Closed BiJason closed 5 years ago
Hi @BiJason ,
Dagda uses TiredofitClamav docker image which contains Clamav AV. If you use Clamav without any docker image for scanning the TheZoo project, do you get any malware detection?
If you get any malware, perhaps it would be interesting review the docker image with Clamav. Else, the problem could be in the Clamav itself.
Regards.
Hey @eliasgranderubio , thanks for the response!
I ran a ClamAV with the following steps on an infected docker image.
Steps to create infected docker image:
FROM python:2.7-alpine RUN apk add --no-cache sqlite-libs=3.28.0-r0 RUN apk update RUN apk add git RUN apk add py-pip RUN addgroup -S sasquatch RUN adduser -S sasquatch -G sasquatch RUN git clone https://github.com/ytisf/theZoo WORKDIR /theZoo RUN apk add bash RUN apk add python-dev RUN pip install wheel RUN apk add gcc musl-dev RUN apk add linux-headers RUN pip install --user pyminizip RUN yes | apk add sudo EXPOSE 5000 USER sasquatch
Steps to run ClamAV scan:
output:
Known viruses: 6218676 Engine version: 0.100.3 Scanned directories: 15041 Scanned files: 110008 Infected files: 323 Data scanned: 3004.39 MB Data read: 10153.11 MB (ratio 0.30:1) Time: 1302.386 sec (21 m 42 s)
If you run the same analysis with the next method used by Dagda, do you get the same report?
In your case, the parameters would be:
What steps are required to run that method?
If you use the docker_driver.py script as docker driver for that method, run it should be easy (the imports have been omitted):
d = DockerDriver()
output = get_malware_included_in_docker_image(d, “/var/lib/docker”)
print(output)
Yes, it's still returning an empty list with the python script.
The last chance. If you run the docker run
whithout my Python script with the same parameters as this script, do you get the empty list?
Any update about the last proposed test @BiJason ?
Yes, still no findings.
Then, could you build a docker image with ClamAV which it be capable of malware detection for your described use case?
A PR would be appreciated :-)
Closed due to inactivity.
I was trying to test the malware detection of dagda from the CLI, and it doesn't seem to pick up anything.
Steps I took:
Started dagda server
Performed proper assignment of environment variables and initiation of vulnerability database.
Built an image from a dockerfile with the line:
'RUN git clone https://www.github.com/ytisf/theZoo' The github repo is literally just full of malware binaries
Ran the dagda check for on the docker image
Results
The dagda history shows no malware binaries being scanned. Not a single one. Vulnerability scanning for CVE's seems to work fine though.
Specs