Detection Rules
Hardpoint includes 9 detection rules across 2 scanners. Each rule targets specific attack patterns in AI development environments.AI Scanner Rules (3 rules)
AI-004: Encoded Instructions
| Property | Value |
|---|---|
| Severity | Medium |
| Confidence | Medium |
AI-005: Command Injection in MCP Config
| Property | Value |
|---|---|
| Severity | Critical |
| Confidence | High |
$(...)- Command substitution- Backtick execution
&&,||,;- Command chaining${...}- Variable expansion<<EOF- Heredocseval,exec,source
AI-008: Semantic Hijacking (Rules File Backdoor)
| Property | Value |
|---|---|
| Severity | Critical |
| Confidence | High |
- 80+ obfuscation-resistant patterns
- Comment/content divergence scoring
- Unicode normalization (NFKC)
- Leet speak handling
- Homoglyph detection
Git Scanner Rules (6 rules)
GIT-001: Malicious Git Hook Pattern
| Property | Value |
|---|---|
| Severity | Critical |
| Confidence | High |
GIT-002: Credential Exfiltration in Hook
| Property | Value |
|---|---|
| Severity | Critical |
| Confidence | High |
GIT-003: Network Access in Git Hook
| Property | Value |
|---|---|
| Severity | Medium |
| Confidence | Medium |
GIT-004: Obfuscated Git Hook Content
| Property | Value |
|---|---|
| Severity | High |
| Confidence | Medium |
GIT-005: Suspicious Git Remote URL
| Property | Value |
|---|---|
| Severity | Medium |
| Confidence | Medium |
- ngrok.io tunnels
- localhost / 127.0.0.1
- 0.0.0.0
- .onion domains
GIT-006: Suspicious Credential Helper
| Property | Value |
|---|---|
| Severity | High |
| Confidence | High |
Disabling Rules
Rules can be disabled in.hardpoint.yaml: