CrowdSec Dashboard: - Refactor all views (alerts, bouncers, decisions, overview, settings) - Add soc.css for Security Operations Center styling - Remove 3000+ lines of redundant code CrowdSec Custom Parsers & Scenarios: - Add secubox-gitea parser and bruteforce scenario - Add secubox-haproxy parser and bruteforce scenario - Add secubox-streamlit parser and bruteforce scenario - Add secubox-webapp parser and bruteforce scenario - Update Makefile for new parser/scenario files HAProxy: - Update api.js, backends.js view improvements - Update luci.haproxy RPCD backend - Update haproxyctl helper script Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
44 lines
1.1 KiB
YAML
44 lines
1.1 KiB
YAML
# CrowdSec scenario for Streamlit authentication bruteforce
|
|
# Detects repeated authentication failures on Streamlit apps
|
|
|
|
type: leaky
|
|
name: secubox/streamlit-auth-bruteforce
|
|
description: "Detect bruteforce attempts on Streamlit applications"
|
|
filter: "evt.Meta.service == 'streamlit' && evt.Meta.auth_success == 'false'"
|
|
groupby: evt.Meta.source_ip
|
|
capacity: 5
|
|
leakspeed: 30s
|
|
blackhole: 5m
|
|
labels:
|
|
service: streamlit
|
|
type: bruteforce
|
|
remediation: true
|
|
---
|
|
# Detect Streamlit flooding (rapid requests)
|
|
type: leaky
|
|
name: secubox/streamlit-flooding
|
|
description: "Detect request flooding on Streamlit apps"
|
|
filter: "evt.Meta.log_type == 'haproxy' && evt.Parsed.backend contains 'streamlit'"
|
|
groupby: evt.Meta.source_ip
|
|
capacity: 50
|
|
leakspeed: 5s
|
|
blackhole: 5m
|
|
labels:
|
|
service: streamlit
|
|
type: flooding
|
|
remediation: true
|
|
---
|
|
# Detect Streamlit WebSocket abuse
|
|
type: leaky
|
|
name: secubox/streamlit-ws-abuse
|
|
description: "Detect WebSocket abuse on Streamlit"
|
|
filter: "evt.Meta.log_type == 'streamlit_ws'"
|
|
groupby: evt.Meta.source_ip
|
|
capacity: 20
|
|
leakspeed: 10s
|
|
blackhole: 5m
|
|
labels:
|
|
service: streamlit
|
|
type: ws_abuse
|
|
remediation: true
|