@@ -82,13 +82,16 @@ rule_metadata:
8282 PATH-MAC-028 : { description: "Full Kubernetes config dir; kubeconfig and cached credentials for cluster access", severity: critical, category: security }
8383 PATH-MAC-029 : { description: "pass password manager store; encrypted password vault", severity: critical, category: security }
8484 PATH-MAC-030 : { description: "HashiCorp Vault local config; may contain Vault tokens", severity: high, category: security }
85+ PATH-MAC-031 : { description: "VS Code global storage; contains extension secrets, tokens, and auth data", severity: high, category: security }
8586
8687 PATH-LIN-019 : { description: "Git credential store; plaintext git credentials cached by git-credential-store", severity: critical, category: security }
8788 PATH-LIN-020 : { description: "Global git config; may contain credential helper tokens or signing keys", severity: high, category: security }
8889 PATH-LIN-021 : { description: "Full Kubernetes config dir; kubeconfig and cached credentials for cluster access", severity: critical, category: security }
8990 PATH-LIN-022 : { description: "pass password manager store; encrypted password vault", severity: critical, category: security }
9091 PATH-LIN-023 : { description: "HashiCorp Vault local config; may contain Vault tokens", severity: high, category: security }
9192 PATH-LIN-024 : { description: "Kubernetes in-pod secrets mount; cluster secrets injected at runtime", severity: critical, category: security }
93+ PATH-LIN-025 : { description: "/proc/[pid]/mem; direct process memory read/write, bypasses file permissions and enables credential extraction", severity: critical, category: security }
94+ PATH-LIN-026 : { description: "/sys/kernel/debug; kernel debug filesystem, implies CAP_SYS_ADMIN and enables kernel memory inspection", severity: critical, category: security }
9295
9396 # Blocked domains (exfiltration staging / tunneling)
9497 DOM-021 : { description: "Webhook receiver; free endpoint commonly used for data exfiltration PoCs", severity: high, category: security }
@@ -100,12 +103,19 @@ rule_metadata:
100103 DOM-027 : { description: "Beeceptor; API mock / request intercept — exfiltration staging", severity: high, category: security }
101104 DOM-028 : { description: "Burp Collaborator; OAST callback — used in exfiltration and SSRF PoCs", severity: high, category: security }
102105 DOM-029 : { description: "Interactsh; open-source OAST interaction detection — exfiltration staging", severity: high, category: security }
106+ DOM-030 : { description: "Cloudflare quick tunnels; ephemeral public URLs for local services — exfiltration and reverse shell delivery", severity: critical, category: security }
107+ DOM-031 : { description: "bin.sh; pastebin-style code execution site, payload staging and exfiltration", severity: high, category: security }
108+ DOM-032 : { description: "bashupload.com; anonymous file upload service, exfiltration endpoint with no authentication", severity: high, category: security }
103109
104110 # Blocked IPs (C2)
105111 IP-007 : { description: "Known C2 IP (Adversa AI IOC database)", severity: critical, category: security }
106112
107113 # Blocked executables
108114 BIN-029 : { description: "doas; OpenBSD sudo alternative, privilege escalation", severity: critical, category: security }
115+ BIN-030 : { description: "tmate; terminal sharing over SSH, covert remote access vector", severity: critical, category: security }
116+ BIN-031 : { description: "ngrok; tunnel creation executable, enables reverse shells and covert C2 channels", severity: critical, category: security }
117+ BIN-032 : { description: "bore; modern tunnel alternative to ngrok for exposing local ports", severity: critical, category: security }
118+ BIN-033 : { description: "cloudflared; Cloudflare tunnel client, creates persistent outbound tunnels for covert access", severity: critical, category: security }
109119
110120 # Linux deny rules — new
111121 LIN-058 : { description: "Python exec injection; python -c with exec() call — arbitrary code execution", severity: critical, category: security }
@@ -360,6 +370,7 @@ rule_metadata:
360370 # HEU-CRD-001: deferred (path-based openat)
361371 # HEU-CRD-002: deferred (env var reads require ptrace; not feasible in eBPF)
362372 HEU-CRD-003 : { description: "SSH Agent Hijack — agent accesses SSH_AUTH_SOCK or calls ssh-add with foreign keys", severity: critical, category: heuristics, subcategory: credential, platform_support: { linux: full, macos: partial } }
373+ HEU-CRD-004 : { description: "Credential File Sweep — agent opens .env, .aws/credentials, .npmrc, .pypirc, or .netrc files >5 times in 30s (multi-source credential harvesting)", severity: critical, category: heuristics, subcategory: credential, platform_support: { linux: full, macos: none } }
363374
364375# ── Blocked paths ──────────────────────────────────────────────────────────
365376# Sensitive credential stores and system files an AI agent should never touch.
@@ -400,6 +411,7 @@ blocked_paths:
400411 PATH-MAC-028 : " ~/.kube"
401412 PATH-MAC-029 : " ~/.password-store"
402413 PATH-MAC-030 : " ~/.vault"
414+ PATH-MAC-031 : " ~/Library/Application Support/Code/User/globalStorage"
403415 linux :
404416 PATH-LIN-001 : " /root/.ssh"
405417 PATH-LIN-002 : " /etc/shadow"
@@ -427,6 +439,8 @@ blocked_paths:
427439 PATH-LIN-022 : " /home/*/.password-store"
428440 PATH-LIN-023 : " /home/*/.vault"
429441 PATH-LIN-024 : " /var/run/secrets"
442+ PATH-LIN-025 : " /proc/[0-9]*/mem"
443+ PATH-LIN-026 : " /sys/kernel/debug"
430444
431445# ── Blocked domains ───────────────────────────────────────────────────────
432446# Known mining pools and C2 infrastructure. The threat feed adds more.
@@ -464,6 +478,9 @@ blocked_domains:
464478 DOM-027 : " beeceptor.com"
465479 DOM-028 : " burpcollaborator.net"
466480 DOM-029 : " interactsh.com"
481+ DOM-030 : " *.trycloudflare.com"
482+ DOM-031 : " bin.sh"
483+ DOM-032 : " bashupload.com"
467484
468485# ── Blocked IPs ───────────────────────────────────────────────────────────
469486# Known malicious IP addresses. Monitored on macOS, blocked via eBPF on Linux.
@@ -517,6 +534,11 @@ blocked_executables:
517534 BIN-028 : " mkfs"
518535 # Privilege escalation alternatives
519536 BIN-029 : " doas"
537+ # Tunneling / covert remote access
538+ BIN-030 : " tmate"
539+ BIN-031 : " ngrok"
540+ BIN-032 : " bore"
541+ BIN-033 : " cloudflared"
520542
521543malicious_hashes : {}
522544
@@ -1339,3 +1361,9 @@ heuristics:
13391361 action : " enforce"
13401362 threshold : 1
13411363 window_seconds : 0
1364+ HEU-CRD-004 :
1365+ name : " Credential File Sweep"
1366+ description : " Agent opens .env, .aws/credentials, .npmrc, .pypirc, or .netrc files >5 times in 30s (multi-source credential harvesting)."
1367+ action : " enforce"
1368+ threshold : 5
1369+ window_seconds : 30
0 commit comments