diff --git a/events/helper/outbound_connection.go b/events/helper/outbound_connection.go new file mode 100644 index 00000000..c2dda8eb --- /dev/null +++ b/events/helper/outbound_connection.go @@ -0,0 +1,31 @@ +// SPDX-License-Identifier: Apache-2.0 +/* +Copyright (C) 2024 The Falco Authors. +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + http://www.apache.org/licenses/LICENSE-2.0 +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package helper + +import ( + "github.com/falcosecurity/event-generator/events" + "net" +) + +var _ = events.Register(OutboundConnection) + +func OutboundConnection(h events.Helper) error { + conn, err := net.Dial("udp", "example.net:53") + if err != nil { + return err + } + defer conn.Close() + return nil +} diff --git a/events/syscall/interpreted_procs_outbound_network_activity.go b/events/syscall/interpreted_procs_outbound_network_activity.go new file mode 100644 index 00000000..7d9d3b1f --- /dev/null +++ b/events/syscall/interpreted_procs_outbound_network_activity.go @@ -0,0 +1,28 @@ +// SPDX-License-Identifier: Apache-2.0 +/* +Copyright (C) 2024 The Falco Authors. +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + http://www.apache.org/licenses/LICENSE-2.0 +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package syscall + +import ( + "github.com/falcosecurity/event-generator/events" +) + +var _ = events.Register( + InterpretedProcsOutboundNetworkActivity, + events.WithDisabled(), // this rule is not included in falco_rules.yaml (stable rules), so disable the action +) + +func InterpretedProcsOutboundNetworkActivity(h events.Helper) error { + return h.SpawnAs("lua", "helper.OutboundConnection") +}