secubox-openwrt/package/secubox/secubox-threat-analyst/files/etc/config/threat-analyst
CyberMind-FR 0e0749ed08 feat: Add threat-analyst, dns-guard, mcp-server and DNS provider DynDNS
New packages:
- secubox-threat-analyst: AI-powered threat analysis with CrowdSec integration
- luci-app-threat-analyst: LuCI dashboard for threat intelligence
- secubox-dns-guard: DNS security monitoring and blocking
- secubox-mcp-server: Model Context Protocol server for AI assistant integration

Enhancements:
- dns-provider: Add DynDNS support (dyndns, get, update, domains commands)
- gandi.sh: Full DynDNS with WAN IP detection and record updates
- luci-app-dnsguard: Upgrade to v1.1.0 with improved dashboard

Infrastructure:
- BIND9 DNS setup for secubox.in with CAA records
- Wildcard SSL certificates via DNS-01 challenge
- HAProxy config fixes for secubox.in subdomains
- Mail server setup with Roundcube webmail

Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
2026-02-05 08:30:28 +01:00

56 lines
1.6 KiB
Plaintext

config threat-analyst 'main'
option enabled '1'
option interval '300'
option localai_url 'http://127.0.0.1:8081'
option localai_model 'tinyllama-1.1b-chat-v1.0.Q4_K_M'
# Auto-apply generated rules (0=queue for approval, 1=auto-apply)
option auto_apply_mitmproxy '1'
option auto_apply_crowdsec '0'
option auto_apply_waf '0'
# Minimum confidence score (0-100) to generate rules
option min_confidence '70'
# Maximum rules to generate per cycle
option max_rules_per_cycle '5'
# Data sources to monitor
config source 'crowdsec'
option enabled '1'
option type 'crowdsec'
option path '/var/log/crowdsec.log'
config source 'mitmproxy'
option enabled '1'
option type 'mitmproxy'
option path '/srv/mitmproxy/threats.log'
config source 'netifyd'
option enabled '1'
option type 'netifyd'
option path '/var/run/netifyd/status.json'
# Output targets for generated rules
config target 'mitmproxy_filters'
option enabled '1'
option type 'mitmproxy'
option output_path '/etc/mitmproxy/ai_filters.py'
option reload_cmd '/etc/init.d/mitmproxy reload'
config target 'crowdsec_scenarios'
option enabled '1'
option type 'crowdsec'
option output_path '/etc/crowdsec/scenarios/ai-generated.yaml'
option reload_cmd 'cscli hub update && cscli scenarios install /etc/crowdsec/scenarios/ai-generated.yaml --force'
config target 'waf_rules'
option enabled '1'
option type 'waf'
option output_path '/etc/mitmproxy/waf_ai_rules.json'
option reload_cmd '/etc/init.d/mitmproxy reload'
# Queue for pending rules (approval workflow)
config queue 'pending'
option path '/var/lib/threat-analyst/pending_rules.json'