Skip to content

M3.3: Canonicalization & Anti-Evasion

See the Truth. Attackers use Symlinks and Path Traversal (../../) to fool security tools that rely on string matching.

  • Attack: ln -s /etc/shadow ./game_save
  • Bypass: The EDR sees open("./game_save") and allows it, unaware it is actually opening /etc/shadow.

We integrated os.path.realpath into the SemanticContext engine. Sentinel now resolves the Canonical Path (the absolute physical location) before applying any policy.

Raw Syscall ArgumentCanonical ResolutionPolicy Decision
open("./game_save")/etc/shadowBLOCKED
open("../../bin/sh")/bin/shALERT (Shell)
open("/tmp/logs")/tmp/logsALLOWED

Time-of-Check-Time-of-Use (TOCTOU) is a race condition where an attacker swaps a file between the check and the execution.

  • Sentinel’s Defense: We inspect the path at the moment of the syscall, halting the CPU. The kernel cannot proceed until we verify the current resolution of the path.

Sentinel M3.3 defeats the entire class of “Path Confusion” attacks. It enforces security on the object, not the name.