* Feat: update Kubernetes manifests for Krawl deployment and improve resource labels
* Feat: update version to 1.0.0 in Helm chart and related files; add timezone to README
* Feat: enhance configuration options for handling malicious IPs and update dashboard secret path
* Fix: standardize boolean value handling in environment configuration
* added documentation, updated repo pointer in the dashboard, added dashboard link highlighting and mionor fixes
* added doc
* added logo to dashboard
* Fixed dashboard attack chart
* Enhance fake data generation with varied request counts for better visualization
* Add automatic migrations and support for latitude/longitude in IP stats
* Update Helm chart version to 0.2.2 and add timezone configuration option
---------
Co-authored-by: BlessedRebuS <patrick.difa@gmail.com>
* feat: update analyzer thresholds and add crawl configuration options
* feat: update Helm chart version and add README for installation instructions
* feat: update installation instructions in README and add Docker support
* feat: update deployment manifests and configuration for improved service handling and analyzer settings
* feat: add API endpoint for paginated IP retrieval and enhance dashboard visualization with category filters
* feat: update configuration for Krawl service to use external config file
* feat: refactor code for improved readability and consistency across multiple files
* feat: remove Flake8, Pylint, and test steps from PR checks workflow
* Add environment variable override for config fields
Introduces functions to override configuration fields from environment variables, allowing dynamic configuration without modifying YAML files. The environment variable names are generated from field names, and type conversion is handled for int, float, and tuple fields.
* update chart version to 0.1.4
* Update README.md to enhance environment variable configuration details and improve overall clarity
- Add SQLAlchemy-based database layer for persistent storage
- Create models for access_logs, credential_attempts, attack_detections, ip_stats
- Include fields for future GeoIP and reputation enrichment
- Implement sanitization utilities to protect against malicious payloads
- Fix XSS vulnerability in dashboard template (HTML escape all user data)
- Add DATABASE_PATH and DATABASE_RETENTION_DAYS config options
- Dual storage: in-memory for dashboard performance + SQLite for persistence
New files:
- src/models.py - SQLAlchemy ORM models
- src/database.py - DatabaseManager singleton
- src/sanitizer.py - Input sanitization and HTML escaping
- requirements.txt - SQLAlchemy dependency
Security protections:
- Parameterized queries via SQLAlchemy ORM
- Field length limits to prevent storage exhaustion
- Null byte and control character stripping
- HTML escaping on dashboard output
Add SERVER_HEADER environment variable to customize the HTTP Server
response header, defaulting to Apache/2.2.22 (Ubuntu). This allows the
honeypot to masquerade as different web servers to attract attackers.
- Add server_header field to Config dataclass
- Override version_string() in Handler to return configured header
- Update documentation and all deployment configs