diff --git a/rules/falco-sandbox_rules.yaml b/rules/falco-sandbox_rules.yaml index f6596c78..7979ca9a 100644 --- a/rules/falco-sandbox_rules.yaml +++ b/rules/falco-sandbox_rules.yaml @@ -25,7 +25,7 @@ # Starting with version 8, the Falco engine supports exceptions. # However the Falco rules file does not use them by default. -- required_engine_version: 0.31.0 +- required_engine_version: 0.35.0 # Currently disabled as read/write are ignored syscalls. The nearly # similar open_write/open_read check for files being opened for @@ -1713,7 +1713,7 @@ whether the syscall failed or succeeded, remove the direction filter and add the evt.arg.res_or_fd output field. condition: > evt.type=bpf and evt.dir=> - and evt.arg.cmd=5 + and evt.arg.cmd=BPF_PROG_LOAD and not bpf_profiled_procs output: BPF Program Not Profiled (bpf_cmd=%evt.arg.cmd evt_type=%evt.type user=%user.name user_uid=%user.uid user_loginuid=%user.loginuid process=%proc.name proc_exepath=%proc.exepath parent=%proc.pname command=%proc.cmdline terminal=%proc.tty %container.info) priority: NOTICE