-
Notifications
You must be signed in to change notification settings - Fork 5
Open
Labels
Description
Bounty: Scanner rule for malicious WebSocket handlers
Reward: 200 $ISNAD
Track: Detection
Difficulty: Medium
Description
Create a scanner rule to detect malicious WebSocket handler patterns in packages. Some supply chain attacks use WebSocket connections for bidirectional C2 communication, which is harder to detect than simple HTTP exfiltration.
Requirements
- Detect WebSocket connections to suspicious endpoints
- Detect data exfiltration over WebSocket channels
- Detect reverse shell patterns via WebSocket
- At least 5 test cases
- Tests passing
How to Submit
Open a PR referencing this issue. See Bounty Program for full rules.
Reactions are currently unavailable