Autarch/web/templates/defense.html
DigiJ a3ec1a2556 Add Threat Monitor with drill-down popups, Hal agent mode, Windows defense, LLM trainer
- Threat Monitor: 7-tab monitoring page (live, connections, network intel,
  threats, packet capture, DDoS mitigation, counter-attack) with real-time
  SSE streaming and optimized data collection (heartbeat, cached subprocess
  calls, bulk process name cache)
- Drill-down popups: Every live monitor stat is clickable, opening a popup
  with detailed data (connections list with per-connection detail view,
  GeoIP lookup, process kill, bandwidth, ARP spoof, port scan, DDoS status)
- Hal agent mode: Chat routes rewritten to use Agent system with
  create_module tool, SSE streaming of thought/action/result steps
- Windows defense module with full security audit
- LLM trainer module and routes
- Defense landing page with platform-specific sub-pages
- Clean up stale files (get-pip.py, download.png, custom_adultsites.json)

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-03-02 21:08:11 -08:00

64 lines
2.3 KiB
HTML

{% extends "base.html" %}
{% block title %}Defense - AUTARCH{% endblock %}
{% block content %}
<div class="page-header">
<h1>System Defense</h1>
<p style="margin:0;font-size:0.85rem;color:var(--text-secondary)">
Security hardening, firewall management, and threat monitoring.
</p>
</div>
<!-- Platform Info -->
<div class="section">
<h2>System Overview</h2>
<table class="data-table" style="max-width:500px">
<tbody>
<tr><td>Platform</td><td><strong>{{ sys_info.platform }}</strong></td></tr>
<tr><td>Hostname</td><td>{{ sys_info.hostname }}</td></tr>
<tr><td>OS</td><td>{{ sys_info.os_version }}</td></tr>
<tr><td>IP</td><td>{{ sys_info.ip }}</td></tr>
</tbody>
</table>
</div>
<!-- Sub-page Cards -->
<div class="section">
<h2>Defense Tools</h2>
<div class="tool-grid">
<div class="tool-card">
<h4>Linux Defense</h4>
<p>iptables firewall, SSH hardening, systemd services, auth logs, SELinux/AppArmor checks.</p>
<a href="{{ url_for('defense.linux_index') }}" class="btn btn-primary btn-small">Open</a>
</div>
<div class="tool-card">
<h4>Windows Defense</h4>
<p>Windows Firewall, UAC, Defender AV, event logs, OpenSSH, services, NTFS permissions.</p>
<a href="{{ url_for('defense.windows_index') }}" class="btn btn-primary btn-small">Open</a>
</div>
<div class="tool-card" style="border-color:var(--danger)">
<h4 style="color:var(--danger)">Threat Monitor</h4>
<p>Real-time connection monitoring, port scan detection, suspicious process alerts, and counter-attack tools.</p>
<a href="{{ url_for('defense.monitor_index') }}" class="btn btn-danger btn-small">Open</a>
</div>
</div>
</div>
{% if modules %}
<div class="section">
<h2>Defense Modules</h2>
<ul class="module-list">
{% for name, info in modules.items() %}
<li class="module-item">
<div>
<div class="module-name">{{ name }}</div>
<div class="module-desc">{{ info.description }}</div>
</div>
<div class="module-meta">v{{ info.version }}</div>
</li>
{% endfor %}
</ul>
</div>
{% endif %}
{% endblock %}