RuntimeContext

Additional information about the suspicious activity.

Types

Link copied to clipboard
class Builder
Link copied to clipboard
object Companion

Properties

Link copied to clipboard

Represents the communication protocol associated with the address. For example, the address family AF_INET is used for IP version of 4 protocol.

Link copied to clipboard

Represents the type of mounted fileSystem.

Link copied to clipboard

Represents options that control the behavior of a runtime operation or action. For example, a filesystem mount operation may contain a read-only flag.

Link copied to clipboard

Specifies a particular protocol within the address family. Usually there is a single protocol in address families. For example, the address family AF_INET only has the IP protocol.

Link copied to clipboard

The value of the LD_PRELOAD environment variable.

Link copied to clipboard

The path to the new library that was loaded.

Link copied to clipboard

Specifies the Region of a process's address space such as stack and heap.

Link copied to clipboard

The timestamp at which the process modified the current process. The timestamp is in UTC date string format.

Link copied to clipboard

Information about the process that modified the current process. This is available for multiple finding types.

Link copied to clipboard

The path to the module loaded into the kernel.

Link copied to clipboard

The name of the module loaded into the kernel.

Link copied to clipboard

The SHA256 hash of the module.

Link copied to clipboard

The path on the host that is mounted by the container.

Link copied to clipboard

The path in the container that is mapped to the host directory.

Link copied to clipboard

The path in the container that modified the release agent file.

Link copied to clipboard

The path to the leveraged runc implementation.

Link copied to clipboard

The path to the script that was executed.

Link copied to clipboard

The path to the modified shell history file.

Link copied to clipboard

The path to the docket socket that was accessed.

Link copied to clipboard

Information about the process that had its memory overwritten by the current process.

Functions

Link copied to clipboard
inline fun copy(block: RuntimeContext.Builder.() -> Unit = {}): RuntimeContext
Link copied to clipboard
open operator override fun equals(other: Any?): Boolean
Link copied to clipboard
open override fun hashCode(): Int
Link copied to clipboard
open override fun toString(): String