{"id":11351,"date":"2026-03-19T08:00:31","date_gmt":"2026-03-19T11:00:31","guid":{"rendered":"https:\/\/blog.botcity.dev\/?p=11351"},"modified":"2026-04-01T11:35:11","modified_gmt":"2026-04-01T14:35:11","slug":"seu-edr-esta-cego-para-python-veja-o-que-ja-esta-rodando-nos-seus-endpoints","status":"publish","type":"post","link":"https:\/\/blog.botcity.dev\/pt-br\/2026\/03\/19\/seu-edr-esta-cego-para-python-veja-o-que-ja-esta-rodando-nos-seus-endpoints\/","title":{"rendered":"Seu EDR est\u00e1 cego para Python: veja o que j\u00e1 est\u00e1 rodando nos seus endpoints"},"content":{"rendered":"<p data-start=\"239\" data-end=\"705\">A prolifera\u00e7\u00e3o da <strong data-start=\"257\" data-end=\"282\">IA Generativa (GenAI)<\/strong> e dos <strong data-start=\"289\" data-end=\"328\">Grandes Modelos de Linguagem (LLMs)<\/strong> inaugurou uma nova era de inova\u00e7\u00e3o, mas, ao mesmo tempo, criou um desafio de seguran\u00e7a formid\u00e1vel e muitas vezes invis\u00edvel: a <strong data-start=\"455\" data-end=\"468\">Shadow AI<\/strong>.<\/p>\n<p data-start=\"239\" data-end=\"705\">Esse fen\u00f4meno est\u00e1 transformando rapidamente o cen\u00e1rio tecnol\u00f3gico corporativo, posicionando o <strong data-start=\"565\" data-end=\"575\">Python<\/strong> (a \u201c<strong data-start=\"580\" data-end=\"603\">l\u00edngua franca da IA<\/strong>\u201d) como a nova <strong data-start=\"618\" data-end=\"642\">superf\u00edcie de ataque<\/strong> e o equivalente moderno das problem\u00e1ticas <strong data-start=\"685\" data-end=\"704\">macros de Excel<\/strong>.<\/p>\n<h2 data-section-id=\"1yj9qub\" data-start=\"707\" data-end=\"782\">Por que os controles tradicionais n\u00e3o s\u00e3o suficientes contra a Shadow AI<\/h2>\n<p data-start=\"784\" data-end=\"1151\">As solu\u00e7\u00f5es tradicionais de <strong data-start=\"812\" data-end=\"837\">seguran\u00e7a de endpoint<\/strong> e <strong data-start=\"840\" data-end=\"854\">governan\u00e7a<\/strong> n\u00e3o foram projetadas para a realidade atual. A velocidade e a facilidade com que usu\u00e1rios de neg\u00f3cio agora conseguem gerar e implantar <strong data-start=\"990\" data-end=\"1011\">scripts em Python<\/strong> \u2014 muitas vezes para fins \u00fateis e inovadores \u2014 fazem com que os controles estabelecidos sejam, na pr\u00e1tica, <strong data-start=\"1118\" data-end=\"1150\">fundamentalmente inadequados<\/strong>.<\/p>\n<p data-start=\"1153\" data-end=\"1186\">Os dados s\u00e3o claros e alarmantes:<\/p>\n<ul data-start=\"1188\" data-end=\"1627\">\n<li data-section-id=\"1l4xozb\" data-start=\"1188\" data-end=\"1393\">\n<p data-start=\"1190\" data-end=\"1393\"><strong data-start=\"1190\" data-end=\"1214\">20% das organiza\u00e7\u00f5es<\/strong> j\u00e1 sofreram viola\u00e7\u00e3o por meio de <strong data-start=\"1248\" data-end=\"1261\">Shadow AI<\/strong>, enquanto <strong data-start=\"1272\" data-end=\"1279\">63%<\/strong> ainda n\u00e3o t\u00eam uma <strong data-start=\"1298\" data-end=\"1337\">pol\u00edtica formal de governan\u00e7a de IA<\/strong> (<em data-start=\"1339\" data-end=\"1391\">IBM Cost of a Data Breach Report, dezembro de 2025<\/em>).<\/p>\n<\/li>\n<li data-section-id=\"1t40iei\" data-start=\"1394\" data-end=\"1513\">\n<p data-start=\"1396\" data-end=\"1513\">A <strong data-start=\"1398\" data-end=\"1409\">Gartner<\/strong> projeta que <strong data-start=\"1422\" data-end=\"1446\">40% das organiza\u00e7\u00f5es<\/strong> enfrentar\u00e3o uma viola\u00e7\u00e3o relacionada \u00e0 <strong data-start=\"1486\" data-end=\"1499\">Shadow AI<\/strong> at\u00e9 <strong data-start=\"1504\" data-end=\"1512\">2030<\/strong>.<\/p>\n<\/li>\n<li data-section-id=\"lcyqcf\" data-start=\"1514\" data-end=\"1627\">\n<p data-start=\"1516\" data-end=\"1627\"><strong data-start=\"1516\" data-end=\"1540\">69% das organiza\u00e7\u00f5es<\/strong> j\u00e1 suspeitam que seus colaboradores estejam usando ferramentas de <strong data-start=\"1607\" data-end=\"1626\">GenAI proibidas<\/strong>.<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"1629\" data-end=\"2092\">O problema central \u00e9 que os funcion\u00e1rios, impulsionados por ferramentas como <strong data-start=\"1706\" data-end=\"1714\">GPTs<\/strong> e <strong data-start=\"1717\" data-end=\"1736\">copilotos de IA<\/strong>, est\u00e3o automatizando processos e criando pequenas aplica\u00e7\u00f5es \u2014 frequentemente em <strong data-start=\"1818\" data-end=\"1828\">Python<\/strong> \u2014 que lidam diretamente com <strong data-start=\"1857\" data-end=\"1887\">dados sens\u00edveis da empresa<\/strong>.<\/p>\n<p data-start=\"1629\" data-end=\"2092\">Para algu\u00e9m que nunca programou antes, basta pedir a um <strong data-start=\"1945\" data-end=\"1952\">LLM<\/strong> para \u201c<strong data-start=\"1959\" data-end=\"1994\">rastrear um pacote dos Correios<\/strong>\u201d ou \u201c<strong data-start=\"2000\" data-end=\"2033\">extrair dados de uma planilha<\/strong>\u201d para obter imediatamente um <strong data-start=\"2063\" data-end=\"2091\">c\u00f3digo Python execut\u00e1vel<\/strong>.