Skip to content

Conversation

@Maijin
Copy link

@Maijin Maijin commented Jan 19, 2026

This adds rules for:

  • enumerating AWS resources (CloudFormation, CloudTrail, DirectConnect, EC2, IAM, S3, Support)
  • stealing credentials for AWS, GCP, Cloudflare
  • stealing credentials for Docker and Kubernetes

Rules are categorized into host-interaction and collection namespaces.

Copy link
Collaborator

@williballenthin williballenthin left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

really cool that you have example files for all of these!

@Maijin Maijin force-pushed the feature/cloud-targeting-rules branch 2 times, most recently from fbc79bb to ddaa300 Compare January 19, 2026 09:57
This adds rules for:

- enumerating AWS resources (CloudFormation, CloudTrail, DirectConnect, EC2, IAM, S3, Support)

- stealing credentials for AWS, GCP, Cloudflare

- stealing credentials for Docker and Kubernetes

Rules are categorized into host-interaction and collection namespaces.
@Maijin Maijin force-pushed the feature/cloud-targeting-rules branch from ddaa300 to 2cb34aa Compare January 19, 2026 09:58
@mike-hunhoff
Copy link
Collaborator

Great work @Maijin ! CI workflows are failing because the example files do not exist. If you have access to them, please open a PR at github.com/mandiant/capa-testfiles. Otherwise, we can move these rules to the nusery directory until we do, thank you!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants