- Introduced AGENTS.md, README.md, TASKS.md, and implementation_plan.md for Vexer, detailing mission, responsibilities, key components, and operational notes. - Established similar documentation structure for Vulnerability Explorer and Zastava modules, including their respective workflows, integrations, and observability notes. - Created risk scoring profiles documentation outlining the core workflow, factor model, governance, and deliverables. - Ensured all modules adhere to the Aggregation-Only Contract and maintain determinism and provenance in outputs.
		
			
				
	
	
		
			25 lines
		
	
	
		
			1.2 KiB
		
	
	
	
		
			Markdown
		
	
	
	
	
	
			
		
		
	
	
			25 lines
		
	
	
		
			1.2 KiB
		
	
	
	
		
			Markdown
		
	
	
	
	
	
| # Entry-Point Runtime — C / C++
 | |
| 
 | |
| ## Signals to gather
 | |
| - Dynamically linked ELF (`.dynamic`) with GLIBC references (`GLIBC`, `GLIBCXX`, `libstdc++`).
 | |
| - Presence of `/lib64/ld-linux-*.so.*` loaders.
 | |
| - Absence of Go/Rust-specific markers.
 | |
| - Native supervisor binaries (`nginx`, `envoy`, custom C services).
 | |
| - Config files adjacent to the binary (`/etc/app.conf`, YAML/INI).
 | |
| 
 | |
| ## Implementation notes
 | |
| - Treat this detector as the "native fallback": confirm no higher-priority language matched.
 | |
| - Collect shared library list to attach as evidence; highlight unusual dependencies.
 | |
| - Inspect `EXPOSE` ports and config directories to aid classification.
 | |
| - Normalise busybox-style symlinks (actual binary often `/bin/busybox` with applet name).
 | |
| 
 | |
| ## Evidence & scoring
 | |
| - Boost for ELF dynamic dependencies and loader presence.
 | |
| - Add evidence for config files, service managers, or env variables.
 | |
| - Penalise extremely small binaries without metadata (may be wrappers).
 | |
| 
 | |
| ## Edge cases
 | |
| - Static C binaries may look like Go; rely on build ID absence and library fingerprints.
 | |
| - When binary is part of a supervisor stack (e.g., `s6-svscan`), delegate classification to `Supervisor`.
 | |
| - Windows native services should be handled by PE analysis (`entrypoint-runtime-overview.md`).
 |