<\/p>\n<p data-start=\"2094\" data-end=\"2251\">Os riscos deixaram de ser te\u00f3ricos; eles j\u00e1 est\u00e3o aparecendo em todos os setores regulados, criando s\u00e9rios <strong data-start=\"2201\" data-end=\"2224\">riscos de seguran\u00e7a<\/strong> e <strong data-start=\"2227\" data-end=\"2250\">riscos operacionais<\/strong>:<\/p>\n<table>\n<tbody>\n<tr>\n<td>Setor<\/td>\n<td>Cen\u00e1rio<\/td>\n<td>Perfil de risco<\/td>\n<\/tr>\n<tr>\n<td><strong>Servi\u00e7os Financeiros<\/strong><\/p>\n<p data-start=\"2340\" data-end=\"2592\">\n<\/td>\n<td>\n<p data-start=\"2340\" data-end=\"2592\">Um analista de <strong data-start=\"2370\" data-end=\"2378\">FP&amp;A<\/strong> usa <strong data-start=\"2383\" data-end=\"2405\">scripts do SAP GUI<\/strong>, agora muitas vezes com <strong data-start=\"2430\" data-end=\"2455\">Python gerado por LLM<\/strong>, para extrair <strong data-start=\"2470\" data-end=\"2510\">15.000 registros do Raz\u00e3o Geral (GL)<\/strong> todas as noites e armazen\u00e1-los em uma conta pessoal do <strong data-start=\"2566\" data-end=\"2578\">OneDrive<\/strong> para an\u00e1lise.<\/p>\n<\/td>\n<td>\n<p data-start=\"2594\" data-end=\"2757\"><strong data-start=\"2617\" data-end=\"2642\">Exfiltra\u00e7\u00e3o de dados:<\/strong> dados financeiros sens\u00edveis s\u00e3o movidos para fora do controle corporativo, indo para uma <strong data-start=\"2732\" data-end=\"2756\">nuvem n\u00e3o gerenciada<\/strong>.<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td><strong>Manufatura<\/strong><\/td>\n<td>A equipe de <strong data-start=\"2805\" data-end=\"2828\">Contas a Pagar (AP)<\/strong> automatiza o lan\u00e7amento de notas fiscais no <strong data-start=\"2873\" data-end=\"2887\">Oracle EBS<\/strong> e no <strong data-start=\"2893\" data-end=\"2900\">SAP<\/strong> usando um <strong data-start=\"2911\" data-end=\"2931\">script em Python<\/strong>. Esse script cont\u00e9m <strong data-start=\"2952\" data-end=\"2987\">credenciais do Oracle hardcoded<\/strong> e acessa <strong data-start=\"2997\" data-end=\"3032\">dados banc\u00e1rios de fornecedores<\/strong> anexados a e-mails em uma unidade compartilhada.<\/td>\n<td>\n<p data-start=\"3083\" data-end=\"3314\"><strong data-start=\"3106\" data-end=\"3154\">Exposi\u00e7\u00e3o de credenciais e risco financeiro:<\/strong> credenciais hardcoded representam um enorme <strong data-start=\"3199\" data-end=\"3223\">ponto \u00fanico de falha<\/strong>, criando risco de <strong data-start=\"3242\" data-end=\"3278\">acesso n\u00e3o autorizado ao sistema<\/strong> e potencial <strong data-start=\"3291\" data-end=\"3313\">desvio de recursos<\/strong>.<\/p>\n<h3 data-section-id=\"1a2ape\" data-start=\"3316\" data-end=\"3336\"><\/h3>\n<\/td>\n<\/tr>\n<tr>\n<td><strong>Farmac\u00eautico<\/strong><\/td>\n<td>\n<p data-start=\"3337\" data-end=\"3689\">Um gestor de dados exporta <strong data-start=\"3379\" data-end=\"3404\">2,4 milh\u00f5es de linhas<\/strong> de <strong data-start=\"3408\" data-end=\"3457\">informa\u00e7\u00f5es pessoalmente identific\u00e1veis (PII)<\/strong> de pacientes de ensaios cl\u00ednicos para um drive local para &#8220;<strong data-start=\"3517\" data-end=\"3548\">limpar e analisar no pandas<\/strong>&#8220;. Os dados permaneceram na m\u00e1quina local por <strong data-start=\"3594\" data-end=\"3610\">seis semanas<\/strong> antes de serem descobertos durante uma auditoria rotineira de seguran\u00e7a de TI.<\/p>\n<\/td>\n<td>\n<p data-start=\"3691\" data-end=\"3914\"><strong data-start=\"3714\" data-end=\"3755\">Viola\u00e7\u00e3o grave de conformidade (PII):<\/strong> um volume enorme de dados altamente sens\u00edveis foi armazenado em um <strong data-start=\"3823\" data-end=\"3855\">endpoint local n\u00e3o protegido<\/strong>, violando regulamenta\u00e7\u00f5es de <strong data-start=\"3885\" data-end=\"3913\">privacidade de pacientes<\/strong>.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<h2 data-section-id=\"rjrwj9\" data-start=\"3921\" data-end=\"4006\"><strong data-start=\"3924\" data-end=\"4006\">Os seis vetores cr\u00edticos de risco que seus controles tradicionais n\u00e3o enxergam<\/strong><\/h2>\n<p data-start=\"4008\" data-end=\"4275\">Quando <strong data-start=\"4015\" data-end=\"4056\">scripts em Python n\u00e3o supervisionados<\/strong> rodam nos endpoints, eles introduzem um conjunto de riscos aos quais ferramentas tradicionais de <strong data-start=\"4154\" data-end=\"4195\">EDR (Endpoint Detection and Response)<\/strong>, <strong data-start=\"4197\" data-end=\"4227\">DLP (Data Loss Prevention)<\/strong> e <strong data-start=\"4230\" data-end=\"4264\">MDM (Mobile Device Management)<\/strong> s\u00e3o cegas:<\/p>\n<ol>\n<li><strong data-start=\"4281\" data-end=\"4309\">Credenciais hardcoded: <\/strong>Scripts frequentemente cont\u00eam <strong data-start=\"4340\" data-end=\"4395\">nomes de usu\u00e1rio, senhas ou chaves de API embutidos<\/strong>, criando vulnerabilidades de seguran\u00e7a facilmente explor\u00e1veis.<\/li>\n<li><strong data-start=\"4464\" data-end=\"4514\">Atividade an\u00f4mala fora do hor\u00e1rio comercial: <\/strong>Scripts automatizados costumam rodar em hor\u00e1rios incomuns, o que dificulta distingui-los de <strong data-start=\"4607\" data-end=\"4630\">atividade maliciosa<\/strong>.<\/li>\n<li><strong data-start=\"4637\" data-end=\"4681\">Vulnerabilidades e pacotes maliciosos: <\/strong><strong data-start=\"4682\" data-end=\"4690\">LLMs<\/strong> podem recomendar bibliotecas Python <strong data-start=\"4727\" data-end=\"4745\">desatualizadas<\/strong> ou <strong data-start=\"4749\" data-end=\"4764\">vulner\u00e1veis<\/strong>, e esses scripts podem iniciar conex\u00f5es de rede que transportam <strong data-start=\"4829\" data-end=\"4850\">cargas maliciosas<\/strong>.<\/li>\n<li><strong data-start=\"4857\" data-end=\"4891\">Consultas a bancos de dados: <\/strong>Scripts podem estabelecer conex\u00f5es diretas com <strong data-start=\"4939\" data-end=\"4971\">bancos de dados corporativos<\/strong>, contornando controles de seguran\u00e7a implementados na camada da aplica\u00e7\u00e3o.<\/li>\n<li><strong data-start=\"5051\" data-end=\"5104\">Leitura, manipula\u00e7\u00e3o e exfiltra\u00e7\u00e3o de arquivos: <\/strong>Scripts s\u00e3o projetados para <strong data-start=\"5133\" data-end=\"5152\">processar dados<\/strong>. Isso inclui ler arquivos sens\u00edveis e <strong data-start=\"5191\" data-end=\"5207\">exfiltr\u00e1-los<\/strong> para fora do ambiente corporativo, como para <strong data-start=\"5253\" data-end=\"5287\">armazenamento pessoal em nuvem<\/strong> ou por meio de <strong data-start=\"5303\" data-end=\"5320\">APIs externas<\/strong>.<\/li>\n<li><strong style=\"font-size: 19px;\" data-start=\"5327\" data-end=\"5370\">Perda de scripts e risco operacional: <\/strong>Se o funcion\u00e1rio que criou o script sai da empresa, automa\u00e7\u00f5es valiosas e funcionais \u2014 os &#8220;<strong style=\"font-size: 19px;\" data-start=\"5462\" data-end=\"5478\">bons scripts<\/strong><span style=\"font-size: 19px;\">&#8221; \u2014 podem ser perdidas, levando a <\/span><strong style=\"font-size: 19px;\" data-start=\"5512\" data-end=\"5544\">falhas operacionais cr\u00edticas<\/strong><span style=\"font-size: 19px;\">.<\/span><\/li>\n<\/ol>\n<p data-start=\"5547\" data-end=\"5709\">A pergunta definitiva para o board \u00e9:<br data-start=\"5584\" data-end=\"5587\" \/><strong data-start=\"5587\" data-end=\"5709\">\u201cQuantos scripts em Python est\u00e3o processando dados de clientes em endpoints neste exato momento, e quem aprovou isso?\u201d<\/strong><\/p>\n<p data-start=\"5711\" data-end=\"6031\">Enquanto o <strong data-start=\"5722\" data-end=\"5729\">EDR<\/strong> monitora o comportamento de processos, o <strong data-start=\"5771\" data-end=\"5778\">DLP<\/strong> protege documentos e o <strong data-start=\"5802\" data-end=\"5809\">MDM<\/strong> gerencia dispositivos, todos eles se concentram em <strong data-start=\"5861\" data-end=\"5886\">aplica\u00e7\u00f5es conhecidas<\/strong> e em <strong data-start=\"5892\" data-end=\"5940\">fluxos de dados gerenciados corporativamente<\/strong>. Eles n\u00e3o conseguem lidar com as caracter\u00edsticas centrais do caso de uso de <strong data-start=\"6017\" data-end=\"6030\">Shadow AI<\/strong>:<\/p>\n<ul data-start=\"6033\" data-end=\"6281\">\n<li data-section-id=\"keb5i4\" data-start=\"6033\" data-end=\"6137\">\n<p data-start=\"6035\" data-end=\"6137\">Usu\u00e1rios de neg\u00f3cio est\u00e3o <strong data-start=\"6061\" data-end=\"6107\">criando suas pr\u00f3prias aplica\u00e7\u00f5es (scripts)<\/strong> em suas esta\u00e7\u00f5es de trabalho.<\/p>\n<\/li>\n<li data-section-id=\"15a2xwx\" data-start=\"6138\" data-end=\"6214\">\n<p data-start=\"6140\" data-end=\"6214\">Eles est\u00e3o <strong data-start=\"6151\" data-end=\"6183\">manipulando dados da empresa<\/strong> aos quais t\u00eam acesso leg\u00edtimo.<\/p>\n<\/li>\n<li data-section-id=\"1jfy592\" data-start=\"6215\" data-end=\"6281\">\n<p data-start=\"6217\" data-end=\"6281\">Eles est\u00e3o criando <strong data-start=\"6236\" data-end=\"6250\">automa\u00e7\u00f5es<\/strong> que afetam outros aplicativos.<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"6283\" data-end=\"6469\">A inten\u00e7\u00e3o geralmente \u00e9 boa: os funcion\u00e1rios est\u00e3o <strong data-start=\"6334\" data-end=\"6346\">inovando<\/strong> e <strong data-start=\"6349\" data-end=\"6366\">gerando valor<\/strong>. No entanto, ao mesmo tempo, est\u00e3o introduzindo riscos significativos de <strong data-start=\"6440\" data-end=\"6453\">seguran\u00e7a<\/strong> e <strong data-start=\"6456\" data-end=\"6468\">opera\u00e7\u00e3o<\/strong>.<\/p>\n<p data-start=\"6471\" data-end=\"6624\">Tentar for\u00e7ar usu\u00e1rios de neg\u00f3cio a entrarem em um pipeline tradicional de desenvolvimento seguro de software, como o <strong data-start=\"6589\" data-end=\"6599\">GitHub<\/strong>, traz v\u00e1rios obst\u00e1culos:<\/p>\n<ul data-start=\"6626\" data-end=\"7160\">\n<li data-section-id=\"1cdi0yt\" data-start=\"6626\" data-end=\"6734\">\n<p data-start=\"6628\" data-end=\"6734\"><strong data-start=\"6628\" data-end=\"6653\">Conhecimento t\u00e9cnico:<\/strong> exige uma profici\u00eancia t\u00e9cnica que a maioria dos usu\u00e1rios de neg\u00f3cio n\u00e3o possui.<\/p>\n<\/li>\n<li data-section-id=\"1tch2a5\" data-start=\"6735\" data-end=\"7025\">\n<p data-start=\"6737\" data-end=\"7025\"><strong data-start=\"6737\" data-end=\"6756\">An\u00e1lise tardia:<\/strong> um pipeline seguro s\u00f3 analisa o c\u00f3digo <strong data-start=\"6796\" data-end=\"6806\">depois<\/strong> que ele \u00e9 submetido. O risco mais significativo acontece durante o <strong data-start=\"6874\" data-end=\"6893\">desenvolvimento<\/strong>, quando o usu\u00e1rio de neg\u00f3cio est\u00e1 &#8220;<strong data-start=\"6929\" data-end=\"6942\">brincando<\/strong>&#8221; localmente com o c\u00f3digo gerado por IA, e cada execu\u00e7\u00e3o pode representar um risco.<\/p>\n<\/li>\n<li data-section-id=\"1yym0jd\" data-start=\"7026\" data-end=\"7160\">\n<p data-start=\"7028\" data-end=\"7160\"><strong data-start=\"7028\" data-end=\"7047\">Escalabilidade:<\/strong> exigir um <strong data-start=\"7058\" data-end=\"7087\">ambiente virtual dedicado<\/strong> para cada funcion\u00e1rio \u00e9 um desafio monumental de TI e <strong data-start=\"7142\" data-end=\"7159\">n\u00e3o escal\u00e1vel<\/strong>.<\/p>\n<\/li>\n<\/ul>\n<h2 data-section-id=\"1mx720r\" data-start=\"7167\" data-end=\"7228\"><a href=\"https:\/\/botcity.dev\/br\/sentinel\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"11020\" data-permalink=\"https:\/\/blog.botcity.dev\/pt-br\/2026\/01\/13\/python-lgpd-vazamento-dados-endpoints\/banners-blog-9\/\" data-orig-file=\"https:\/\/blog.botcity.dev\/wp-content\/uploads\/2026\/01\/Banners-Blog-9.png\" data-orig-size=\"3750,1250\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Banners Blog (9)\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.botcity.dev\/wp-content\/uploads\/2026\/01\/Banners-Blog-9-300x100.png\" data-large-file=\"https:\/\/blog.botcity.dev\/wp-content\/uploads\/2026\/01\/Banners-Blog-9-1024x341.png\" class=\"aligncenter wp-image-11020 size-large\" src=\"https:\/\/blog.botcity.dev\/wp-content\/uploads\/2026\/01\/Banners-Blog-9-1024x341.png\" alt=\"\" width=\"770\" height=\"256\" srcset=\"https:\/\/blog.botcity.dev\/wp-content\/uploads\/2026\/01\/Banners-Blog-9-1024x341.png 1024w, https:\/\/blog.botcity.dev\/wp-content\/uploads\/2026\/01\/Banners-Blog-9-300x100.png 300w, https:\/\/blog.botcity.dev\/wp-content\/uploads\/2026\/01\/Banners-Blog-9-1536x512.png 1536w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/><\/a><\/h2>\n<h2><strong data-start=\"7170\" data-end=\"7228\">Sentinel: governan\u00e7a de Python sem bloquear a inova\u00e7\u00e3o<\/strong><\/h2>\n<p data-start=\"7230\" data-end=\"7428\">A solu\u00e7\u00e3o n\u00e3o \u00e9 <strong data-start=\"7246\" data-end=\"7267\">bloquear o Python<\/strong>. Isso sufoca a inova\u00e7\u00e3o e empurra o problema ainda mais para as sombras. A chave est\u00e1 em oferecer <strong data-start=\"7366\" data-end=\"7382\">visibilidade<\/strong> e <strong data-start=\"7385\" data-end=\"7406\">controle granular<\/strong> no ponto de execu\u00e7\u00e3o.<\/p>\n<p data-start=\"7430\" data-end=\"7633\">O <a href=\"https:\/\/botcity.dev\/br\/sentinel\"><strong data-start=\"7432\" data-end=\"7452\">BotCity Sentinel<\/strong><\/a> transfere os aspectos t\u00e9cnicos da governan\u00e7a para o <strong data-start=\"7505\" data-end=\"7517\">endpoint<\/strong>, permitindo que as organiza\u00e7\u00f5es gerenciem o risco da <strong data-start=\"7571\" data-end=\"7584\">Shadow AI<\/strong> sem impedir a melhoria dos processos de neg\u00f3cio.<\/p>\n<p data-start=\"7635\" data-end=\"7773\">O <strong data-start=\"7637\" data-end=\"7649\">Sentinel<\/strong> oferece monitoramento cont\u00ednuo e em profundidade sobre toda a execu\u00e7\u00e3o de <strong data-start=\"7724\" data-end=\"7734\">Python<\/strong>, com foco em pontos de dados cr\u00edticos:<\/p>\n<ul data-start=\"7775\" data-end=\"8192\">\n<li data-section-id=\"dbcu3z\" data-start=\"7775\" data-end=\"7818\">\n<p data-start=\"7777\" data-end=\"7818\"><strong data-start=\"7777\" data-end=\"7793\">Bibliotecas:<\/strong> rastreamento de imports.<\/p>\n<\/li>\n<li data-section-id=\"hsfwhi\" data-start=\"7819\" data-end=\"7874\">\n<p data-start=\"7821\" data-end=\"7874\"><strong data-start=\"7821\" data-end=\"7836\">Uso de LLM:<\/strong> monitoramento de intera\u00e7\u00f5es com LLMs.<\/p>\n<\/li>\n<li data-section-id=\"1enipdt\" data-start=\"7875\" data-end=\"7931\">\n<p data-start=\"7877\" data-end=\"7931\"><strong data-start=\"7877\" data-end=\"7893\">Comunica\u00e7\u00e3o:<\/strong> atividade de rede de entrada e sa\u00edda.<\/p>\n<\/li>\n<li data-section-id=\"hycqjx\" data-start=\"7932\" data-end=\"8013\">\n<p data-start=\"7934\" data-end=\"8013\"><strong data-start=\"7934\" data-end=\"7953\">Acesso a dados:<\/strong> leitura\/escrita de arquivos e conex\u00f5es com bancos de dados.<\/p>\n<\/li>\n<li data-section-id=\"53303k\" data-start=\"8014\" data-end=\"8114\">\n<p data-start=\"8016\" data-end=\"8114\"><strong data-start=\"8016\" data-end=\"8044\">Intera\u00e7\u00e3o com o sistema:<\/strong> execu\u00e7\u00e3o de aplica\u00e7\u00f5es, processamento de planilhas e escrita de logs.<\/p>\n<\/li>\n<li data-section-id=\"1k7k8fx\" data-start=\"8115\" data-end=\"8192\">\n<p data-start=\"8117\" data-end=\"8192\"><strong data-start=\"8117\" data-end=\"8137\">Uso de recursos:<\/strong> rastreamento de recursos computacionais (<strong data-start=\"8179\" data-end=\"8190\">CPU\/RAM<\/strong>).<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"8194\" data-end=\"8421\">Esse conjunto abrangente de dados d\u00e1 \u00e0s equipes <strong data-start=\"8242\" data-end=\"8260\">vis\u00e3o completa<\/strong> sobre cada script Python em execu\u00e7\u00e3o, incluindo sua <strong data-start=\"8313\" data-end=\"8338\">localiza\u00e7\u00e3o (m\u00e1quina)<\/strong>, os <strong data-start=\"8343\" data-end=\"8364\">riscos associados<\/strong> e a capacidade de tomar uma <strong data-start=\"8393\" data-end=\"8420\">a\u00e7\u00e3o imediata e precisa<\/strong>.