#[non_exhaustive]pub struct RuntimeContext {Show 25 fields
pub modifying_process: Option<ProcessDetails>,
pub modified_at: Option<DateTime>,
pub script_path: Option<String>,
pub library_path: Option<String>,
pub ld_preload_value: Option<String>,
pub socket_path: Option<String>,
pub runc_binary_path: Option<String>,
pub release_agent_path: Option<String>,
pub mount_source: Option<String>,
pub mount_target: Option<String>,
pub file_system_type: Option<String>,
pub flags: Option<Vec<String>>,
pub module_name: Option<String>,
pub module_file_path: Option<String>,
pub module_sha256: Option<String>,
pub shell_history_file_path: Option<String>,
pub target_process: Option<ProcessDetails>,
pub address_family: Option<String>,
pub iana_protocol_number: Option<i32>,
pub memory_regions: Option<Vec<String>>,
pub tool_name: Option<String>,
pub tool_category: Option<String>,
pub service_name: Option<String>,
pub command_line_example: Option<String>,
pub threat_file_path: Option<String>,
}Expand description
Additional information about the suspicious activity.
Fields (Non-exhaustive)§
This struct is marked as non-exhaustive
Struct { .. } syntax; cannot be matched against without a wildcard ..; and struct update syntax will not work.modifying_process: Option<ProcessDetails>Information about the process that modified the current process. This is available for multiple finding types.
modified_at: Option<DateTime>The timestamp at which the process modified the current process. The timestamp is in UTC date string format.
script_path: Option<String>The path to the script that was executed.
library_path: Option<String>The path to the new library that was loaded.
ld_preload_value: Option<String>The value of the LD_PRELOAD environment variable.
socket_path: Option<String>The path to the docket socket that was accessed.
runc_binary_path: Option<String>The path to the leveraged runc implementation.
release_agent_path: Option<String>The path in the container that modified the release agent file.
mount_source: Option<String>The path on the host that is mounted by the container.
mount_target: Option<String>The path in the container that is mapped to the host directory.
file_system_type: Option<String>Represents the type of mounted fileSystem.
flags: Option<Vec<String>>Represents options that control the behavior of a runtime operation or action. For example, a filesystem mount operation may contain a read-only flag.
module_name: Option<String>The name of the module loaded into the kernel.
module_file_path: Option<String>The path to the module loaded into the kernel.
module_sha256: Option<String>The SHA256 hash of the module.
shell_history_file_path: Option<String>The path to the modified shell history file.
target_process: Option<ProcessDetails>Information about the process that had its memory overwritten by the current process.
address_family: Option<String>Represents the communication protocol associated with the address. For example, the address family AF_INET is used for IP version of 4 protocol.
iana_protocol_number: Option<i32>Specifies a particular protocol within the address family. Usually there is a single protocol in address families. For example, the address family AF_INET only has the IP protocol.
memory_regions: Option<Vec<String>>Specifies the Region of a process's address space such as stack and heap.
tool_name: Option<String>Name of the potentially suspicious tool.
tool_category: Option<String>Category that the tool belongs to. Some of the examples are Backdoor Tool, Pentest Tool, Network Scanner, and Network Sniffer.
service_name: Option<String>Name of the security service that has been potentially disabled.
command_line_example: Option<String>Example of the command line involved in the suspicious activity.
threat_file_path: Option<String>The suspicious file path for which the threat intelligence details were found.
Implementations§
Source§impl RuntimeContext
impl RuntimeContext
Sourcepub fn modifying_process(&self) -> Option<&ProcessDetails>
pub fn modifying_process(&self) -> Option<&ProcessDetails>
Information about the process that modified the current process. This is available for multiple finding types.
Sourcepub fn modified_at(&self) -> Option<&DateTime>
pub fn modified_at(&self) -> Option<&DateTime>
The timestamp at which the process modified the current process. The timestamp is in UTC date string format.
Sourcepub fn script_path(&self) -> Option<&str>
pub fn script_path(&self) -> Option<&str>
The path to the script that was executed.
Sourcepub fn library_path(&self) -> Option<&str>
pub fn library_path(&self) -> Option<&str>
The path to the new library that was loaded.
Sourcepub fn ld_preload_value(&self) -> Option<&str>
pub fn ld_preload_value(&self) -> Option<&str>
The value of the LD_PRELOAD environment variable.
Sourcepub fn socket_path(&self) -> Option<&str>
pub fn socket_path(&self) -> Option<&str>
The path to the docket socket that was accessed.
Sourcepub fn runc_binary_path(&self) -> Option<&str>
pub fn runc_binary_path(&self) -> Option<&str>
The path to the leveraged runc implementation.
Sourcepub fn release_agent_path(&self) -> Option<&str>
pub fn release_agent_path(&self) -> Option<&str>
The path in the container that modified the release agent file.
Sourcepub fn mount_source(&self) -> Option<&str>
pub fn mount_source(&self) -> Option<&str>
The path on the host that is mounted by the container.
Sourcepub fn mount_target(&self) -> Option<&str>
pub fn mount_target(&self) -> Option<&str>
The path in the container that is mapped to the host directory.
Sourcepub fn file_system_type(&self) -> Option<&str>
pub fn file_system_type(&self) -> Option<&str>
Represents the type of mounted fileSystem.
Sourcepub fn flags(&self) -> &[String]
pub fn flags(&self) -> &[String]
Represents options that control the behavior of a runtime operation or action. For example, a filesystem mount operation may contain a read-only flag.
If no value was sent for this field, a default will be set. If you want to determine if no value was sent, use .flags.is_none().
Sourcepub fn module_name(&self) -> Option<&str>
pub fn module_name(&self) -> Option<&str>
The name of the module loaded into the kernel.
Sourcepub fn module_file_path(&self) -> Option<&str>
pub fn module_file_path(&self) -> Option<&str>
The path to the module loaded into the kernel.
Sourcepub fn module_sha256(&self) -> Option<&str>
pub fn module_sha256(&self) -> Option<&str>
The SHA256 hash of the module.
Sourcepub fn shell_history_file_path(&self) -> Option<&str>
pub fn shell_history_file_path(&self) -> Option<&str>
The path to the modified shell history file.
Sourcepub fn target_process(&self) -> Option<&ProcessDetails>
pub fn target_process(&self) -> Option<&ProcessDetails>
Information about the process that had its memory overwritten by the current process.
Sourcepub fn address_family(&self) -> Option<&str>
pub fn address_family(&self) -> Option<&str>
Represents the communication protocol associated with the address. For example, the address family AF_INET is used for IP version of 4 protocol.
Sourcepub fn iana_protocol_number(&self) -> Option<i32>
pub fn iana_protocol_number(&self) -> Option<i32>
Specifies a particular protocol within the address family. Usually there is a single protocol in address families. For example, the address family AF_INET only has the IP protocol.
Sourcepub fn memory_regions(&self) -> &[String]
pub fn memory_regions(&self) -> &[String]
Specifies the Region of a process's address space such as stack and heap.
If no value was sent for this field, a default will be set. If you want to determine if no value was sent, use .memory_regions.is_none().
Sourcepub fn tool_category(&self) -> Option<&str>
pub fn tool_category(&self) -> Option<&str>
Category that the tool belongs to. Some of the examples are Backdoor Tool, Pentest Tool, Network Scanner, and Network Sniffer.
Sourcepub fn service_name(&self) -> Option<&str>
pub fn service_name(&self) -> Option<&str>
Name of the security service that has been potentially disabled.
Sourcepub fn command_line_example(&self) -> Option<&str>
pub fn command_line_example(&self) -> Option<&str>
Example of the command line involved in the suspicious activity.
Sourcepub fn threat_file_path(&self) -> Option<&str>
pub fn threat_file_path(&self) -> Option<&str>
The suspicious file path for which the threat intelligence details were found.
Source§impl RuntimeContext
impl RuntimeContext
Sourcepub fn builder() -> RuntimeContextBuilder
pub fn builder() -> RuntimeContextBuilder
Creates a new builder-style object to manufacture RuntimeContext.
Trait Implementations§
Source§impl Clone for RuntimeContext
impl Clone for RuntimeContext
Source§fn clone(&self) -> RuntimeContext
fn clone(&self) -> RuntimeContext
1.0.0 · Source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source. Read moreSource§impl Debug for RuntimeContext
impl Debug for RuntimeContext
Source§impl PartialEq for RuntimeContext
impl PartialEq for RuntimeContext
impl StructuralPartialEq for RuntimeContext
Auto Trait Implementations§
impl Freeze for RuntimeContext
impl RefUnwindSafe for RuntimeContext
impl Send for RuntimeContext
impl Sync for RuntimeContext
impl Unpin for RuntimeContext
impl UnwindSafe for RuntimeContext
Blanket Implementations§
Source§impl<T> BorrowMut<T> for Twhere
T: ?Sized,
impl<T> BorrowMut<T> for Twhere
T: ?Sized,
Source§fn borrow_mut(&mut self) -> &mut T
fn borrow_mut(&mut self) -> &mut T
Source§impl<T> CloneToUninit for Twhere
T: Clone,
impl<T> CloneToUninit for Twhere
T: Clone,
Source§impl<T> Instrument for T
impl<T> Instrument for T
Source§fn instrument(self, span: Span) -> Instrumented<Self>
fn instrument(self, span: Span) -> Instrumented<Self>
Source§fn in_current_span(self) -> Instrumented<Self>
fn in_current_span(self) -> Instrumented<Self>
Source§impl<T> IntoEither for T
impl<T> IntoEither for T
Source§fn into_either(self, into_left: bool) -> Either<Self, Self>
fn into_either(self, into_left: bool) -> Either<Self, Self>
self into a Left variant of Either<Self, Self>
if into_left is true.
Converts self into a Right variant of Either<Self, Self>
otherwise. Read moreSource§fn into_either_with<F>(self, into_left: F) -> Either<Self, Self>
fn into_either_with<F>(self, into_left: F) -> Either<Self, Self>
self into a Left variant of Either<Self, Self>
if into_left(&self) returns true.
Converts self into a Right variant of Either<Self, Self>
otherwise. Read moreSource§impl<T> Paint for Twhere
T: ?Sized,
impl<T> Paint for Twhere
T: ?Sized,
Source§fn fg(&self, value: Color) -> Painted<&T>
fn fg(&self, value: Color) -> Painted<&T>
Returns a styled value derived from self with the foreground set to
value.
This method should be used rarely. Instead, prefer to use color-specific
builder methods like red() and
green(), which have the same functionality but are
pithier.
§Example
Set foreground color to white using fg():
use yansi::{Paint, Color};
painted.fg(Color::White);Set foreground color to white using white().
use yansi::Paint;
painted.white();Source§fn bright_black(&self) -> Painted<&T>
fn bright_black(&self) -> Painted<&T>
Source§fn bright_red(&self) -> Painted<&T>
fn bright_red(&self) -> Painted<&T>
Source§fn bright_green(&self) -> Painted<&T>
fn bright_green(&self) -> Painted<&T>
Source§fn bright_yellow(&self) -> Painted<&T>
fn bright_yellow(&self) -> Painted<&T>
Source§fn bright_blue(&self) -> Painted<&T>
fn bright_blue(&self) -> Painted<&T>
Source§fn bright_magenta(&self) -> Painted<&T>
fn bright_magenta(&self) -> Painted<&T>
Source§fn bright_cyan(&self) -> Painted<&T>
fn bright_cyan(&self) -> Painted<&T>
Source§fn bright_white(&self) -> Painted<&T>
fn bright_white(&self) -> Painted<&T>
Source§fn bg(&self, value: Color) -> Painted<&T>
fn bg(&self, value: Color) -> Painted<&T>
Returns a styled value derived from self with the background set to
value.
This method should be used rarely. Instead, prefer to use color-specific
builder methods like on_red() and
on_green(), which have the same functionality but
are pithier.
§Example
Set background color to red using fg():
use yansi::{Paint, Color};
painted.bg(Color::Red);Set background color to red using on_red().
use yansi::Paint;
painted.on_red();Source§fn on_primary(&self) -> Painted<&T>
fn on_primary(&self) -> Painted<&T>
Source§fn on_magenta(&self) -> Painted<&T>
fn on_magenta(&self) -> Painted<&T>
Source§fn on_bright_black(&self) -> Painted<&T>
fn on_bright_black(&self) -> Painted<&T>
Source§fn on_bright_red(&self) -> Painted<&T>
fn on_bright_red(&self) -> Painted<&T>
Source§fn on_bright_green(&self) -> Painted<&T>
fn on_bright_green(&self) -> Painted<&T>
Source§fn on_bright_yellow(&self) -> Painted<&T>
fn on_bright_yellow(&self) -> Painted<&T>
Source§fn on_bright_blue(&self) -> Painted<&T>
fn on_bright_blue(&self) -> Painted<&T>
Source§fn on_bright_magenta(&self) -> Painted<&T>
fn on_bright_magenta(&self) -> Painted<&T>
Source§fn on_bright_cyan(&self) -> Painted<&T>
fn on_bright_cyan(&self) -> Painted<&T>
Source§fn on_bright_white(&self) -> Painted<&T>
fn on_bright_white(&self) -> Painted<&T>
Source§fn attr(&self, value: Attribute) -> Painted<&T>
fn attr(&self, value: Attribute) -> Painted<&T>
Enables the styling Attribute value.
This method should be used rarely. Instead, prefer to use
attribute-specific builder methods like bold() and
underline(), which have the same functionality
but are pithier.
§Example
Make text bold using attr():
use yansi::{Paint, Attribute};
painted.attr(Attribute::Bold);Make text bold using using bold().
use yansi::Paint;
painted.bold();Source§fn rapid_blink(&self) -> Painted<&T>
fn rapid_blink(&self) -> Painted<&T>
Source§fn quirk(&self, value: Quirk) -> Painted<&T>
fn quirk(&self, value: Quirk) -> Painted<&T>
Enables the yansi Quirk value.
This method should be used rarely. Instead, prefer to use quirk-specific
builder methods like mask() and
wrap(), which have the same functionality but are
pithier.
§Example
Enable wrapping using .quirk():
use yansi::{Paint, Quirk};
painted.quirk(Quirk::Wrap);Enable wrapping using wrap().
use yansi::Paint;
painted.wrap();Source§fn clear(&self) -> Painted<&T>
👎Deprecated since 1.0.1: renamed to resetting() due to conflicts with Vec::clear().
The clear() method will be removed in a future release.
fn clear(&self) -> Painted<&T>
resetting() due to conflicts with Vec::clear().
The clear() method will be removed in a future release.Source§fn whenever(&self, value: Condition) -> Painted<&T>
fn whenever(&self, value: Condition) -> Painted<&T>
Conditionally enable styling based on whether the Condition value
applies. Replaces any previous condition.
See the crate level docs for more details.
§Example
Enable styling painted only when both stdout and stderr are TTYs:
use yansi::{Paint, Condition};
painted.red().on_yellow().whenever(Condition::STDOUTERR_ARE_TTY);