AUTARCH v1.9 — remote monitoring, SSH manager, daemon, vault, cleanup
- Add Remote Monitoring Station with PIAP device profile system - Add SSH/SSHD manager with fail2ban integration - Add privileged daemon architecture for safe root operations - Add encrypted vault, HAL memory, HAL auto-analyst - Add network security suite, module creator, codex training - Add start.sh launcher script and GTK3 desktop launcher - Remove Output/ build artifacts, installer files, loose docs - Update .gitignore for runtime data and build artifacts - Update README for v1.9 with new launch method, screenshots, and features Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
This commit is contained in:
@@ -98,6 +98,7 @@ function linuxRunAudit() {
|
||||
+ (c.passed ? 'PASS' : 'FAIL') + '</span></td><td>' + escapeHtml(c.details || '') + '</td></tr>';
|
||||
});
|
||||
document.getElementById('audit-results').innerHTML = html || '<tr><td colspan="3">No results</td></tr>';
|
||||
halAnalyze('Defense: Security Audit', JSON.stringify(data, null, 2), 'linux security audit', 'defense');
|
||||
}).catch(function() { setLoading(btn, false); });
|
||||
}
|
||||
|
||||
@@ -110,12 +111,14 @@ function linuxRunCheck(name) {
|
||||
return (c.passed ? '[PASS] ' : '[FAIL] ') + c.name + (c.details ? ' — ' + c.details : '');
|
||||
});
|
||||
if (el) el.textContent = lines.join('\n') || 'No results';
|
||||
halAnalyze('Defense: ' + name + ' (single check only, do NOT run a full audit)', JSON.stringify(data, null, 2), 'single check: ' + name, 'defense');
|
||||
}).catch(function() { if (el) el.textContent = 'Request failed'; });
|
||||
}
|
||||
|
||||
function linuxLoadFwRules() {
|
||||
fetchJSON('/defense/linux/firewall/rules').then(function(data) {
|
||||
renderOutput('fw-rules', data.rules || 'Could not load rules');
|
||||
halAnalyze('Defense: Firewall Rules', JSON.stringify(data, null, 2), 'linux security audit', 'defense');
|
||||
});
|
||||
}
|
||||
|
||||
@@ -125,6 +128,7 @@ function linuxBlockIP() {
|
||||
postJSON('/defense/linux/firewall/block', {ip: ip}).then(function(data) {
|
||||
renderOutput('fw-result', data.message || data.error);
|
||||
if (data.success) { document.getElementById('block-ip').value = ''; linuxLoadFwRules(); }
|
||||
halAnalyze('Defense: Block IP', JSON.stringify(data, null, 2), 'linux security audit', 'defense');
|
||||
});
|
||||
}
|
||||
|
||||
@@ -134,6 +138,7 @@ function linuxUnblockIP() {
|
||||
postJSON('/defense/linux/firewall/unblock', {ip: ip}).then(function(data) {
|
||||
renderOutput('fw-result', data.message || data.error);
|
||||
if (data.success) linuxLoadFwRules();
|
||||
halAnalyze('Defense: Unblock IP', JSON.stringify(data, null, 2), 'linux security audit', 'defense');
|
||||
});
|
||||
}
|
||||
|
||||
@@ -157,6 +162,7 @@ function linuxAnalyzeLogs() {
|
||||
});
|
||||
}
|
||||
renderOutput('log-output', lines.join('\n') || 'No findings.');
|
||||
halAnalyze('Defense: Log Analysis', JSON.stringify(data, null, 2), 'linux security audit', 'defense');
|
||||
}).catch(function() { setLoading(btn, false); });
|
||||
}
|
||||
</script>
|
||||
|
||||
Reference in New Issue
Block a user