<\/p>\n<p data-start=\"8423\" data-end=\"8550\">Fundamentalmente, toda a solu\u00e7\u00e3o opera <strong data-start=\"8462\" data-end=\"8482\">100% on-premises<\/strong>, garantindo <strong data-start=\"8495\" data-end=\"8518\">soberania dos dados<\/strong> e <strong data-start=\"8521\" data-end=\"8549\">conformidade regulat\u00f3ria<\/strong>.<\/p>\n<h2 data-section-id=\"1l9qz2o\" data-start=\"8557\" data-end=\"8600\"><strong data-start=\"8560\" data-end=\"8600\">Em que ponto a sua organiza\u00e7\u00e3o est\u00e1?<\/strong><\/h2>\n<p data-start=\"8602\" data-end=\"8670\">Observamos <strong data-start=\"8613\" data-end=\"8641\">tr\u00eas respostas distintas<\/strong> ao desafio da <strong data-start=\"8656\" data-end=\"8669\">Shadow AI<\/strong>:<\/p>\n<ol>\n<li><strong data-start=\"8676\" data-end=\"8713\">Consciente e se movendo r\u00e1pido: <\/strong>Empresas nessa categoria pensam:<br data-start=\"8746\" data-end=\"8749\" \/><strong data-start=\"8749\" data-end=\"8828\">\u201cEu tenho esse problema, ele \u00e9 enorme, e eu preciso de visibilidade agora.\u201d\u00a0<\/strong>A a\u00e7\u00e3o proposta \u00e9 implementar <strong data-start=\"8860\" data-end=\"8899\">monitoramento imediato de endpoints<\/strong> e <strong data-start=\"8902\" data-end=\"8924\">avalia\u00e7\u00e3o de risco<\/strong>.<\/li>\n<li><strong data-start=\"8931\" data-end=\"8973\">Consciente e enfrentando o problema: <\/strong>Essas empresas dizem:<br data-start=\"8995\" data-end=\"8998\" \/><strong data-start=\"8998\" data-end=\"9078\">\u201cEu sei que tenho esse problema, mas n\u00e3o sei qual \u00e9 a escala nem o impacto.\u201d <\/strong>Elas planejam implantar uma <strong data-start=\"9108\" data-end=\"9129\">prova de conceito<\/strong> para mapear o parque atual de Python e <strong data-start=\"9169\" data-end=\"9192\">quantificar o risco<\/strong>.<\/li>\n<li data-section-id=\"102nb85\" data-start=\"9195\" data-end=\"9216\"><strong data-start=\"9199\" data-end=\"9216\">Em nega\u00e7\u00e3o: <\/strong>Empresas nessa categoria afirmam: <strong data-start=\"9253\" data-end=\"9330\">\u201cAqui est\u00e1 tudo bloqueado. Tenho certeza de que n\u00e3o temos Shadow Python.\u201d\u00a0<\/strong>A a\u00e7\u00e3o recomendada \u00e9 iniciar uma <strong data-start=\"9365\" data-end=\"9404\">varredura de descoberta sem impacto<\/strong> para revelar o que realmente est\u00e1 rodando.<\/li>\n<\/ol>\n<p data-start=\"9449\" data-end=\"9790\">Se voc\u00ea enxerga sua organiza\u00e7\u00e3o em um desses cen\u00e1rios, o momento de agir \u00e9 agora. Entre em contato para conversar com a gente. Vamos mostrar exatamente o que est\u00e1 rodando nos seus endpoints e como governar essa nova realidade.<\/p>\n<p data-start=\"9449\" data-end=\"9790\">Nossos especialistas est\u00e3o prontos para oferecer uma an\u00e1lise aprofundada, pr\u00e1tica e acion\u00e1vel do seu estado atual.<\/p>\n<p data-start=\"9792\" data-end=\"9963\">N\u00e3o espere pelo pr\u00f3ximo incidente. Ganhe a <strong data-start=\"9835\" data-end=\"9851\">visibilidade<\/strong> e o <strong data-start=\"9856\" data-end=\"9868\">controle<\/strong> necess\u00e1rios para proteger seu ambiente digital e governar seu ecossistema de TI com confian\u00e7a.<\/p>\n<h3 data-start=\"9792\" data-end=\"9963\"><strong data-start=\"49\" data-end=\"85\">Aprofunde este debate no webinar<\/strong><\/h3>\n<p data-start=\"9792\" data-end=\"9963\">Se este tema acendeu um alerta para a sua opera\u00e7\u00e3o, vale assistir ao webinar que realizamos especialmente sobre esse assunto.<\/p>\n<p>Nele mostramos como o risco j\u00e1 est\u00e1 presente nos endpoints e por que o <strong>BotCity Sentinel<\/strong> entrega a visibilidade e as evid\u00eancias de execu\u00e7\u00e3o que times de <strong>GRC<\/strong>\u00a0e\u00a0<strong>SecOps<\/strong>\u00a0precisam para governar o uso de Python com mais seguran\u00e7a.<\/p>\n<p><iframe loading=\"lazy\" title=\"Your EDR Is Blind to Python. Here&#039;s What&#039;s Already Running Inside Your Endpoints.\" width=\"770\" height=\"433\" src=\"https:\/\/www.youtube.com\/embed\/Ic6eI5_VFuI?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A prolifera\u00e7\u00e3o da IA Generativa (GenAI) e dos Grandes Modelos de Linguagem (LLMs) inaugurou uma nova era de inova\u00e7\u00e3o, mas, ao mesmo tempo, criou um desafio de seguran\u00e7a formid\u00e1vel e muitas vezes invis\u00edvel: a Shadow AI. Esse fen\u00f4meno est\u00e1 transformando rapidamente o cen\u00e1rio tecnol\u00f3gico corporativo, posicionando o Python (a \u201cl\u00edngua franca da IA\u201d) como a<\/p>\n","protected":false},"author":214060741,"featured_media":11345,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"_wpas_customize_per_network":false},"categories":[773027],"tags":[],"class_list":{"0":"post-11351","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-automacao-python"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Seu EDR est\u00e1 cego para Python: veja o que j\u00e1 est\u00e1 rodando nos seus endpoints - Blog BotCity - Conte\u00fado para Automa\u00e7\u00e3o e Governan\u00e7a<\/title>\n<meta name=\"description\" content=\"Descubra por que seu EDR ignora scripts Python em execu\u00e7\u00e3o nos endpoints e como obter visibilidade e governan\u00e7a sem bloquear a inova\u00e7\u00e3o.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.botcity.dev\/pt-br\/2026\/03\/19\/seu-edr-esta-cego-para-python-veja-o-que-ja-esta-rodando-nos-seus-endpoints\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Seu EDR est\u00e1 cego para Python: veja o que j\u00e1 est\u00e1 rodando nos seus endpoints - Blog BotCity - Conte\u00fado para Automa\u00e7\u00e3o e Governan\u00e7a\" \/>\n<meta property=\"og:description\" content=\"Descubra por que seu EDR ignora scripts Python em execu\u00e7\u00e3o nos endpoints e como obter visibilidade e governan\u00e7a sem bloquear a inova\u00e7\u00e3o.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.botcity.dev\/pt-br\/2026\/03\/19\/seu-edr-esta-cego-para-python-veja-o-que-ja-esta-rodando-nos-seus-endpoints\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog BotCity - Conte\u00fado para Automa\u00e7\u00e3o e Governan\u00e7a\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-19T11:00:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-01T14:35:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.botcity.dev\/wp-content\/uploads\/2026\/03\/lock-on-a-computer-keyboard-with-colorful-lighting-2026-03-05-11-31-38-utc-1024x683.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"683\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"BotCity Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"BotCity Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.botcity.dev\\\/pt-br\\\/2026\\\/03\\\/19\\\/seu-edr-esta-cego-para-python-veja-o-que-ja-esta-rodando-nos-seus-endpoints\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.botcity.dev\\\/pt-br\\\/2026\\\/03\\\/19\\\/seu-edr-esta-cego-para-python-veja-o-que-ja-esta-rodando-nos-seus-endpoints\\\/\"},\"author\":{\"name\":\"BotCity Team\",\"@id\":\"https:\\\/\\\/blog.botcity.dev\\\/pt-br\\\/#\\\/schema\\\/person\\\/2ff53951fc520345260832ecf1fe62f7\"},\"headline\":\"Seu EDR est\u00e1 cego para Python: veja o que j\u00e1 est\u00e1 rodando nos seus endpoints\",\"datePublished\":\"2026-03-19T11:00:31+00:00\",\"dateModified\":\"2026-04-01T14:35:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.botcity.dev\\\/pt-br\\\/2026\\\/03\\\/19\\\/seu-edr-esta-cego-para-python-veja-o-que-ja-esta-rodando-nos-seus-endpoints\\\/\"},\"wordCount\":1589,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/blog.botcity.dev\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.botcity.dev\\\/pt-br\\\/2026\\\/03\\\/19\\\/seu-edr-esta-cego-para-python-veja-o-que-ja-esta-rodando-nos-seus-endpoints\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.botcity.dev\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/lock-on-a-computer-keyboard-with-colorful-lighting-2026-03-05-11-31-38-utc.jpg\",\"articleSection\":[\"Automa\u00e7\u00e3o Python\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/blog.botcity.dev\\\/pt-br\\\/2026\\\/03\\\/19\\\/seu-edr-esta-cego-para-python-veja-o-que-ja-esta-rodando-nos-seus-endpoints\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.botcity.dev\\\/pt-br\\\/2026\\\/03\\\/19\\\/seu-edr-esta-cego-para-python-veja-o-que-ja-esta-rodando-nos-seus-endpoints\\\/\",\"url\":\"https:\\\/\\\/blog.botcity.dev\\\/pt-br\\\/2026\\\/03\\\/19\\\/seu-edr-esta-cego-para-python-veja-o-que-ja-esta-rodando-nos-seus-endpoints\\\/\",\"name\":\"Seu EDR est\u00e1 cego para Python: veja o que j\u00e1 est\u00e1 rodando nos seus endpoints - Blog BotCity - Conte\u00fado para Automa\u00e7\u00e3o e Governan\u00e7a\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.botcity.dev\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.botcity.dev\\\/pt-br\\\/2026\\\/03\\\/19\\\/seu-edr-esta-cego-para-python-veja-o-que-ja-esta-rodando-nos-seus-endpoints\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.botcity.dev\\\/pt-br\\\/2026\\\/03\\\/19\\\/seu-edr-esta-cego-para-python-veja-o-que-ja-esta-rodando-nos-seus-endpoints\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.botcity.dev\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/lock-on-a-computer-keyboard-with-colorful-lighting-2026-03-05-11-31-38-utc.jpg\",\"datePublished\":\"2026-03-19T11:00:31+00:00\",\"dateModified\":\"2026-04-01T14:35:11+00:00\",\"description\":\"Descubra por que seu EDR ignora scripts Python em execu\u00e7\u00e3o nos endpoints e como obter visibilidade e governan\u00e7a sem bloquear a inova\u00e7\u00e3o.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.botcity.dev\\\/pt-br\\\/2026\\\/03\\\/19\\\/seu-edr-esta-cego-para-python-veja-o-que-ja-esta-rodando-nos-seus-endpoints\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.botcity.dev\\\/pt-br\\\/2026\\\/03\\\/19\\\/seu-edr-esta-cego-para-python-veja-o-que-ja-esta-rodando-nos-seus-endpoints\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/blog.botcity.dev\\\/pt-br\\\/2026\\\/03\\\/19\\\/seu-edr-esta-cego-para-python-veja-o-que-ja-esta-rodando-nos-seus-endpoints\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.botcity.dev\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/lock-on-a-computer-keyboard-with-colorful-lighting-2026-03-05-11-31-38-utc.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.botcity.dev\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/lock-on-a-computer-keyboard-with-colorful-lighting-2026-03-05-11-31-38-utc.jpg\",\"width\":6222,\"height\":4148,\"caption\":\"A padlock sits on a computer keyboard under blue and red lighting in a dark room at night. This scene shows a focus on digital security.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.botcity.dev\\\/pt-br\\\/2026\\\/03\\\/19\\\/seu-edr-esta-cego-para-python-veja-o-que-ja-esta-rodando-nos-seus-endpoints\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.botcity.dev\\\/pt-br\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Seu EDR est\u00e1 cego para Python: veja o que j\u00e1 est\u00e1 rodando nos seus endpoints\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.botcity.dev\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/blog.botcity.dev\\\/pt-br\\\/\",\"name\":\"Blog BotCity\",\"description\":\"Explore o blog BotCity com conte\u00fados para automatizar e governar em Python. Mantenha-se informado e melhore o desempenho tecnol\u00f3gico, a seguran\u00e7a e o ROI da sua empresa.\",\"publisher\":{\"@id\":\"https:\\\/\\\/blog.botcity.dev\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.botcity.dev\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/blog.botcity.dev\\\/pt-br\\\/#organization\",\"name\":\"BotCity\",\"url\":\"https:\\\/\\\/blog.botcity.dev\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/blog.botcity.dev\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"http:\\\/\\\/blog.botcity.dev\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/logo_botcity_2024_black.png\",\"contentUrl\":\"http:\\\/\\\/blog.botcity.dev\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/logo_botcity_2024_black.png\",\"width\":1611,\"height\":384,\"caption\":\"BotCity\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.botcity.dev\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.botcity.dev\\\/pt-br\\\/#\\\/schema\\\/person\\\/2ff53951fc520345260832ecf1fe62f7\",\"name\":\"BotCity Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/996e498d13af3bc09191a6237cc1e19c433d6bf786a5a34fb7210b2f467bd15f?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/996e498d13af3bc09191a6237cc1e19c433d6bf786a5a34fb7210b2f467bd15f?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/996e498d13af3bc09191a6237cc1e19c433d6bf786a5a34fb7210b2f467bd15f?s=96&d=identicon&r=g\",\"caption\":\"BotCity Team\"},\"url\":\"https:\\\/\\\/blog.botcity.dev\\\/pt-br\\\/author\\\/gabrielateixeirab830df3762\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Seu EDR est\u00e1 cego para Python: veja o que j\u00e1 est\u00e1 rodando nos seus endpoints - Blog BotCity - Conte\u00fado para Automa\u00e7\u00e3o e Governan\u00e7a","description":"Descubra por que seu EDR ignora scripts Python em execu\u00e7\u00e3o nos endpoints e como obter visibilidade e governan\u00e7a sem bloquear a inova\u00e7\u00e3o.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.botcity.dev\/pt-br\/2026\/03\/19\/seu-edr-esta-cego-para-python-veja-o-que-ja-esta-rodando-nos-seus-endpoints\/","og_locale":"pt_BR","og_type":"article","og_title":"Seu EDR est\u00e1 cego para Python: veja o que j\u00e1 est\u00e1 rodando nos seus endpoints - Blog BotCity - Conte\u00fado para Automa\u00e7\u00e3o e Governan\u00e7a","og_description":"Descubra por que seu EDR ignora scripts Python em execu\u00e7\u00e3o nos endpoints e como obter visibilidade e governan\u00e7a sem bloquear a inova\u00e7\u00e3o.","og_url":"https:\/\/blog.botcity.dev\/pt-br\/2026\/03\/19\/seu-edr-esta-cego-para-python-veja-o-que-ja-esta-rodando-nos-seus-endpoints\/","og_site_name":"Blog BotCity - Conte\u00fado para Automa\u00e7\u00e3o e Governan\u00e7a","article_published_time":"2026-03-19T11:00:31+00:00","article_modified_time":"2026-04-01T14:35:11+00:00","og_image":[{"width":1024,"height":683,"url":"https:\/\/blog.botcity.dev\/wp-content\/uploads\/2026\/03\/lock-on-a-computer-keyboard-with-colorful-lighting-2026-03-05-11-31-38-utc-1024x683.jpg","type":"image\/jpeg"}],"author":"BotCity Team","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"BotCity Team","Est. tempo de leitura":"7 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.botcity.dev\/pt-br\/2026\/03\/19\/seu-edr-esta-cego-para-python-veja-o-que-ja-esta-rodando-nos-seus-endpoints\/#article","isPartOf":{"@id":"https:\/\/blog.botcity.dev\/pt-br\/2026\/03\/19\/seu-edr-esta-cego-para-python-veja-o-que-ja-esta-rodando-nos-seus-endpoints\/"},"author":{"name":"BotCity Team","@id":"https:\/\/blog.botcity.dev\/pt-br\/#\/schema\/person\/2ff53951fc520345260832ecf1fe62f7"},"headline":"Seu EDR est\u00e1 cego para Python: veja o que j\u00e1 est\u00e1 rodando nos seus endpoints","datePublished":"2026-03-19T11:00:31+00:00","dateModified":"2026-04-01T14:35:11+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.botcity.dev\/pt-br\/2026\/03\/19\/seu-edr-esta-cego-para-python-veja-o-que-ja-esta-rodando-nos-seus-endpoints\/"},"wordCount":1589,"commentCount":0,"publisher":{"@id":"https:\/\/blog.botcity.dev\/pt-br\/#organization"},"image":{"@id":"https:\/\/blog.botcity.dev\/pt-br\/2026\/03\/19\/seu-edr-esta-cego-para-python-veja-o-que-ja-esta-rodando-nos-seus-endpoints\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.botcity.dev\/wp-content\/uploads\/2026\/03\/lock-on-a-computer-keyboard-with-colorful-lighting-2026-03-05-11-31-38-utc.jpg","articleSection":["Automa\u00e7\u00e3o Python"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.botcity.dev\/pt-br\/2026\/03\/19\/seu-edr-esta-cego-para-python-veja-o-que-ja-esta-rodando-nos-seus-endpoints\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.botcity.dev\/pt-br\/2026\/03\/19\/seu-edr-esta-cego-para-python-veja-o-que-ja-esta-rodando-nos-seus-endpoints\/","url":"https:\/\/blog.botcity.dev\/pt-br\/2026\/03\/19\/seu-edr-esta-cego-para-python-veja-o-que-ja-esta-rodando-nos-seus-endpoints\/","name":"Seu EDR est\u00e1 cego para Python: veja o que j\u00e1 est\u00e1 rodando nos seus endpoints - Blog BotCity - Conte\u00fado para Automa\u00e7\u00e3o e Governan\u00e7a","isPartOf":{"@id":"https:\/\/blog.botcity.dev\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.botcity.dev\/pt-br\/2026\/03\/19\/seu-edr-esta-cego-para-python-veja-o-que-ja-esta-rodando-nos-seus-endpoints\/#primaryimage"},"image":{"@id":"https:\/\/blog.botcity.dev\/pt-br\/2026\/03\/19\/seu-edr-esta-cego-para-python-veja-o-que-ja-esta-rodando-nos-seus-endpoints\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.botcity.dev\/wp-content\/uploads\/2026\/03\/lock-on-a-computer-keyboard-with-colorful-lighting-2026-03-05-11-31-38-utc.jpg","datePublished":"2026-03-19T11:00:31+00:00","dateModified":"2026-04-01T14:35:11+00:00","description":"Descubra por que seu EDR ignora scripts Python em execu\u00e7\u00e3o nos endpoints e como obter visibilidade e governan\u00e7a sem bloquear a inova\u00e7\u00e3o.","breadcrumb":{"@id":"https:\/\/blog.botcity.dev\/pt-br\/2026\/03\/19\/seu-edr-esta-cego-para-python-veja-o-que-ja-esta-rodando-nos-seus-endpoints\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.botcity.dev\/pt-br\/2026\/03\/19\/seu-edr-esta-cego-para-python-veja-o-que-ja-esta-rodando-nos-seus-endpoints\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/blog.botcity.dev\/pt-br\/2026\/03\/19\/seu-edr-esta-cego-para-python-veja-o-que-ja-esta-rodando-nos-seus-endpoints\/#primaryimage","url":"https:\/\/blog.botcity.dev\/wp-content\/uploads\/2026\/03\/lock-on-a-computer-keyboard-with-colorful-lighting-2026-03-05-11-31-38-utc.jpg","contentUrl":"https:\/\/blog.botcity.dev\/wp-content\/uploads\/2026\/03\/lock-on-a-computer-keyboard-with-colorful-lighting-2026-03-05-11-31-38-utc.jpg","width":6222,"height":4148,"caption":"A padlock sits on a computer keyboard under blue and red lighting in a dark room at night. This scene shows a focus on digital security."},{"@type":"BreadcrumbList","@id":"https:\/\/blog.botcity.dev\/pt-br\/2026\/03\/19\/seu-edr-esta-cego-para-python-veja-o-que-ja-esta-rodando-nos-seus-endpoints\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.botcity.dev\/pt-br\/"},{"@type":"ListItem","position":2,"name":"Seu EDR est\u00e1 cego para Python: veja o que j\u00e1 est\u00e1 rodando nos seus endpoints"}]},{"@type":"WebSite","@id":"https:\/\/blog.botcity.dev\/pt-br\/#website","url":"https:\/\/blog.botcity.dev\/pt-br\/","name":"Blog BotCity","description":"Explore o blog BotCity com conte\u00fados para automatizar e governar em Python. Mantenha-se informado e melhore o desempenho tecnol\u00f3gico, a seguran\u00e7a e o ROI da sua empresa.","publisher":{"@id":"https:\/\/blog.botcity.dev\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.botcity.dev\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/blog.botcity.dev\/pt-br\/#organization","name":"BotCity","url":"https:\/\/blog.botcity.dev\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/blog.botcity.dev\/pt-br\/#\/schema\/logo\/image\/","url":"http:\/\/blog.botcity.dev\/wp-content\/uploads\/2025\/09\/logo_botcity_2024_black.png","contentUrl":"http:\/\/blog.botcity.dev\/wp-content\/uploads\/2025\/09\/logo_botcity_2024_black.png","width":1611,"height":384,"caption":"BotCity"},"image":{"@id":"https:\/\/blog.botcity.dev\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/blog.botcity.dev\/pt-br\/#\/schema\/person\/2ff53951fc520345260832ecf1fe62f7","name":"BotCity Team","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/996e498d13af3bc09191a6237cc1e19c433d6bf786a5a34fb7210b2f467bd15f?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/996e498d13af3bc09191a6237cc1e19c433d6bf786a5a34fb7210b2f467bd15f?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/996e498d13af3bc09191a6237cc1e19c433d6bf786a5a34fb7210b2f467bd15f?s=96&d=identicon&r=g","caption":"BotCity Team"},"url":"https:\/\/blog.botcity.dev\/pt-br\/author\/gabrielateixeirab830df3762\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/blog.botcity.dev\/wp-content\/uploads\/2026\/03\/lock-on-a-computer-keyboard-with-colorful-lighting-2026-03-05-11-31-38-utc.jpg","jetpack_likes_enabled":true,"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pdx8c3-2X5","_links":{"self":[{"href":"https:\/\/blog.botcity.dev\/pt-br\/wp-json\/wp\/v2\/posts\/11351","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.botcity.dev\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.botcity.dev\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.botcity.dev\/pt-br\/wp-json\/wp\/v2\/users\/214060741"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.botcity.dev\/pt-br\/wp-json\/wp\/v2\/comments?post=11351"}],"version-history":[{"count":9,"href":"https:\/\/blog.botcity.dev\/pt-br\/wp-json\/wp\/v2\/posts\/11351\/revisions"}],"predecessor-version":[{"id":11362,"href":"https:\/\/blog.botcity.dev\/pt-br\/wp-json\/wp\/v2\/posts\/11351\/revisions\/11362"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.botcity.dev\/pt-br\/wp-json\/wp\/v2\/media\/11345"}],"wp:attachment":[{"href":"https:\/\/blog.botcity.dev\/pt-br\/wp-json\/wp\/v2\/media?parent=11351"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.botcity.dev\/pt-br\/wp-json\/wp\/v2\/categories?post=11351"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.botcity.dev\/pt-br\/wp-json\/wp\/v2\/tags?post=11351"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}