Bounty: Scanner rule for malicious WebSocket handlers
Reward: 200 $ISNAD
Track: Detection
Difficulty: Medium
Description
Create a scanner rule to detect malicious WebSocket handler patterns in packages. Some supply chain attacks use WebSocket connections for bidirectional C2 communication, which is harder to detect than simple HTTP exfiltration.
Requirements
How to Submit
Open a PR referencing this issue. See Bounty Program for full rules.
Bounty: Scanner rule for malicious WebSocket handlers
Reward: 200 $ISNAD
Track: Detection
Difficulty: Medium
Description
Create a scanner rule to detect malicious WebSocket handler patterns in packages. Some supply chain attacks use WebSocket connections for bidirectional C2 communication, which is harder to detect than simple HTTP exfiltration.
Requirements
How to Submit
Open a PR referencing this issue. See Bounty Program for full rules.