~/.aws/credentials read by unknown process
Read does not prove the key was used
SDK tried to authenticate with bait credential
File watches tell you a path was touched. Snare tells you an agent actually tried to authenticate with what it found, via the SDK's own credential resolution path. Before any API call.
~/.aws/credentials read by unknown process
Read does not prove the key was used
SDK tried to authenticate with bait credential
File watches are broad and practical. inotify, auditd, and Falco file rules can detect reads, modifications, moves, and deletions across arbitrary paths without caring what the file contains.
You can monitor SSH keys, config files, build outputs, secrets directories, or random bespoke paths. The mechanism is generic.
These signals plug into SIEM pipelines, audit systems, compliance checks, and host visibility workflows you may already operate.
Falco in particular has strong ecosystem support, good defaults, and operational knowledge behind it. This is not experimental territory.
File read is not the same thing as credential use. An agent can read ~/.aws/credentials and exfiltrate the key without ever making an AWS call. inotify catches the read. Snare catches the use, when the SDK actually tries to authenticate. These are different moments in the attack chain.
That is valuable signal, especially for anomaly detection and compliance, but it is still an early indicator rather than proof of attempted exploitation.
The attacker can ship the value elsewhere and use it later. At that point the original file watch has done its job, but its visibility has ended.
That is where Snare trips: the fake credential or client config redirects the use attempt and gives you network context around the action.
Use file watching for read detection, compliance, and host-level anomaly signals. Use Snare for use-based detection when the credential or config actually gets exercised. That pairing gives you better coverage across the attack chain.
Best when you need broad path coverage and operational integration with host monitoring.
Best when you care about the exact moment an agent or script tries to authenticate with the bait.
Keep your file rules. Add a use-based tripwire for the credentials and configs your agents are most likely to touch.
$ curl -fsSL https://snare.sh/install | sh
[ok] installed snare
$ snare arm --webhook https://hooks.slack.com/services/...
[ok] planted 3 precision canaries (awsproc, ssh, k8s)