OS-level runtime auditing for unpredictable automation.
logira is an observe-only Linux CLI that records runtime exec, file, and net events via eBPF. It helps you see what actually happened during AI agent runs and other forms of automation, with per-run local storage for auditing, post-run review, search, and detection triage.
- eBPF-based runtime collection of process execution, file activity, and network activity.
- cgroup v2 run-scoped tracking, so events can be attributed to a single audited run.
- Per-run local storage in JSONL and SQLite for timeline review and fast querying.
- Built-in default detection rules, with optional custom YAML rules.
- Observe-only by design: logira records and detects, but does not enforce or block.
- Audit what an AI agent actually executed, changed, and connected to during a run (for example,
codex --yoloorclaude --dangerously-skip-permissions). - Keep a trustworthy execution trail that does not depend on the agent’s own textual narrative.
- Detect risky behavior patterns such as credential access, destructive commands, persistence changes, and suspicious network egress.
- Review and share forensic evidence after a run using structured event history and detection results.
- Add lightweight runtime auditing to local automation or CI tasks without changing workload behavior.
logira includes an opinionated, observe-only default ruleset aimed at auditing AI agent runs.
You can also append your own per-run rules YAML with logira run --rules <file>.
- Credential and secrets writes:
~/.ssh,~/.aws, kube/gcloud/docker config,.netrc,.git-credentials, registry creds. - Sensitive credential reads: SSH private keys, AWS credentials/config, kubeconfig, docker config,
.netrc,.git-credentials. - Persistence and config changes: writes under
/etc, systemd units, cron, user autostart entries, shell startup files. - Temp droppers: executable files created under
/tmp,/dev/shm,/var/tmp. - Suspicious exec patterns:
curl|sh,wget|sh, tunneling/reverse shell tools and flags, base64 decode with shell hints. - Agent safety destructive patterns:
rm -rf,git clean -fdx,find -delete,mkfs,terraform destroy, and similar commands. - Network egress: suspicious destination ports and cloud metadata endpoint access.
Option1. Install via the convenicent script:
curl -fsSL https://raw.githubusercontent.com/melonattacker/logira/main/install.sh | sudo bashOption2. Manual install from a release tarball:
tar -xzf logira_vX.Y.Z_linux-<arch>.tar.gz
cd logira_vX.Y.Z_linux-<arch>
sudo ./install-local.shAfter reinstall / upgrade:
- First install: no extra step is usually needed (
install.shrunssystemctl enable --now). - Reinstall/upgrade over an existing install: restart
logiradto ensure the new binary is running.
sudo systemctl daemon-reload
sudo systemctl restart logirad.service
sudo systemctl status logirad.service --no-pagerBuild:
Start the root daemon (required for tracing):
How to run `logirad` via systemd
To run the root daemon in the background, install the unit file from packaging/systemd/logirad.service.
# 1) Generate eBPF objects (only needed if missing)
make generate
# 2) Install the systemd unit
sudo install -D -m 0644 packaging/systemd/logirad.service /etc/systemd/system/logirad.service
# 3) Install the daemon binary (unit defaults to /usr/local/bin/logirad)
sudo install -m 0755 ./logirad /usr/local/bin/logirad
# 4) (Recommended) Point systemd at the eBPF .o files via an environment file.
# This avoids relying on the service working directory.
sudo mkdir -p /etc/logira
sudo tee /etc/logira/logirad.env >/dev/null <<'EOF'
LOGIRA_EXEC_BPF_OBJ=/absolute/path/to/collector/linux/exec/trace_bpfel.o
LOGIRA_NET_BPF_OBJ=/absolute/path/to/collector/linux/net/trace_bpfel.o
LOGIRA_FILE_BPF_OBJ=/absolute/path/to/collector/linux/filetrace/trace_bpfel.o
EOF
# 5) Enable + start
sudo systemctl daemon-reload
sudo systemctl enable --now logirad
# Follow logs
sudo journalctl -u logirad -f
# Check status
systemctl status logirad --no-pager
# Stop + disable
sudo systemctl stop logirad
sudo systemctl disable --now logiradRun an agent under audit as your normal user (events are auto-saved):
./logira run -- bash -lc 'echo hi > x.txt; curl -s https://example.com >/dev/null'
./logira run --rules ./my-rules.yaml -- bash -lc 'cat ~/.aws/credentials >/dev/null'Run Codex CLI:
./logira run -- codex --yolo "Update the README to be clearer and add examples."Run Claude Code CLI:
./logira run -- claude --dangerously-skip-permissions "Find and fix flaky tests."List runs:
View and explain the last run:
./logira view last
./logira view last --ts both
./logira view last --color always
./logira explain last
./logira explain last --show-related
./logira explain last --drill 35Query events:
./logira query last --type detection
./logira query last --type net --dest 140.82.121.4:443
./logira query last --related-to-detections --type net
./logira query last --contains curllogira run -- <command...>: run a command under audit and auto-save a new runlogira runs: list saved runslogira view [last|<run-id>]: run dashboard (use--rawfor legacy text)logira query [last|<run-id>] [filters...]: search events with type-specific table outputlogira explain [last|<run-id>]: grouped detections by default (--show-related,--drill)
Rules:
- built-in default ruleset is always active (
internal/detect/rules/default_rules.yaml) - optional per-run custom rules can be appended with
logira run --rules <yaml-file> - sample custom rules and trial commands:
examples/rules/README.md - file event retention is rule-driven by file rules;
--watchis deprecated compatibility only
Default home directory: ~/.logira (override: LOGIRA_HOME)
Each run is stored at:
~/.logira/
runs/<run-id>/
events.jsonl
index.sqlite
meta.json
run-id format: YYYYMMDD-HHMMSS-<tool>
- Linux kernel 5.8+ is required.
- systemd is required (the root daemon
logiradis expected to run under systemd for normal installs). - cgroup v2 is required (check with
logira status). - Tracing requires the root daemon
logiradto be running;logira runitself does not require sudo. - If BPF object files are missing, set
LOGIRA_EXEC_BPF_OBJ/LOGIRA_NET_BPF_OBJ/LOGIRA_FILE_BPF_OBJ.
The installer places:
- binaries:
/usr/local/bin/logira,/usr/local/bin/logirad - BPF objects:
/usr/local/lib/logira/bpf/ - systemd unit:
/etc/systemd/system/logirad.service - environment file:
/etc/logira/logirad.env(setsLOGIRA_EXEC_BPF_OBJ,LOGIRA_NET_BPF_OBJ,LOGIRA_FILE_BPF_OBJ)
Apache License 2.0. See LICENSE for details.
eBPF programs under collector/linux/ are dual-licensed: Apache-2.0 OR GPL-2.0-only.
This ensures compatibility with the Linux kernel when loading eBPF programs that require GPL-only helpers.
