diff --git a/pkg/ruleengine/v1/r0010_unexpected_sensitive_file_access.go b/pkg/ruleengine/v1/r0010_unexpected_sensitive_file_access.go index 30854546..94fe3acb 100644 --- a/pkg/ruleengine/v1/r0010_unexpected_sensitive_file_access.go +++ b/pkg/ruleengine/v1/r0010_unexpected_sensitive_file_access.go @@ -133,18 +133,19 @@ func (rule *R0010UnexpectedSensitiveFileAccess) ProcessEvent(eventType utils.Eve if err != nil { return nil } + } else { + // Running without application profile, to avoid false positives check if the process name is legitimate + for _, processName := range legitimateProcessNames { + if processName == openEvent.Comm { + return nil + } + } } if !utils.IsSensitivePath(openEvent.FullPath, rule.additionalPaths) { return nil } - for _, processName := range legitimateProcessNames { - if processName == openEvent.Comm { - return nil - } - } - if objCache != nil { for _, open := range appProfileOpenList.Opens { if dynamicpathdetector.CompareDynamic(open.Path, openEvent.FullPath) {