Skip to content

Commit 3d4060a

Browse files
committed
[client] feat(SCV): review keywords process (#4266)
1 parent 8d871f4 commit 3d4060a

File tree

2 files changed

+1
-39
lines changed

2 files changed

+1
-39
lines changed

pyoaev/security_domain/builder.py

Lines changed: 1 addition & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -9,11 +9,8 @@ def _find_in_keywords(self, keywords, search):
99
# Define the domain by item
1010
def get_associated_security_domains(self, name, description):
1111
domains = []
12+
domains.append(SecurityDomains.ENDPOINT.value)
1213

13-
if self._find_in_keywords(
14-
SecurityDomainsKeyWords.ENDPOINT, name
15-
) or self._find_in_keywords(SecurityDomainsKeyWords.ENDPOINT, description):
16-
domains.append(SecurityDomains.ENDPOINT.value)
1714
if self._find_in_keywords(
1815
SecurityDomainsKeyWords.NETWORK, name
1916
) or self._find_in_keywords(SecurityDomainsKeyWords.NETWORK, description):
@@ -43,7 +40,5 @@ def get_associated_security_domains(self, name, description):
4340
) or self._find_in_keywords(SecurityDomainsKeyWords.CLOUD, description):
4441
domains.append(SecurityDomains.CLOUD.value)
4542

46-
if 0 == len(domains):
47-
domains.append(SecurityDomains.ENDPOINT.value)
4843

4944
return domains

pyoaev/security_domain/types.py

Lines changed: 0 additions & 33 deletions
Original file line numberDiff line numberDiff line change
@@ -2,39 +2,6 @@
22

33

44
class SecurityDomainsKeyWords(Enum):
5-
ENDPOINT = [
6-
"lsass",
7-
"registry",
8-
"dll injection",
9-
"kernel",
10-
"winlogon",
11-
"scheduled task",
12-
"wmi",
13-
"powershell",
14-
"process injection",
15-
"credential dumping",
16-
"rootkit",
17-
"startup folder",
18-
"bits jobs",
19-
"removable media",
20-
"hardware additions",
21-
"browser extension",
22-
"firmware",
23-
"bootkit",
24-
"master boot record",
25-
"clipboard",
26-
"screen capture",
27-
"audio capture",
28-
"video capture",
29-
"disk wipe",
30-
"ransomware",
31-
"debugger evasion",
32-
"sandbox evasion",
33-
"reflective code",
34-
"access token",
35-
"system binary proxy",
36-
"Bitsadmin Download (PowerShell)",
37-
]
385
NETWORK = [
396
"lateral movement",
407
"packet sniff",

0 commit comments

Comments
 (0)