From c2b6f3cb816c774ce310bc95bb6d99a551346375 Mon Sep 17 00:00:00 2001 From: h4l0gen Date: Fri, 15 Mar 2024 14:52:34 +0530 Subject: [PATCH] adding an event on reading environment variable from /proc files Signed-off-by: h4l0gen final Signed-off-by: h4l0gen --- .../read_environment_variable_fromm_proc.go | 36 +++++++++++++++++++ 1 file changed, 36 insertions(+) create mode 100644 events/syscall/read_environment_variable_fromm_proc.go diff --git a/events/syscall/read_environment_variable_fromm_proc.go b/events/syscall/read_environment_variable_fromm_proc.go new file mode 100644 index 00000000..45e8ab51 --- /dev/null +++ b/events/syscall/read_environment_variable_fromm_proc.go @@ -0,0 +1,36 @@ +// SPDX-License-Identifier: Apache-2.0 +/* +Copyright (C) 2024 The Falco Authors. +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + http://www.apache.org/licenses/LICENSE-2.0 +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ +package syscall + +import ( + "os/exec" + + "github.com/falcosecurity/event-generator/events" +) + +var _ = events.Register( + ReadEnvironmentVariableFromProcFiles, + events.WithDisabled(), // this rule is not included in falco_rules.yaml (stable rules), so disable the action +) + +func ReadEnvironmentVariableFromProcFiles(h events.Helper) error { + if h.InContainer() { + cmd := exec.Command("cat", "/proc/self/environ") + err := cmd.Run() + if err != nil { + return err + } + } + return nil +}