-
Notifications
You must be signed in to change notification settings - Fork 576
[New Rule] Python Site or User Customize File Creation #4500
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
⛔️ Tests failed:
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Good consideration by Jon.
Other than that, LGTM
⛔️ Tests failed: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
⛔️ Tests failed: |
⛔️ Tests failed:
|
Due to the effort required to find/test all |
⛔️ Tests failed:
|
Summary
This rule detects the creation and modification of sitecustomize.py and usercustomize.py, which Python automatically executes on startup. Attackers can exploit these files for persistence by injecting malicious code. The rule monitors system-wide, user-specific, and virtual environment locations to catch unauthorized changes that could indicate persistence or backdooring attempts.
Telemetry
0 hits in telemetry last 90d.
