-
Notifications
You must be signed in to change notification settings - Fork 39
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Added an event for default stable rule Detect release_agent File Container Escapes #203
Conversation
…ainer Escapes Signed-off-by: GLVS Kiriti <glvskiriti2003369@gmail.com>
@FedeDP @leogr container with cap_sys_admin capability is required to run this event and user.uid=0 or CAP_DAC_OVERRIDE capability is required as mentioned in the stable rule And below is the screenshot shows rule is triggering fine on executing echo "hello world" > release_agent |
For reference followed the steps mentioned in this blog https://sysdig.com/blog/container-escape-capabilities-falco-detection/ |
Issues go stale after 90d of inactivity. Mark the issue as fresh with Stale issues rot after an additional 30d of inactivity and eventually close. If this issue is safe to close now please do so with Provide feedback via https://github.com/falcosecurity/community. /lifecycle stale |
/remove-lifecycle stale |
LGTM label has been added. Git tree hash: 51c02757cb185b9bd78df9dec116f2e2fb3eb506
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: GLVSKiriti, leogr The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
What type of PR is this?
/kind feature
Any specific area of the project related to this PR?
/area events
What this PR does / why we need it:
Which issue(s) this PR fixes:
Fixes #193
Special notes for your reviewer: