Skip to content

[New Connector] Sandfly Security #3522

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 41 commits into
base: main
Choose a base branch
from

Conversation

sandflysnapp
Copy link

Closes #3510

New connector for Sandfly Security

Sandfly Security

Sandfly is an agentless, instantly deployable, and safe Linux Endpoint Detection and Response (EDR) platform. Sandfly protects virtually any Linux system, from modern cloud deployments to decade-old devices, regardless of distribution or CPU architecture. And, we do it without loading agents on your endpoints that can cause performance and stability impacts.

Besides traditional EDR capabilities, Sandfly also tracks SSH credentials, audits for weak passwords, detects unauthorized changes with drift detection, and allows custom modules to help incident responders find emerging threats.

Sandfly connector

The connector will initiate a REST API connection to the Sandfly Server with the supplied credentials and ingest the following types of data:

  1. Results - the details from Sandfly investigations resulting in alerts, errors or passed checks
  2. Hosts - various details about each Linux host protected by Sandfly
  3. SSH Keys - various details about all SSH Keys found during Sandfly investigations

Checklists

Pre-Review Checklist

  • this PR does NOT contain credentials of any kind, such as API keys or username/passwords (double check config.yml.example)
  • this PR has a meaningful title
  • this PR links to all relevant github issues that it fixes or partially addresses
  • if there is no GH issue, please create it. Each PR should have a link to an issue
  • this PR has a thorough description
  • Covered the changes with automated tests
  • Tested the changes locally
  • Added a label for each target release version (example: v7.13.2, v7.14.0, v8.0.0)
  • For bugfixes: backport safely to all minor branches still receiving patch releases
  • Considered corresponding documentation changes
  • Contributed any configuration settings changes to the configuration reference
  • if you added or changed Rich Configurable Fields for a Native Connector, you made a corresponding PR in Kibana

Changes Requiring Extra Attention

  • Security-related changes (encryption, TLS, SSRF, etc)
  • New external service dependencies added.

Release Note

@sandflysnapp sandflysnapp requested a review from a team as a code owner July 3, 2025 17:57
Copy link

cla-checker-service bot commented Jul 3, 2025

💚 CLA has been signed

@github-actions github-actions bot added the v9.2.0 label Jul 3, 2025
@seanstory
Copy link
Member

buildkite test this

@seanstory
Copy link
Member

@sandflysnapp thanks for the contribution!
Please sign the CLA, and resolve any CI issues.

Before we invest in a thorough review, we'll be discussing whether we want to include Sandfly Security in our connector catalog, or if this is better kept as a reference PR and in a fork. We'll be in touch on the linked issue if we have questions in regards to that discussion.

Copy link
Contributor

@mattnowzari mattnowzari left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is great work, thank you for the submission! I've left some comments on things that stuck out to me from a general 'code quality' perspective.

@sandflysnapp sandflysnapp requested a review from mattnowzari July 29, 2025 19:52
@sandflysnapp
Copy link
Author

Our company CEO signed the contributor agreement and added me as an authorized contributor. Can we recheck the CLA to see if that is working now?

@seanstory
Copy link
Member

Our company CEO signed the contributor agreement and added me as an authorized contributor. Can we recheck the CLA to see if that is working now?

Sorry, I think we missed this comment.

The best way to re-trigger it would be to add an empty commit, like:

git commit -m 'commit using CLA-signed email' --allow-empty

If that doesn't work, there's probably a commit in the history that's attributed to an email that hasn't signed the CLA. You can squash all the commits into one, and force-push with that single commit signed by the right email.

@mattnowzari
Copy link
Contributor

buildkite test this

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

New Connector: Sandfly Security
4 participants