Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
87 commits
Select commit Hold shift + click to select a range
df179f0
[Rule Tuning] AWS STS GetCallerIdentity API Called for the First Time…
imays11 Aug 25, 2025
bfb29ec
[Rule Tuning] First Time Seen AWS Secret Value Accessed in Secrets Ma…
imays11 Aug 25, 2025
fbfc696
Update command_and_control_unusual_network_connection_to_suspicious_w…
Samirbous Aug 26, 2025
9c2ceb2
[Rule Tuning] Windows 3rd Party EDR Compatibility - Part 1 (#5016)
w0rk3r Aug 28, 2025
00c6e78
[Rule Tuning] Windows - Small Adjusts for Compatibility (#5032)
w0rk3r Aug 28, 2025
8ab9845
[Rule Tuning] Windows 3rd Party EDR Compatibility - Part 2 (#5017)
w0rk3r Aug 28, 2025
0fbf57c
[Rule Tuning] Windows 3rd Party EDR Compatibility - Part 3 (#5018)
w0rk3r Aug 28, 2025
85a0d27
[Rule Tuning] Windows 3rd Party EDR Compatibility - Part 4 (#5019)
w0rk3r Aug 28, 2025
b91e737
[Rule Tuning] Windows 3rd Party EDR Compatibility - Part 5 (#5020)
w0rk3r Aug 28, 2025
1af98a6
[Rule Tuning] Windows 3rd Party EDR Compatibility - Part 6 (#5021)
w0rk3r Aug 28, 2025
48dfb75
[Rule Tuning] Windows 3rd Party EDR Compatibility - Part 7 (#5022)
w0rk3r Aug 28, 2025
be18b4d
[Rule Tuning] Windows 3rd Party EDR Compatibility - Part 8 (#5023)
w0rk3r Aug 28, 2025
9c08869
[Rule Tuning] Windows 3rd Party EDR Compatibility - Part 9 (#5024)
w0rk3r Aug 28, 2025
41dd521
[Rule Tuning] Windows 3rd Party EDR Compatibility - Part 11 (#5026)
w0rk3r Aug 28, 2025
7eec833
[Rule Tuning] Windows 3rd Party EDR Compatibility - Part 12 (#5027)
w0rk3r Aug 28, 2025
86dd350
[Rule Tuning] Windows 3rd Party EDR Compatibility - Part 14 (#5029)
w0rk3r Aug 28, 2025
ccedd45
[Rule Tuning] Windows 3rd Party EDR Compatibility - Part 15 (#5030)
w0rk3r Aug 28, 2025
79daf3f
[Rule Tuning] Windows 3rd Party EDR Compatibility - Part 13 (#5028)
w0rk3r Aug 28, 2025
4cde57d
[Tuning] First Time AWS Cloudformation Stack Creation by User (#5036)
imays11 Aug 29, 2025
590cc9c
[Tuning] First Occurrence of STS GetFederationToken Request by User (…
imays11 Aug 29, 2025
4b9e388
[Rule Tuning] Multi-Factor Authentication Disabled for User (#5006)
terrancedejesus Aug 29, 2025
7e9ef00
[New Rule] Threat Intelligence Signal - Microsoft Defender for Office…
terrancedejesus Aug 29, 2025
4aebb7d
[Rule Tuning] Microsoft Entra ID Suspicious Session Reuse to Graph Ac…
terrancedejesus Aug 29, 2025
d2791bf
[New Rule] Toolshell Exploit Chain Detections (#4928)
terrancedejesus Aug 29, 2025
d9151c3
[Rule Tuning] M365 Portal Logins (Impossible & Atypical) (#5031)
terrancedejesus Aug 29, 2025
dd918b1
[Rule Tuning] Suspicious DLL Loaded for Persistence or Privilege Esca…
w0rk3r Sep 1, 2025
b2bc602
[Rule Tuning] 3rd Party EDR Compatibility - Adjust CS Windows Paths (…
w0rk3r Sep 1, 2025
e1205cb
[New/Tuning] Windows Rules to detect top threats/TTPs 24/25 (#5001)
Samirbous Sep 1, 2025
61af3e8
[New] Potential System Tampering via File Modification (#5043)
Samirbous Sep 1, 2025
93ac471
Monthly Schema Updates (#5046)
shashank-elastic Sep 1, 2025
ba354ce
[Rule Tuning] Windows 3rd Party EDR Compatibility - Part 16 (#5038)
w0rk3r Sep 1, 2025
4079436
[New] Connection to Common Large Language Model Endpoints (#5044)
Samirbous Sep 1, 2025
a62ee7a
[New] Active Directory Discovery using AdExplorer (#5047)
Samirbous Sep 1, 2025
a31b3a3
[Rule Tuning] Windows 3rd Party EDR Compatibility - Part 10 (#5025)
w0rk3r Sep 1, 2025
464fb39
[Tuning] Unusual Network Activity from a Windows System Binary (#5048)
Samirbous Sep 1, 2025
8d2ea92
[New Rules] Potential Relay Attack against a Computer Account (#4826)
w0rk3r Sep 1, 2025
f2291e0
Lock versions for releases: 8.18,8.19,9.0,9.1 (#5049)
github-actions[bot] Sep 1, 2025
ef7ff52
[Rule Tuning] Misc. Linux ES|QL Rules (#5050)
Aegrah Sep 2, 2025
0bbad3b
Update defense_evasion_modify_ownership_os_files.toml (#5051)
Samirbous Sep 2, 2025
b4db783
Tune a Tag discrepency in rule (#5053)
shashank-elastic Sep 2, 2025
3c1de72
[FR] Add support for 5 group_by fields in threshold rules (>=9.2) (#5…
Mikaayenson Sep 4, 2025
cbb892b
[Bug] Incorrect Integrations Schema Parsing for Nested Fields (#5058)
eric-forte-elastic Sep 4, 2025
9ee15a1
[Rule Tuning] Connection to Commonly Abused Web Services (#5060)
w0rk3r Sep 4, 2025
4aa6c4e
[Rule Tuning] Untrusted Driver Loaded (#5061)
w0rk3r Sep 5, 2025
6ac7105
[Rule Tuning] Remote File Download via PowerShell (#5062)
w0rk3r Sep 8, 2025
3750827
[Rule Tuning] Adjust process.code_signature.trusted condition (#5067)
w0rk3r Sep 8, 2025
0f0f16b
[Rule Tuning] D-Bus Service Created (#5076)
Aegrah Sep 9, 2025
35b000b
[FR] Add negate DOES NOT MATCH capability to IM rule type (>=9.2) (#5…
Mikaayenson Sep 9, 2025
392e025
[Rule Tuning] Beats & Endgame Indices (#5072)
Mikaayenson Sep 9, 2025
c6406e9
Tune Rules that have unsupported versions in min_stack_version (#5079)
shashank-elastic Sep 10, 2025
a6dfd2c
Add test_min_stack_version_supported testcase (#5077)
shashank-elastic Sep 10, 2025
822f649
Fix updated_date for tunings as part of #5079 (#5081)
shashank-elastic Sep 10, 2025
6adee51
Fix Ruff failures (#5083)
shashank-elastic Sep 10, 2025
25539fd
Delete Development Rules (#5084)
shashank-elastic Sep 10, 2025
f0f7d21
[FR] Refactor Schema Validation & Support Multi-Dataset Sequence Vali…
Mikaayenson Sep 10, 2025
e60c345
Bootstrap repository (#5085)
elastic-backstage-prod[bot] Sep 11, 2025
e22f60f
[Tuning] AWS IAM Create User via Assumed Role on EC2 Instance (#5063)
imays11 Sep 11, 2025
76e083c
[Rule Tunings] AWS Route Table Created / AWS EC2 Route Table Modified…
imays11 Sep 11, 2025
7ff2648
[Rule Tuning] SSM Session Started to EC2 Instance (#5068)
imays11 Sep 11, 2025
02fcd43
[Rule Tuning] Potential Okta MFA Bombing via Push Notifications (#5073)
terrancedejesus Sep 11, 2025
1f04411
[Rule Tuning] AWS EC2 Instance Connect SSH Public Key Uploaded (#5069)
imays11 Sep 11, 2025
6f725b1
[Rule Tunings] AWS DynamoDB new terms Rules (#5074)
imays11 Sep 11, 2025
fcc82fa
[Tuning] AWS S3 Unauthenticated Bucket Access by Rare Source (#5075)
imays11 Sep 11, 2025
88d9811
[Rule Tunings] AWS SNS new Terms rules (#5082)
imays11 Sep 11, 2025
90ee151
[Tuning] AWS Access Token Used from Multiple Addresses (#5055)
imays11 Sep 11, 2025
b5d7795
[Rule Tuning] Remote Execution via File Shares (#5066)
w0rk3r Sep 11, 2025
aa97487
[Rule Tuning] PowerShell Rules (#5056)
w0rk3r Sep 11, 2025
1dedea7
[Rule Tuning] Component Object Model Hijacking (#5065)
w0rk3r Sep 12, 2025
39b6f19
Pin dependencies (#5086)
elastic-renovate-prod[bot] Sep 12, 2025
7910f46
[Rule Tuning] Windows High Severity - 1 (#5092)
w0rk3r Sep 15, 2025
567b82c
[Rule Tuning] Windows High Severity - 2 (#5093)
w0rk3r Sep 15, 2025
d69ede2
[Rule Tuning] Windows High Severity - 3 (#5094)
w0rk3r Sep 15, 2025
8d9822e
[Rule Tuning] Fix process.pe.original_file_name Conditions (#5101)
w0rk3r Sep 15, 2025
76c73f8
[Rule Tuning] Windows High Severity - 4 (#5095)
w0rk3r Sep 15, 2025
7bd9c52
[Rule Tuning] Windows High Severity - 5 (#5096)
w0rk3r Sep 15, 2025
4476ac5
[Rule Tuning] High-Severity Noisy Rules Conversion to new_terms (#5091)
w0rk3r Sep 15, 2025
b2b9d67
[Bug] Github Gist API Now Requires Auth (#5119)
eric-forte-elastic Sep 16, 2025
99ebad5
Added handling for unauth error (#5115)
eric-forte-elastic Sep 16, 2025
657b504
Update investigation guides (#5112)
shashank-elastic Sep 16, 2025
8f79d58
Lock versions for releases: 8.18,8.19,9.0,9.1 (#5123)
github-actions[bot] Sep 16, 2025
80c01cf
[Bug] Annotated Fields Ignored (#5125)
eric-forte-elastic Sep 17, 2025
db688e4
[New] Microsoft Entra ID Protection Alert and Device Registration (#4…
Samirbous Sep 18, 2025
e147188
Add SIEM package category (#5128)
shashank-elastic Sep 18, 2025
53b4e92
[New Rule] Curl or Wget Spawned via Node.js (#5132)
Aegrah Sep 22, 2025
cd6c37e
[Rule Tuning] Mark some field optional for 3rd party compatibility (#…
w0rk3r Sep 22, 2025
f75062a
[Rule Tuning] Suspicious PowerShell Engine ImageLoad (#5134)
w0rk3r Sep 22, 2025
bb08af5
[Rule Tuning] Microsoft Entra ID Elevated Access to User Access Admin…
terrancedejesus Sep 22, 2025
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
The table of contents is too big for display.
Diff view
Diff view
  •  
  •  
  •  
9 changes: 6 additions & 3 deletions .github/CODEOWNERS
Original file line number Diff line number Diff line change
@@ -1,16 +1,19 @@
# detection-rules code owners
# POC: Elastic Security Intelligence and Analytics Team

## POC: Elastic Threat Research & Detection Engineering

tests/**/*.py @mikaayenson @eric-forte-elastic @traut
detection_rules/ @mikaayenson @eric-forte-elastic @traut
tests/ @mikaayenson @eric-forte-elastic @traut
lib/ @mikaayenson @eric-forte-elastic @traut
hunting/**/*.py @mikaayenson @eric-forte-elastic @traut

# skip rta-mapping to avoid the spam
## skip rta-mapping to avoid the spam

detection_rules/etc/packages.yaml @mikaayenson @eric-forte-elastic @traut
detection_rules/etc/*.json @mikaayenson @eric-forte-elastic @traut
detection_rules/etc/*/* @mikaayenson @eric-forte-elastic @traut

# exclude files from code owners
## exclude files from code owners

detection_rules/etc/non-ecs-schema.json
6 changes: 3 additions & 3 deletions .github/workflows/add-guidelines.yml
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ jobs:
runs-on: ubuntu-latest
steps:
- name: Check out the repository
uses: actions/checkout@v4
uses: actions/checkout@08eba0b27e820071cde6df949e0beb9ba4906955 # v4

- name: Set environment variable for early exit control
id: check_label
Expand Down Expand Up @@ -47,14 +47,14 @@ jobs:

- name: Fail if no relevant labels are found
if: env.GUIDELINES_FILE == ''
uses: actions/github-script@v7
uses: actions/github-script@f28e40c7f34bde8b3046d885e986cb6290c5673b # v7
with:
script: |
core.setFailed('No appropriate GitHub label found in the PR. Failing the job.')

- name: Add Guidelines Comment
if: env.CONTINUE_JOB == 'true' && (github.event.action == 'opened' || github.event.action == 'labeled')
uses: mshick/add-pr-comment@v2
uses: mshick/add-pr-comment@b8f338c590a895d50bcbfa6c5859251edc8952fc # v2
with:
message-path: ${{ env.GUIDELINES_FILE }}
repo-token: ${{ secrets.GITHUB_TOKEN }}
Expand Down
10 changes: 5 additions & 5 deletions .github/workflows/backport.yml
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ jobs:
github.event.pull_request.state == 'open' && !github.event.pull_request.draft
steps:
- name: 'Apply default "backport: auto" label'
uses: actions/github-script@v4
uses: actions/github-script@10b53a9ec6c222bb4ce97aa6bd2b5f739696b536 # v4
if: |
!contains(github.event.pull_request.labels.*.name, 'backport: auto') &&
!contains(github.event.pull_request.labels.*.name, 'backport: skip')
Expand All @@ -34,7 +34,7 @@ jobs:
labels: ['backport: auto']
})
- name: 'Remove "backport: auto" if "backport: skip" is set'
uses: actions/github-script@v4
uses: actions/github-script@10b53a9ec6c222bb4ce97aa6bd2b5f739696b536 # v4
if: |
contains(github.event.pull_request.labels.*.name, 'backport: auto') &&
contains(github.event.pull_request.labels.*.name, 'backport: skip')
Expand Down Expand Up @@ -65,7 +65,7 @@ jobs:

steps:
- name: Checkout repo
uses: actions/checkout@v4
uses: actions/checkout@08eba0b27e820071cde6df949e0beb9ba4906955 # v4
with:
token: ${{ secrets.WRITE_TRADEBOT_DETECTION_RULES_TOKEN }}
ref: main
Expand All @@ -91,7 +91,7 @@ jobs:
git reset --soft HEAD^

- name: Setup Python 3.12
uses: actions/setup-python@v5
uses: actions/setup-python@a26af69be951a213d495a4c3e4e4022e16d87065 # v5
with:
python-version: '3.12'

Expand Down Expand Up @@ -159,7 +159,7 @@ jobs:
git push

- name: "Notify slack on failure"
uses: craftech-io/slack-action@v1
uses: craftech-io/slack-action@fb1d4e50375d7758efb90fa0564734bae931f84f # v1
with:
slack_webhook_url: ${{ secrets.EXTERNAL_SLACK_DETECTION_RULES_URL }}
status: failure
Expand Down
4 changes: 2 additions & 2 deletions .github/workflows/branch-status-checks.yml
Original file line number Diff line number Diff line change
Expand Up @@ -18,14 +18,14 @@ jobs:
steps:
- name: Get Backport Status
id: get_backport_status
uses: fjogeleit/http-request-action@v1
uses: fjogeleit/http-request-action@bf78da14118941f7e940279dd58f67e863cbeff6 # v1
with:
url: "https://api.github.com/repos/elastic/detection-rules/actions/workflows/pythonpackage.yml/runs?per_page=1&branch=${{matrix.target_branch}}"
method: 'GET'
bearerToken: ${{ secrets.READ_ELASTIC_DETECTION_RULES_ORG_TOKEN }}

- name: Check Backport Status
uses: actions/github-script@v6
uses: actions/github-script@d7906e4ad0b1822421a7e6a35d5ca353c962f410 # v6
with:
script: |
const workflow_status = ${{ toJSON(fromJSON(steps.get_backport_status.outputs.response).workflow_runs[0].status) }}
Expand Down
4 changes: 2 additions & 2 deletions .github/workflows/code-checks.yml
Original file line number Diff line number Diff line change
Expand Up @@ -17,12 +17,12 @@ jobs:
runs-on: ubuntu-latest

steps:
- uses: actions/checkout@v4
- uses: actions/checkout@08eba0b27e820071cde6df949e0beb9ba4906955 # v4
with:
fetch-depth: 1

- name: Set up Python 3.13
uses: actions/setup-python@v5
uses: actions/setup-python@a26af69be951a213d495a4c3e4e4022e16d87065 # v5
with:
python-version: '3.13'

Expand Down
4 changes: 2 additions & 2 deletions .github/workflows/community.yml
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@ jobs:
runs-on: ubuntu-latest
steps:
- name: Check if member of elastic org
uses: actions/github-script@v6
uses: actions/github-script@d7906e4ad0b1822421a7e6a35d5ca353c962f410 # v6
id: membership
with:
github-token: ${{ secrets.READ_ELASTIC_DETECTION_RULES_ORG_TOKEN }}
Expand Down Expand Up @@ -40,7 +40,7 @@ jobs:


- name: Add label for community members
uses: actions/github-script@v6
uses: actions/github-script@d7906e4ad0b1822421a7e6a35d5ca353c962f410 # v6
if: ${{ steps.membership.outputs.result == 'notMember' }}
with:
script: |
Expand Down
4 changes: 2 additions & 2 deletions .github/workflows/get-target-branches.yml
Original file line number Diff line number Diff line change
Expand Up @@ -14,10 +14,10 @@ jobs:
outputs:
matrix: ${{ steps.get-branch-list.outputs.matrix }}
steps:
- uses: actions/checkout@v4
- uses: actions/checkout@08eba0b27e820071cde6df949e0beb9ba4906955 # v4

- name: Set up Python 3.12
uses: actions/setup-python@v5
uses: actions/setup-python@a26af69be951a213d495a4c3e4e4022e16d87065 # v5
with:
python-version: '3.12'

Expand Down
2 changes: 1 addition & 1 deletion .github/workflows/kibana-mitre-update.yml
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ jobs:
KIBANA_ISSUE_NUMBER: 166152 # Define the Kibana issue number as a variable
steps:
- name: Checkout code
uses: actions/checkout@v4
uses: actions/checkout@08eba0b27e820071cde6df949e0beb9ba4906955 # v4

- name: Get MITRE Attack changed files
id: changed-attack-files
Expand Down
10 changes: 5 additions & 5 deletions .github/workflows/lock-versions.yml
Original file line number Diff line number Diff line change
Expand Up @@ -14,20 +14,20 @@ jobs:

steps:
- name: Validate the source branch
uses: actions/github-script@v3
uses: actions/github-script@ffc2c79a5b2490bd33e0a41c1de74b877714d736 # v3
with:
script: |
if ('refs/heads/main' !== '${{github.event.ref}}') {
core.setFailed('Forbidden branch, expected "main"')
}

- name: Checkout detection-rules
uses: actions/checkout@v4
uses: actions/checkout@08eba0b27e820071cde6df949e0beb9ba4906955 # v4
with:
fetch-depth: 0

- name: Set up Python 3.12
uses: actions/setup-python@v5
uses: actions/setup-python@a26af69be951a213d495a4c3e4e4022e16d87065 # v5
with:
python-version: '3.12'

Expand Down Expand Up @@ -62,7 +62,7 @@ jobs:

- name: Create Pull Request
id: cpr
uses: peter-evans/create-pull-request@v3
uses: peter-evans/create-pull-request@18f7dc018cc2cd597073088f7c7591b9d1c02672 # v3
with:
assignees: '${{github.actor}}'
delete-branch: true
Expand All @@ -78,7 +78,7 @@ jobs:
labels: "backport: auto"

- name: Archive production artifacts
uses: actions/upload-artifact@v4
uses: actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4
with:
name: release-files
path: |
Expand Down
6 changes: 3 additions & 3 deletions .github/workflows/manual-backport.yml
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,7 @@ jobs:
steps:

- name: Checkout detection-rules
uses: actions/checkout@v4
uses: actions/checkout@08eba0b27e820071cde6df949e0beb9ba4906955 # v4
with:
token: ${{ secrets.WRITE_TRADEBOT_DETECTION_RULES_TOKEN }}
fetch-depth: 0
Expand All @@ -46,7 +46,7 @@ jobs:
git reset --soft HEAD^

- name: Setup Python 3.12
uses: actions/setup-python@v5
uses: actions/setup-python@a26af69be951a213d495a4c3e4e4022e16d87065 # v5
with:
python-version: '3.12'

Expand Down Expand Up @@ -79,7 +79,7 @@ jobs:
./detection_rules/etc/commit-and-push.sh $TARGET_BRANCH $COMMIT_SHA

- name: "Notify slack on failure"
uses: craftech-io/slack-action@v1
uses: craftech-io/slack-action@fb1d4e50375d7758efb90fa0564734bae931f84f # v1
with:
slack_webhook_url: ${{ secrets.READ_DETECTION_RULES_SLACK_WEBHOOK_TOKEN }}
status: failure
Expand Down
6 changes: 3 additions & 3 deletions .github/workflows/pythonpackage.yml
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@ jobs:
runs-on: ubuntu-latest

steps:
- uses: actions/checkout@v4
- uses: actions/checkout@08eba0b27e820071cde6df949e0beb9ba4906955 # v4
with:
fetch-depth: 1

Expand All @@ -21,7 +21,7 @@ jobs:
git fetch origin main:refs/remotes/origin/main

- name: Set up Python 3.13
uses: actions/setup-python@v5
uses: actions/setup-python@a26af69be951a213d495a4c3e4e4022e16d87065 # v5
with:
python-version: '3.13'

Expand All @@ -48,7 +48,7 @@ jobs:
python -m detection_rules dev build-release $GENERATE_NAVIGATOR_FILES

- name: Archive production artifacts for branch builds
uses: actions/upload-artifact@v4
uses: actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4
if: |
github.event_name == 'push'
with:
Expand Down
6 changes: 3 additions & 3 deletions .github/workflows/release-docs.yml
Original file line number Diff line number Diff line change
Expand Up @@ -23,13 +23,13 @@ jobs:
runs-on: ubuntu-latest
steps:
- name: Checkout detection-rules
uses: actions/checkout@v4
uses: actions/checkout@08eba0b27e820071cde6df949e0beb9ba4906955 # v4
with:
path: detection-rules
fetch-depth: 0

- name: Checkout elastic/security-docs
uses: actions/checkout@v4
uses: actions/checkout@08eba0b27e820071cde6df949e0beb9ba4906955 # v4
with:
token: ${{ secrets.WRITE_SECURITY_DOCS_DETECTION_RULES_TOKEN }}
repository: "elastic/security-docs"
Expand All @@ -38,7 +38,7 @@ jobs:
ref: ${{ github.event.inputs.target_branch }}

- name: Set up Python 3.12
uses: actions/setup-python@v5
uses: actions/setup-python@a26af69be951a213d495a4c3e4e4022e16d87065 # v5
with:
python-version: '3.12'

Expand Down
12 changes: 6 additions & 6 deletions .github/workflows/release-fleet.yml
Original file line number Diff line number Diff line change
Expand Up @@ -39,14 +39,14 @@ jobs:
runs-on: ubuntu-latest
steps:
- name: Validate the source branch
uses: actions/github-script@v3
uses: actions/github-script@ffc2c79a5b2490bd33e0a41c1de74b877714d736 # v3
with:
script: |
if ('refs/heads/main' === '${{github.ref}}') {
core.setFailed('Forbidden branch')
}
- name: Checkout detection-rules
uses: actions/checkout@v4
uses: actions/checkout@08eba0b27e820071cde6df949e0beb9ba4906955 # v4
with:
path: detection-rules
fetch-depth: 0
Expand All @@ -66,15 +66,15 @@ jobs:
git checkout $COMMIT_HASH

- name: Checkout elastic/integrations
uses: actions/checkout@v4
uses: actions/checkout@08eba0b27e820071cde6df949e0beb9ba4906955 # v4
with:
token: ${{ secrets.WRITE_INTEGRATIONS_DETECTION_RULES_TOKEN }}
repository: ${{github.event.inputs.target_repo}}
path: integrations
fetch-depth: 0

- name: Set up Python 3.12
uses: actions/setup-python@v5
uses: actions/setup-python@a26af69be951a213d495a4c3e4e4022e16d87065 # v5
with:
python-version: '3.12'

Expand Down Expand Up @@ -123,7 +123,7 @@ jobs:
git config --global user.name "tradebot-elastic"

- name: Setup go
uses: actions/setup-go@v3
uses: actions/setup-go@be3c94b385c4f180051c996d336f57a34c397495 # v3
with:
go-version: '^1.20.1'
check-latest: true
Expand All @@ -149,7 +149,7 @@ jobs:
$DRAFT_ARGS

- name: Archive production artifacts
uses: actions/upload-artifact@v4
uses: actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4
with:
name: release-files
path: |
Expand Down
6 changes: 3 additions & 3 deletions .github/workflows/version-code-and-release.yml
Original file line number Diff line number Diff line change
Expand Up @@ -27,7 +27,7 @@ jobs:
runs-on: ubuntu-latest
steps:
- name: Ensure PR has Version Bump Label
uses: actions/github-script@v6
uses: actions/github-script@d7906e4ad0b1822421a7e6a35d5ca353c962f410 # v6
with:
github-token: ${{ secrets.GITHUB_TOKEN }}
script: |
Expand All @@ -44,7 +44,7 @@ jobs:
runs-on: ubuntu-latest
steps:
- name: Checkout repository
uses: actions/checkout@v4
uses: actions/checkout@08eba0b27e820071cde6df949e0beb9ba4906955 # v4
with:
fetch-depth: 0

Expand Down Expand Up @@ -75,7 +75,7 @@ jobs:
contents: write
steps:
- name: Checkout repository
uses: actions/checkout@v4
uses: actions/checkout@08eba0b27e820071cde6df949e0beb9ba4906955 # v4
with:
fetch-depth: 0

Expand Down
18 changes: 18 additions & 0 deletions catalog-info.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,18 @@
# Declare a Backstage Component that represents your application.
---
# yaml-language-server: $schema=https://json.schemastore.org/catalog-info.json
apiVersion: backstage.io/v1alpha1
kind: Component
metadata:
name: detection-rules
description: Elastic detection rules Behavioral Protection
annotations:
backstage.io/source-location: "url:https://github.com/elastic/detection-rules/"
github.com/project-slug: "elastic/detection-rules"
github.com/team-slug: "elastic/threat-research-and-detection-engineering"
buildkite.com/project-slug: "elastic/detection-rules"

spec:
type: rules
owner: group:threat-research-and-detection-engineering
lifecycle: production
Loading
Loading