Feat/community rules expansion#1
Merged
knhn1004 merged 5 commits intoopenagentlock:mainfrom May 3, 2026
Merged
Conversation
knhn1004
approved these changes
May 3, 2026
Collaborator
knhn1004
left a comment
There was a problem hiding this comment.
Reviewed end-to-end on a local daemon — installed all 22 rules, verified each fires with the expected rule_id against the documented attack shape, and ran 14 false-positive checks (terraform plan, npm install lodash, kubectl get pods, chmod 644, etc.) with no spurious denies.
- Schema validation: ✓ (CI already green; my local re-run also passes)
- RE2 compatibility: ✓ (no negative lookaheads or backreferences; all 22 regex sets compile inside the daemon)
- README coverage: ✓ (every rule has one)
- Real-world citations are spot-on — DataTalks.Club, Shai-Hulud, Replit, CVE-2025-55284, hermes-px, ShinyHunters, Claude Fraud, etc. — each links a regex shape to a documented incident.
A couple of small notes for follow-ups, not blocking:
rogue.cron-persistence: the canonical install pattern often includes acurl … | sh, which tripsrogue.destructive-bashfirst. Both rules independently work; ordering just means cron-persistence won't always be the chosenrule_id. Worth a sentence in the README.rogue.git-history-rewritematchesgit branch -D, which is legitimate for short-lived branch cleanup. Severity is "high" and default mode is monitor, so the noise floor is acceptable, but operators flipping to enforce will want to know.
LGTM. Merging with auto-merge.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Rules added
Destructive infrastructure
rogue.terraform-destroy— blockterraform destroyand auto-approved appliesrogue.cloud-resource-destroy— block force-flagged AWS / GCP / Azure deletesrogue.k8s-destructive— blockkubectl delete --all, namespace/PV/secret deletes,helm uninstallrogue.docker-prune— blockdocker system prune,volume rm,compose down -vrogue.sql-mass-mutation— blockTRUNCATE,DROP DATABASE, unboundedDELETE/UPDATE,FLUSHALLAgent persistence
rogue.cron-persistence— block crontab installs and writes to/etc/cron.*rogue.launchd-persistence— block macOS LaunchAgent / LaunchDaemon installsrogue.systemd-persistence— block systemd unit writes andsystemctl enablerogue.shell-rc-write— block writes to.bashrc/.zshrc/.profilerogue.reverse-shell— blockbash -i >& /dev/tcp/,nc -e, socat exec, scripted socket shellsData exfiltration
exfil.dns-tunnel— block long base64 / hex subdomain queries via dig / nslookup / ping (CVE-2025-55284)exfil.git-remote-add— blockgit remote add, push to literal URL,gh repo/gist createexfil.cloud-cred-read— block reads of gcloud / Azure / Docker / Terraform credential storesexfil.browser-credential-read— block reads of Chrome / Firefox / Safari / Slack / IDE session storesSupply chain
supply-chain.npm-untrusted— block npm / yarn / pnpm installs from URL / git / tarball, pluspublish/tokensupply-chain.pip-untrusted— block pip / uv / poetry / conda installs from URL / git / alt-index, plus publishsupply-chain.installer-curl-bash— block fetch-then-execute installer variants beyondcurl | shSystem integrity
rogue.permission-loosening— blockchmod 777,chmod +s, recursive systemchownrogue.security-disable— block firewall / SELinux / SIP / audit / shell-history disablesrogue.system-auth-write— block writes to/etc/sudoers,/etc/passwd,/etc/hosts,~/.ssh/authorized_keysrogue.git-history-rewrite— blockfilter-branch,reflog expire,gc --prune=now, hard-reset to remote