-
Notifications
You must be signed in to change notification settings - Fork 34
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Command embedding #730
Comments
Embeddings modelsI tried out Salesforce/codet5-base is specifically pretrained for tasks involving code and commands, and has cross-language support. So far the performance is better. e.g. getting top 3 most similar (by cosine similarity) from the vector DB Some known malicious examplesResults for Description: Modifying a user's .zshrc file to persistently execute malicious code. Description: Establishing a reverse shell using bash history manipulation. Description: Malicious modification of hidden files to evade detection Results for Description: Sudo misuse: Installing malicious software silently. Description: Malicious shell command to download and execute a payload from an onion service using Tor. Description: Hidden process: Executing malicious payload directly in memory using bash. Results for Description: Malicious removal of files using rm command Description: Executing destructive operations by deleting sensitive directories Description: Deleting files in /Users/ using sudo without timestamp. Known benign examplesResults for Description: Deleting files recursively using rm Description: Malicious removal of files using rm command Description: Sudo misuse: Executing unauthorized command using sudo. Results for Description: Deleting files recursively using rm Description: Escalating privileges using sudo su Results for Description: Enumerate all user IDs using 'getent' command. Description: Sudo misuse: Escalating privileges by executing an arbitrary command Description: Escalating privileges using sudo -i to gain root access We would need a high similarity threshold such as 0.85 or 0.9 |
Aim: Explore a basic prototype for creating a vector database of malicious shell commands to compare LLM system commands to.
To do:
The text was updated successfully, but these errors were encountered: