Add detection patterns for latest actively exploited vulnerabilities: - CVE-2025-55182 (React2Shell, CVSS 10.0) - CVE-2025-8110 (Gogs RCE), CVE-2025-53770 (SharePoint) - CVE-2025-52691 (SmarterMail), CVE-2025-40551 (SolarWinds) - CVE-2024-47575 (FortiManager), CVE-2024-21887 (Ivanti) - CVE-2024-3400, CVE-2024-0012, CVE-2024-9474 (PAN-OS) New attack categories based on OWASP Top 10 2025: - HTTP Request Smuggling (TE.CL/CL.TE conflicts) - AI/LLM Prompt Injection (ChatML, instruction markers) - WAF Bypass techniques (Unicode normalization, double encoding) - Supply Chain attacks (CI/CD poisoning, dependency confusion) - Extended SSTI (Jinja2, Freemarker, Velocity, Thymeleaf) - API Abuse (BOLA/IDOR, mass assignment) CrowdSec scenarios split into 11 separate files for reliability. Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
26 KiB
Work In Progress (Claude)
Last updated: 2026-02-11
Architecture Reference: SecuBox Fanzine v3 — Les 4 Couches
Couche 1 — Core Mesh
Recently Completed (2026-02-04/05)
-
MAC Guardian Feed Integration — DONE (2026-02-05)
- Both IPKs built and added to bonus feed
- Catalog updated with security category, wifi icon
-
Punk Exposure Emancipate — DONE (2026-02-05)
- CLI:
emancipateandrevokecommands for multi-channel exposure - RPCD: 3 new methods in
luci.exposure - Dashboard: Mesh column toggle, Emancipate modal
- CLI:
-
Jellyfin Post-Install Wizard — DONE (2026-02-05)
- 4-step modal wizard (Welcome, Media, Network, Complete)
- RPCD methods for wizard status and media path management
-
Navigation Component Refactoring — DONE (2026-02-05)
SecuNav.renderTabs()auto-inits theme and CSSrenderCompactTabs()for nested modules- Eliminated ~1000 lines of duplicate CSS
-
ksmbd Mesh Media Sharing — DONE (2026-02-05)
ksmbdctlCLI with share management- Pre-configured shares: Media, Jellyfin, Lyrion, Backup
-
SMB/CIFS Remote Mount Manager — DONE (2026-02-04)
smbfsctlCLI, UCI config, init script- Jellyfin and Lyrion media path integration
-
Domoticz IoT Integration — DONE (2026-02-04)
- LXC Debian container with native binary
- MQTT auto-bridge, Zigbee2MQTT integration
domoticzctl configure-mqttcommand
In Progress
-
Vortex DNS Firewall Phase 1 — DONE (2026-02-11)
- Created
secubox-vortex-firewallpackage for DNS-level threat blocking - Threat intel aggregator (URLhaus, OpenPhish, Malware Domains feeds)
- SQLite blocklist database with domain deduplication
- dnsmasq integration via sinkhole hosts file
- ×47 vitality multiplier concept
- CLI tool:
vortex-firewall intel/stats/start/stop - RPCD handler with 8 methods for LuCI integration
- Tested: 765 domains blocked from 3 feeds
- Next phases: Sinkhole server (Phase 2), DNS Guard integration (Phase 3), Mesh threat sharing (Phase 4), LuCI dashboard (Phase 5)
- Created
-
Vortex DNS - Meshed multi-dynamic subdomain delegation (DONE 2026-02-05)
- Created
secubox-vortex-dnspackage withvortexctlCLI - Master/slave hierarchical DNS delegation
- Wildcard domain management (*.domain.com)
- First Peek auto-registration of services
- Gossip-based exposure config sync via secubox-p2p
- Created
luci-app-vortex-dnsdashboard
- Created
Just Completed (2026-02-08 PM)
-
Vortex Hub Wildcard Routing — DONE (2026-02-08)
- HAProxy wildcard domain support (
*.gk2.secubox.in) - Subdomain-to-path rewriting:
{sub}.gk2.secubox.in/x→/{sub}/x - New
match_typeoption: exact, suffix, regex - Vortex fallback backend with
X-Vortex-Nodeheaders - Prepares infrastructure for distributed mesh node publishing
- HAProxy wildcard domain support (
-
Mitmproxy WAF Subdomain Metrics — DONE (2026-02-08)
- Track requests/threats per subdomain in
secubox_analytics.py - New RPCD method:
subdomain_metrics - Metrics: requests, threats, protocols, methods, status codes, top URIs, countries
- LuCI dashboard shows subdomain metrics instead of alerts
- Track requests/threats per subdomain in
-
RPCD luci.secubox Modular Refactor — DONE (2026-02-08)
- Split 2544-line monolithic handler into 14 modules
- Thin dispatcher +
/usr/lib/secubox/rpcd.d/*.shmodules - Modules: core, modules, profiles, snapshots, health, dashboard, appstore, state, network, feeds, skills, feedback, p2p
- Shared utilities in
_common.sh
-
HAProxy Backend IP Fixes — DONE (2026-02-08)
- Fixed all
127.0.0.1→192.168.255.1in backend configs - Cleaned up duplicate vhosts and invalid IP:port backend formats
- Fixed
presse.cybermood.eurouting - Fixed
streamlit_evolutionstale config in container
- Fixed all
-
GK2 Node Service Mapping — DONE (2026-02-08)
- Complete map of 10 published domains
- 9 active backends documented
- Wildcard certificate ready for mesh
-
HAProxy Path-Based ACL Routing — DONE (2026-02-08/09)
- Added
_add_path_acl()function to haproxyctl for UCIaclsections - Support for path_beg, path_end, path, path_reg, path_dir match types
- Path ACLs processed before vhost ACLs (higher priority)
- Fixed http_request list handling to avoid duplicate output
- Pattern Length Sorting (2026-02-09): ACLs now sorted by pattern length (longest first)
- Two-phase:
_collect_path_acl()+_emit_sorted_path_acls() - Ensures
/gk2/evolutionmatches before/gk2
- Two-phase:
- Apex domain routing:
secubox.in/gk2/**instead of*.gk2.secubox.in - Tested:
/gk2,/gk2/evolution,/gk2/controlall routing correctly
- Added
-
Gandi DNS Secondary Setup — DONE (2026-02-08)
- Configured BIND master to allow zone transfers to Gandi (217.70.177.40)
- Added
also-notifyandnotify yesfor automatic zone updates - Synced all BIND zone records to Gandi LiveDNS via API
- Updated registrar nameservers to Gandi LiveDNS (ns-*.gandi.net)
- DNS propagation verified: all A, MX, wildcard records resolving correctly
- Architecture: Registrar → Gandi LiveDNS ← synced from → BIND master
Just Completed (2026-02-06/08)
-
Evolution Dashboard Real-Time Commits — DONE (2026-02-08)
- New "🚀 Devel" tab with live GitHub commits (1-min cache)
- Commits Today / This Week / Contributors / Stars metrics
- Commit type distribution with color-coding (feat/fix/docs/refactor)
- Recent commits with hash, message, author, relative time
- Repository stats (forks, watchers, open issues)
- Cyberpunk-themed commit cards with pulsing live indicator
-
Station Cloner/Deployer — DONE (2026-02-08)
- Host-side
secubox-clone-station.shwith MOKATOOL integration for dual USB serial control - On-device
secubox-clonerCLI for build/serve/token/export - First-boot provisioning script with partition resize and mesh join
- Master-link clone tokens with auto-approve for seamless onboarding
- Added
secubox cloneandsecubox master-linkCLI command groups - Full workflow: build image on master → TFTP serve → flash target → auto-join mesh
- Host-side
-
Cloning Station LuCI Dashboard — DONE (2026-02-11)
- Created
luci-app-clonerpackage with KISS-style dashboard - Status cards: device type, TFTP status, token count, clone count
- Quick actions: Build Image, Start/Stop TFTP, New/Auto-Approve Token
- Clone images table with size and TFTP-ready indicator
- Token management with delete functionality
- U-Boot flash commands display when TFTP active
- RPCD handler: 10 methods (status, list_images, list_tokens, list_clones, etc.)
- Created
-
System Hub KISS Rewrite — DONE (2026-02-11)
- Rewrote
luci-app-system-hub/overview.jsto KISS style - Self-contained inline CSS, no external dependencies
- 6 status cards: Hostname/Model, Uptime, Services, CPU Load, Temperature, Health Score
- 3 resource bars: Memory, Storage, CPU Usage
- Quick Actions + Services table with running/stopped badges
- 5-second live polling with data-stat DOM updates
- Full dark mode support
- Rewrote
-
SecuBox Dashboard KISS Rewrite — DONE (2026-02-11)
- Rewrote
luci-app-secubox/dashboard.jsto KISS style - Removed all external deps (secubox/api, secubox-theme, secubox/nav, secubox-portal/header)
- Header chips, stats cards, health panel, public IPs, modules table, quick actions, alerts
- 15-second live polling
- Full dark mode support
- Rewrote
-
HAProxy "End of Internet" Default Page — DONE (2026-02-07)
- Cyberpunk fallback page for unknown/unmatched domains
- Matrix rain animation, glitch text, ASCII art SecuBox logo
- Added
http-requestUCI option support in haproxyctl generator - Path rewriting via
http-request set-pathfor static content - Backend validation rejects IP:port misconfiguration
-
CrowdSec Threat Origins Fix — DONE (2026-02-07)
- Fixed
[object Object]display bug in Threat Origins widget parseCountries()now handles array format[{country, count}]
- Fixed
-
CrowdSec Dashboard Cache System — DONE (2026-02-06)
- Created
/usr/sbin/secubox-crowdsec-collectorv4 background stats collector - Generates
/tmp/secubox/crowdsec-overview.jsonevery minute via cron - RPCD fast path: reads cache first, falls back to slow cscli calls if stale
- Fixes dashboard loading times from 5-10s to <100ms
- Created
-
mitmproxy Local IP "Green Known" — DONE (2026-02-06)
- Patched secubox_analytics.py to skip threat logging for trusted local IPs
- Local network traffic (192.168.x, 10.x, 172.16-18.x) no longer pollutes threats.log
- Autoban still correctly targets only external IPs
-
Control Panel File Compatibility — DONE (2026-02-06)
- Fixed file naming mismatch (health.json vs health-status.json, etc.)
- Created symlinks for compatibility
- Created missing cache files (threat.json, netifyd.json)
- Updated stats collector to maintain symlinks on each run
-
LED Fix & Double-Buffer Status Cache — DONE (2026-02-07)
- Removed mmc0 LED (was blocking heartbeat loop)
- Added
status_collector_loop()background daemon - Cache files:
/tmp/secubox/{health,threat,capacity}.json - Fast readers for LED loop and dashboards (no subprocess calls)
-
MetaBlogizer KISS ULTIME MODE — DONE (2026-02-07)
- Added
metablogizerctl emancipatecommand - One-command workflow: DNS + Vortex + HAProxy + SSL + Reload
- DNS registration via dnsctl (Gandi/OVH based on availability)
- Vortex DNS mesh publication
- HAProxy vhost with SSL and ACME
- Zero-downtime reload via SIGUSR2
- Added
-
Streamlit LuCI Dashboard Edit & Emancipate — DONE (2026-02-06)
- Added Edit button with modal code editor (base64 encoding)
- Added Emancipate button with KISS ULTIME MODE workflow
- RPCD:
get_source,save_source,emancipate,get_emancipation - API + ACL updated
-
SecuBox Vhost Manager — DONE (2026-02-06)
- Created
secubox-vhostCLI for subdomain management - External (.gk2.secubox.in) and local (.gk2.sb.local) domain support
- UCI config for vhosts: console, control, metrics, crowdsec, factory, glances, play
- Default landing page generation
- Integrated into secubox-core daemon and firstboot
- Created
Completed (2026-02-06)
-
AI Insights Dashboard — DONE
- Created
luci-app-ai-insights- unified view across all AI agents - Security posture scoring (0-100) with factor breakdown
- Agent status grid: Threat Analyst, DNS Guard, Network Anomaly, CVE Triage
- Aggregated alerts from all agents
- Actions: Run All Agents, AI Analysis, View Timeline
- Links to LocalRecall memory dashboard
- Created
-
LocalRecall Memory System — DONE
- Created
secubox-localrecall- persistent memory for AI agents - Categories: threats, decisions, patterns, configs, conversations
- LocalAI integration for semantic search and AI summarization
- Created
luci-app-localrecalldashboard with add/search/summarize
- Created
-
Network Anomaly Agent — DONE
- Created
secubox-network-anomalywith 5 detection modules - Bandwidth spikes, connection floods, port scans, DNS anomalies, protocol anomalies
- LocalAI integration for AI-powered analysis
- Created
luci-app-network-anomalydashboard
- Created
-
CVE Triage Agent — DONE
- Created
secubox-cve-triage- AI-powered CVE analysis and vulnerability management - Architecture: Collector → Analyzer → Recommender → Applier
- NVD API integration for CVE data
- CrowdSec CVE alert correlation
- LocalAI-powered impact analysis
- Approval workflow for patch recommendations
- Multi-source monitoring: opkg, LXC, Docker
- Created
luci-app-cve-triagedashboard with alerts, pending queue, risk score
- Created
-
Webmail Login 401 Issue — RESOLVED
- Root cause:
config.docker.inc.phpoverrode IMAP host tossl://mail.secubox.in:993 - Docker container couldn't resolve domain or connect via SSL
- Fix: Changed to use socat proxy at
172.17.0.1:10143(plaintext, internal) - Updated
mailctl webmail configureto use proxy instead of direct SSL
- Root cause:
-
Mail Send 451 "Temporary lookup failure" — RESOLVED (2026-02-06)
- Root cause: Alpine Postfix uses LMDB, not BerkeleyDB hash maps
virtual_alias_maps = hash:/etc/postfix/virtualwas invalid- Postfix chroot
/var/spool/postfix/etc/resolv.confwas missing - Fix: Changed setup.sh to use
lmdb:prefix and copy resolv.conf to chroot - Added
mailctl fix-postfixcommand to repair existing installations
-
Mail Port Hijacking External Connections — RESOLVED (2026-02-06)
- Root cause: firewall.user DNAT rules had no interface restriction
- ALL port 993/587/etc traffic was redirected to local mailserver
- This blocked Thunderbird from connecting to external mail (ssl0.ovh.net)
- Fix: Added
-i $WAN_IFto only redirect inbound WAN traffic
-
Mail Ports 587/465/995 Not Listening — RESOLVED (2026-02-07)
- Root cause: Postfix master.cf missing submission/smtps entries
- Dovecot 10-master.conf had pop3s commented out
dovecot-pop3dpackage not installed in container- Fix: Added
mailctl fix-portscommand to enable all mail ports - Also added password reset for mail users in LuCI dashboard
-
BIND Zone Returning Internal IP — RESOLVED (2026-02-07)
- Root cause:
/etc/bind/zones/secubox.in.zonehad 192.168.255.1 (internal) instead of public IP - External DNS queries returned non-routable internal IP
- Fix: Updated zone file with public IP 82.67.100.75 for all records
- Root cause:
-
IPv6 DNS Support — DONE (2026-02-07)
- Added AAAA records to BIND zone and Gandi DNS
- IPv6:
2a01:e0a:dec:c4e0:250:43ff:fe84:fb2f - Records: @, mail, ns0, ns1, wildcard
-
nftables Mail Forwarding Rules — DONE (2026-02-07)
- Root cause: nftables
forward_wanchain blocked DNAT'd mail traffic - iptables DNAT worked but nftables dropped packets before forwarding
- Fix: Added explicit accept rules for mail ports (25,143,465,587,993,995)
- Added both IPv4 and IPv6 forwarding rules
- Persisted in
/etc/firewall.user
- Root cause: nftables
-
Postfix/Dovecot Maildir Path Alignment — DONE (2026-02-07)
- Root cause: Postfix delivered to
/home/vmail/$domain/$user/new/but Dovecot looks in~/Maildir/new/ - Emails were delivered but invisible in Roundcube
- Fix in
container.sh: Mount tohome/vmail, virtual_mailbox_base =/home/vmail - Fix in
users.sh: Create$domain/$user/Maildir/{cur,new,tmp}structure - Updated vmailbox format to include
Maildir/suffix
- Root cause: Postfix delivered to
-
Inbound Port 25 Blocked by Free ISP — KNOWN ISSUE
- Free ISP blocks inbound port 25 on residential lines
- Outbound mail works, inbound from external fails
- Workaround options: VPS relay, Mailgun/SendGrid, or contact Free support
Just Completed
-
Unified Backup Manager — DONE (2026-02-05)
- Created
secubox-app-backupCLI for LXC containers, UCI config, service data - Created
luci-app-backupdashboard with container list, backup history - Gitea remote sync and mesh backup support
- RPCD handler with 8 methods
- Created
-
Custom Mail Server — DONE (2026-02-05)
- Created
secubox-app-mailserver- Postfix + