)
|
||||||
and not exe_running_docker_save
|
and not exe_running_docker_save
|
||||||
and not user_known_set_setuid_or_setgid_bit_conditions
|
and not user_known_set_setuid_or_setgid_bit_conditions
|
||||||
@ -3023,7 +3020,6 @@
|
|||||||
desc: New executable created in a container due to chmod
|
desc: New executable created in a container due to chmod
|
||||||
condition: >
|
condition: >
|
||||||
chmod and
|
chmod and
|
||||||
consider_all_chmods and
|
|
||||||
container and
|
container and
|
||||||
not runc_writing_exec_fifo and
|
not runc_writing_exec_fifo and
|
||||||
not runc_writing_var_lib_docker and
|
not runc_writing_var_lib_docker and
|
||||||
@ -3124,16 +3120,12 @@
|
|||||||
priority: WARNING
|
priority: WARNING
|
||||||
tags: [container, cis, mitre_lateral_movement]
|
tags: [container, cis, mitre_lateral_movement]
|
||||||
|
|
||||||
- macro: consider_userfaultfd_activities
|
|
||||||
condition: (always_true)
|
|
||||||
|
|
||||||
- list: user_known_userfaultfd_processes
|
- list: user_known_userfaultfd_processes
|
||||||
items: []
|
items: []
|
||||||
|
|
||||||
- rule: Unprivileged Delegation of Page Faults Handling to a Userspace Process
|
- rule: Unprivileged Delegation of Page Faults Handling to a Userspace Process
|
||||||
desc: Detect a successful unprivileged userfaultfd syscall which might act as an attack primitive to exploit other bugs
|
desc: Detect a successful unprivileged userfaultfd syscall which might act as an attack primitive to exploit other bugs
|
||||||
condition: >
|
condition: >
|
||||||
consider_userfaultfd_activities and
|
|
||||||
evt.type = userfaultfd and
|
evt.type = userfaultfd and
|
||||||
user.uid != 0 and
|
user.uid != 0 and
|
||||||
(evt.rawres >= 0 or evt.res != -1) and
|
(evt.rawres >= 0 or evt.res != -1) and
|
||||||
|
Loading…
Reference in New Issue
Block a user