Skip to main content
The Guard agent supports 10 monitor types organized into two tiers. Built-in monitors are available on all platforms with zero dependencies. Advanced monitors require specific OS versions or external tools but provide deeper visibility. All monitors emit normalized SecurityEvent objects that feed into the DARE pipeline.

Built-in Monitors

These 4 monitors ship with @panguard-ai/core and work on macOS, Linux, and Windows out of the box.

Log Monitor

FieldDetails
Sourcecore/monitors
PlatformsLinux, macOS, Windows
Data sourcessyslog (/var/log/syslog, /var/log/auth.log), Windows Event Log, application log files
CapabilitiesReads and normalizes log entries to SecurityEvent format. Supports tailing for real-time monitoring.

Network Monitor

FieldDetails
Sourcecore/monitors
PlatformsLinux, macOS, Windows
Data sources/proc/net/tcp (Linux), netstat (cross-platform)
CapabilitiesMonitors active network connections. Detects new connections, unusual ports, traffic to known-bad IPs, and anomalous connection patterns.

Process Monitor

FieldDetails
Sourcecore/monitors
PlatformsLinux, macOS, Windows
Data sources/proc filesystem (Linux), OS APIs (macOS/Windows)
CapabilitiesScans running processes. Detects new/unusual process spawning, suspicious command lines, and privilege changes.

File Monitor

FieldDetails
Sourcecore/monitors
PlatformsLinux, macOS, Windows
Data sourcesinotify (Linux), FSEvents (macOS), ReadDirectoryChangesW (Windows)
CapabilitiesWatches critical filesystem paths for modifications. Tracks file creation, modification, deletion, and permission changes.

Advanced Monitors

These 6 monitors ship with @panguard-ai/panguard-guard and provide kernel-level or specialized visibility. All gracefully degrade when their dependencies are not installed.

Falco Monitor

FieldDetails
Sourcefalco-monitor.ts
DependencyFalco >= 0.35
Data source/var/log/falco/alerts.json
CapabilitiesReads Falco alerts for container escapes, privilege escalation, anomalous system calls, and namespace breakouts.
Event typesContainer security, syscall anomalies, privilege changes

Suricata Monitor

FieldDetails
Sourcesuricata-monitor.ts
DependencySuricata >= 7.0
Data source/var/log/suricata/eve.json (EVE JSON format)
CapabilitiesNetwork IDS with protocol-aware deep packet analysis. Detects known exploit patterns, malware communication, and policy violations.
Event typesNetwork intrusion, protocol anomalies, malware signatures

Syscall Monitor (eBPF)

FieldDetails
Sourcesyscall-monitor.ts
DependencyLinux Kernel 4.18+
Data source/proc polling for process and network activity
CapabilitiesDetects suspicious processes, privilege escalation attempts, and C2 (command-and-control) connections at the syscall level.
Event typesProcess creation, privilege changes, network syscalls

Memory Scanner

FieldDetails
Sourcememory-scanner.ts
DependencyCAP_SYS_PTRACE capability
CapabilitiesScans process memory regions for fileless malware signatures, injected code, and suspicious memory patterns. Detects threats that never touch the filesystem.
Event typesMemory injection, fileless malware, process hollowing

DPI Monitor (Deep Packet Inspection)

FieldDetails
Sourcedpi-monitor.ts
DependencyNone (userspace implementation)
CapabilitiesProtocol-level traffic analysis. Detects C2 beacons, DNS tunneling, encrypted traffic anomalies, and protocol misuse without requiring hardware acceleration.
Event typesC2 communication, DNS tunneling, protocol anomalies

Rootkit Detector

FieldDetails
Sourcerootkit-detector.ts
DependencyLinux
CapabilitiesChecks for hidden processes (comparing /proc with ps output), hidden kernel modules, modified system binaries (checksum verification), and LD_PRELOAD injections.
Event typesHidden processes, kernel module tampering, binary modification

Monitor Architecture

                    SecurityEvent
                         ^
                         |
  ┌──────────┬──────────┬──────────┬──────────┐
  |   Log    | Network  | Process  |   File   |    Built-in
  └──────────┴──────────┴──────────┴──────────┘
  ┌──────────┬──────────┬──────────┐
  |  Falco   | Suricata |  eBPF    |           Advanced
  ├──────────┼──────────┼──────────┤
  |  Memory  |   DPI    | Rootkit  |
  └──────────┴──────────┴──────────┘
All monitors feed events into the MonitorEngine, which forwards them to the GuardEngine for DARE pipeline processing.
Advanced monitors are optional. Guard operates fully with built-in monitors alone. Enable advanced monitors when you need kernel-level visibility or have the required dependencies installed.