agent: Do not encrypt symlinks in ransomware simulation

In order to keep Infection Monkey safe for production environments, the
ransomware payload will explicitly ignore symlinks to prevent important
files from accidentally getting encrypted.
This commit is contained in:
Mike Salvatore 2021-06-22 15:04:48 -04:00
parent 14845c659a
commit 4eaa568479
1 changed files with 5 additions and 1 deletions

View File

@ -6,6 +6,7 @@ from infection_monkey.utils.dir_utils import (
file_extension_filter,
filter_files,
get_all_regular_files_in_directory,
is_not_symlink_filter,
)
from infection_monkey.utils.environment import is_windows_os
@ -24,7 +25,10 @@ class RansomewarePayload:
self._encrypt_files(file_list)
def _find_files(self):
file_filters = [file_extension_filter(VALID_FILE_EXTENSIONS_FOR_ENCRYPTION)]
file_filters = [
file_extension_filter(VALID_FILE_EXTENSIONS_FOR_ENCRYPTION),
is_not_symlink_filter,
]
all_files = get_all_regular_files_in_directory(self.target_dir)
return filter_files(all_files, file_filters)