mirror of
https://github.com/falcosecurity/falco.git
synced 2025-07-01 09:02:18 +00:00
Also let terminal shells run innocuous cmdlines
The terminal shell in container rule has always been less permissive than the other shell rules, mostly because we expect terminal-attached shells to be less common. However, they might run innocuous commands, especially from scripting languages like python. So allow the innocuous commands to run.
This commit is contained in:
parent
2f4b39ae6f
commit
b0bc00224c
@ -1040,6 +1040,7 @@
|
|||||||
condition: >
|
condition: >
|
||||||
spawned_process and container
|
spawned_process and container
|
||||||
and shell_procs and proc.tty != 0
|
and shell_procs and proc.tty != 0
|
||||||
|
and not proc.cmdline in (known_shell_spawn_cmdlines)
|
||||||
output: >
|
output: >
|
||||||
A shell was spawned in a container with an attached terminal (user=%user.name %container.info
|
A shell was spawned in a container with an attached terminal (user=%user.name %container.info
|
||||||
shell=%proc.name parent=%proc.pname cmdline=%proc.cmdline terminal=%proc.tty)
|
shell=%proc.name parent=%proc.pname cmdline=%proc.cmdline terminal=%proc.tty)
|
||||||
|
Loading…
Reference in New Issue
Block a user