Skip to content

Scanner rule for malicious WebSocket handlers #3

@0xRapi

Description

@0xRapi

Bounty: Scanner rule for malicious WebSocket handlers

Reward: 200 $ISNAD
Track: Detection
Difficulty: Medium

Description

Create a scanner rule to detect malicious WebSocket handler patterns in packages. Some supply chain attacks use WebSocket connections for bidirectional C2 communication, which is harder to detect than simple HTTP exfiltration.

Requirements

  • Detect WebSocket connections to suspicious endpoints
  • Detect data exfiltration over WebSocket channels
  • Detect reverse shell patterns via WebSocket
  • At least 5 test cases
  • Tests passing

How to Submit

Open a PR referencing this issue. See Bounty Program for full rules.

Metadata

Metadata

Assignees

No one assigned

    Labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions