SQL powered operating system instrumentation, monitoring, and analytics.
Go to file
Stefano Bonicatti e70de5b8a7
Fix stack overflow when parsing deeply nested configs (#6325)
Parsing a configuration file as a JSON document
which contains deeply nested elements can lead to a stack overflow
when using the recursive parser of RapidJSON.
Since the configuration isn't changed or parsed frequently,
use the slower iterative parser instead.

Copying the configuration JSON document
that contains deeply nested elements, using the CopyFrom API,
can lead to a stack overflow, due to the recursive nature
of the RapidJSON GenericValue construction.
Detect the depth/nesting level of a config document
and limit it to 32 levels.

Using an iterative parser, while it avoids stack overflows,
can cause memory exhaustion if the config size is too big.
Limit the maximum config size, stripped from its comments, to 1MiB.

Addresses https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=20779
2020-03-26 20:25:42 -04:00
.github Add some more information about formatting (#6202) 2020-01-29 10:09:06 -08:00
cmake Fix format folder exclusion and format check self test (#6201) 2020-01-27 14:21:38 -08:00
docs Update osquery-toolchain to the 1.1.0 version (#6315) 2020-03-24 16:19:32 +01:00
external CMake: Improvements to extensions support (#5970) 2019-10-31 19:17:28 +01:00
libraries Build librdkafka on Windows (#6095) 2020-03-06 15:06:55 -05:00
mode Upgrade Python tools to Python3 (#5846) 2019-10-05 10:30:10 -04:00
osquery Fix stack overflow when parsing deeply nested configs (#6325) 2020-03-26 20:25:42 -04:00
packs Update unwanted-chrome-extensions.conf queries to include all users (#6265) 2020-02-28 10:18:36 -05:00
plugins Fix parsing an invalid decorators config (#6317) 2020-03-20 08:39:08 -04:00
specs Add new macOS virtual table screenlock (#6243) 2020-03-15 21:03:16 -04:00
tests Fix chromeExtensions.test_sanity failure (#6324) 2020-03-26 20:23:12 -04:00
third-party tests: Add test for JSON exponent parsing (#5941) 2019-10-29 02:16:15 +01:00
tools Fix TLSConfigTests.test_runner_and_scheduler failing (#6308) 2020-03-26 20:22:02 -04:00
.artifactignore Add sccache to the Windows job (#6231) 2020-02-06 16:07:58 +01:00
.buckconfig Move build system to BUCK 2018-12-07 16:12:35 +00:00
.clang-format format: Remove Cpp restriction (#3521) 2017-08-02 10:32:12 -07:00
.gitignore Restore extension SDK support to osquery 4.x (#5851) 2019-10-18 18:45:20 -04:00
.gitmodules libs: Update the bzip2 remote URL (#6296) 2020-03-12 13:20:40 +01:00
.watchmanconfig watcher: Do not initialize the config in watcher (#3403) 2017-06-13 17:26:34 -07:00
azure-pipelines.yml Update osquery-toolchain to the 1.1.0 version (#6315) 2020-03-24 16:19:32 +01:00
CHANGELOG.md Fix link in changelog (#6275) 2020-02-28 12:06:08 -05:00
CMakeLists.txt Build librdkafka on Windows (#6095) 2020-03-06 15:06:55 -05:00
CODE_OF_CONDUCT.md Point CODE_OF_CONDUCT at osquery/foundation (#5721) 2019-08-27 10:25:44 -04:00
CODEOWNERS Initial codeowners (#5603) 2019-06-26 09:14:13 -04:00
CONTRIBUTING.md Add the TSC to the contributing file (#6253) 2020-02-20 14:50:22 -05:00
Doxyfile Add clang-format rules from 3.6 (#2360) 2016-08-15 01:33:17 -07:00
LICENSE Clarify licensing (#4792) 2018-08-02 19:26:40 +01:00
LICENSE-Apache-2.0 Clarify licensing (#4792) 2018-08-02 19:26:40 +01:00
LICENSE-GPL-2.0 Clarify licensing (#4792) 2018-08-02 19:26:40 +01:00
mkdocs.yml docs: Update ReadTheDocs with new build docs (#5708) 2019-08-21 21:27:00 -04:00
README.md Add link to older releases (#6283) 2020-03-03 20:35:46 -05:00
SECURITY.md release: updating changelog for 4.2.0 release (#6239) 2020-02-13 12:26:33 -08:00
SUPPORT.md Improve SUPPORT.md (#4835) 2018-08-08 12:18:57 +01:00
Vagrantfile Prune Vagrant boxes and fix AWS support (#5819) 2019-09-21 21:02:12 -04:00

osquery

osquery logo

osquery is a SQL powered operating system instrumentation, monitoring, and analytics framework.
Available for Linux, macOS, Windows, and FreeBSD.

Information and resources

What is osquery?

osquery exposes an operating system as a high-performance relational database. This allows you to write SQL-based queries to explore operating system data. With osquery, SQL tables represent abstract concepts such as running processes, loaded kernel modules, open network connections, browser plugins, hardware events or file hashes.

SQL tables are implemented via a simple plugin and extensions API. A variety of tables already exist and more are being written: https://osquery.io/schema. To best understand the expressiveness that is afforded to you by osquery, consider the following SQL queries:

List the users:

SELECT * FROM users;

Check the processes that have a deleted executable:

SELECT * FROM processes WHERE on_disk = 0;

Get the process name, port, and PID, for processes listening on all interfaces:

SELECT DISTINCT processes.name, listening_ports.port, processes.pid
  FROM listening_ports JOIN processes USING (pid)
  WHERE listening_ports.address = '0.0.0.0';

Find every macOS LaunchDaemon that launches an executable and keeps it running:

SELECT name, program || program_arguments AS executable
  FROM launchd
  WHERE (run_at_load = 1 AND keep_alive = 1)
  AND (program != '' OR program_arguments != '');

Check for ARP anomalies from the host's perspective:

SELECT address, mac, COUNT(mac) AS mac_count
  FROM arp_cache GROUP BY mac
  HAVING count(mac) > 1;

Alternatively, you could also use a SQL sub-query to accomplish the same result:

SELECT address, mac, mac_count
  FROM
    (SELECT address, mac, COUNT(mac) AS mac_count FROM arp_cache GROUP BY mac)
  WHERE mac_count > 1;

These queries can be:

  • performed on an ad-hoc basis to explore operating system state using the osqueryi shell
  • executed via a scheduler to monitor operating system state across a set of hosts
  • launched from custom applications using osquery Thrift APIs

Download & Install

To download the latest stable builds and for repository information and installation instructions visit https://osquery.io/downloads.

Build from source

Building osquery from source is encouraged! Check out our build guide. Also check out our contributing guide and join the community on Slack.

License

By contributing to osquery you agree that your contributions will be licensed as defined on the LICENSE file.

Vulnerabilities

We keep track of security announcements in our tagged version release notes on GitHub. We aggregate these into SECURITY.md too.

Facebook has a bug bounty program that includes osquery. If you find a security vulnerability in osquery, please submit it via the process outlined on that page and do not file a public issue. For more information on finding vulnerabilities in osquery, see our blog post Bug Hunting osquery.

Learn more

The osquery documentation is available online. Documentation for older releases can be found by version number, as well.

If you're interested in learning more about osquery read the launch blog post for background on the project, visit the users guide.

Development and usage discussion is happening in the osquery Slack, grab an invite here!