Also let terminal shells run innocuous cmdlines

The terminal shell in container rule has always been less permissive
than the other shell rules, mostly because we expect terminal-attached
shells to be less common. However, they might run innocuous commands,
especially from scripting languages like python. So allow the innocuous
commands to run.
This commit is contained in:
Mark Stemm 2017-11-09 14:13:04 -08:00
parent 2f4b39ae6f
commit b0bc00224c

View File

@ -1040,6 +1040,7 @@
condition: >
spawned_process and container
and shell_procs and proc.tty != 0
and not proc.cmdline in (known_shell_spawn_cmdlines)
output: >
A shell was spawned in a container with an attached terminal (user=%user.name %container.info
shell=%proc.name parent=%proc.pname cmdline=%proc.cmdline terminal=%proc.tty)