Compare commits

..

7 Commits

Author SHA1 Message Date
Leonardo Di Giovanna be3800132f docs(OWNERS): add `ekoops` as approver
Signed-off-by: Leonardo Di Giovanna <41296180+ekoops@users.noreply.github.com>
2025-07-23 11:14:33 +02:00
dependabot[bot] 120881647a build(deps): Bump sigstore/cosign-installer in the actions group
Bumps the actions group with 1 update: [sigstore/cosign-installer](https://github.com/sigstore/cosign-installer).


Updates `sigstore/cosign-installer` from 3.8.2 to 3.9.0
- [Release notes](https://github.com/sigstore/cosign-installer/releases)
- [Commits](https://github.com/sigstore/cosign-installer/compare/v3.8.2...v3.9.0)

---
updated-dependencies:
- dependency-name: sigstore/cosign-installer
  dependency-version: 3.9.0
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: actions
...

Signed-off-by: dependabot[bot] <support@github.com>
2025-06-18 15:33:04 +02:00
Leonardo Di Giovanna d0be92e53e ci: add additional Falco releases to be tested
Signed-off-by: Leonardo Di Giovanna <leonardodigiovanna1@gmail.com>
2025-06-17 14:37:45 +02:00
Federico Di Pierro 488e6f8f0c fix(rules): fixed `container_started` macro adapting to new container plugin.
Signed-off-by: Federico Di Pierro <nierro92@gmail.com>
2025-06-17 12:44:44 +02:00
Melissa Kilby 4d51b1813f doc(OWNERS): move incertum (Melissa Kilby) to emeritus_approvers
Signed-off-by: Melissa Kilby <melissa.kilby.oss@gmail.com>
2025-06-09 11:51:54 +02:00
dependabot[bot] b4437c492f build(deps): Bump astral-sh/setup-uv from 5.4.1 to 6.1.0
Bumps [astral-sh/setup-uv](https://github.com/astral-sh/setup-uv) from 5.4.1 to 6.1.0.
- [Release notes](https://github.com/astral-sh/setup-uv/releases)
- [Commits](0c5e2b8115...f0ec1fc3b3)

---
updated-dependencies:
- dependency-name: astral-sh/setup-uv
  dependency-version: 6.1.0
  dependency-type: direct:production
  update-type: version-update:semver-major
...

Signed-off-by: dependabot[bot] <support@github.com>
2025-05-23 19:33:48 +02:00
Dirk Marwinski cb17833316 Allow new sshd-session binary to read sensitive files
Signed-off-by: Dirk Marwinski <dirk.marwinski@sap.com>
2025-05-22 10:29:39 +02:00
7 changed files with 11 additions and 14 deletions

View File

@ -1 +1,4 @@
master
0.41.2
0.41.1
0.41.0

View File

@ -22,7 +22,7 @@ jobs:
- uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4
- name: Install uv
uses: astral-sh/setup-uv@0c5e2b8115b80b4c7c5ddf6ffdd634974642d182 # v5
uses: astral-sh/setup-uv@f0ec1fc3b38f5e7cd731bb6ce540c5af426746bb # v5
- name: Generate updated inventory
run: |

View File

@ -58,7 +58,7 @@ jobs:
# Create a signature of the rules artifact as OCI artifact
- name: Install Cosign
uses: sigstore/cosign-installer@v3.8.2
uses: sigstore/cosign-installer@v3.9.0
- name: Login with cosign
run: cosign login $OCI_REGISTRY --username ${{ github.repository_owner }} --password ${{ secrets.GITHUB_TOKEN }}

3
OWNERS
View File

@ -5,7 +5,7 @@ approvers:
- fededp
- andreagit97
- lucaguerra
- incertum
- ekoops
reviewers:
- leodido
- kaizhe
@ -13,3 +13,4 @@ reviewers:
- loresuso
emeritus_approvers:
- kaizhe
- incertum

View File

@ -296,9 +296,7 @@
- macro: container_started
condition: >
((evt.type = container or
(spawned_process and proc.vpid=1)) and
container.image.repository != incomplete)
(spawned_process and proc.vpid=1 and container)
- list: cron_binaries
items: [anacron, cron, crond, crontab]
@ -610,7 +608,6 @@
seen as more suspicious, prompting a closer inspection.
condition: >
container_started
and container
and container.privileged=true
and not falco_privileged_containers
and not user_privileged_containers
@ -640,7 +637,6 @@
raise suspicion, prompting closer scrutiny.
condition: >
container_started
and container
and excessively_capable_container
and not falco_privileged_containers
and not user_privileged_containers

View File

@ -327,9 +327,7 @@
- macro: container_started
condition: >
((evt.type = container or
(spawned_process and proc.vpid=1)) and
container.image.repository != incomplete)
(spawned_process and proc.vpid=1 and container)
# Possible scripts run by sshkit
- list: sshkit_script_binaries
@ -1265,7 +1263,6 @@
varies based on your environment.
condition: >
container_started
and container
and sensitive_mount
and not falco_sensitive_mount_containers
and not user_sensitive_mount_containers
@ -1292,7 +1289,6 @@
this can be challenging to manage.
condition: >
container_started
and container
and not allowed_containers
output: Container started and not in allowed list | evt_type=%evt.type user_uid=%user.uid user_loginuid=%user.loginuid process=%proc.name proc_exepath=%proc.exepath parent=%proc.pname command=%proc.cmdline terminal=%proc.tty
priority: WARNING

View File

@ -363,7 +363,8 @@
iptables, ps, lsb_release, check-new-relea, dumpe2fs, accounts-daemon, sshd,
vsftpd, systemd, mysql_install_d, psql, screen, debconf-show, sa-update,
pam-auth-update, pam-config, /usr/sbin/spamd, polkit-agent-he, lsattr, file, sosreport,
scxcimservera, adclient, rtvscand, cockpit-session, userhelper, ossec-syscheckd
scxcimservera, adclient, rtvscand, cockpit-session, userhelper, ossec-syscheckd,
sshd-session
]
# Add conditions to this macro (probably in a separate file,