Unauthorized activity detected
Goal
Sensitive action that should be admin-only was performed by an unauthorized actor.
This may be caused either by incomplete integration of our SDK, or by a broken authentication flow in your system.
This may allow unauthorized actors to break your trust model and perform destructive actions, access sensitive data and otherwise break assumptions you have on what a user is allowed to do.
Strategy
Compare the role
provided when tagging the user with the required_role
metadata set in activity.sensitive
user events.
If the required_role
is set to admin but no user is provided or the provided user doesn’t have role
set to admin
, a Medium
signal is generated.
The rule only match against hard-coded values, rather than directly compare the two fields. If you wish to use another (or multiple) values for either field, you can clone the rule and update it.
Do note that this rule require role
to be set if a user is provided. The lack of a role
metadata won’t trigger this signal.
Triage and response
- Investigate the user activity to validate that it was authorized.
- Investigate the route where the signal triggered to understand if the issue is caused by an authentication bug, or an incorrect integration.
- Consider blocking the malicious IPs until you can update the route.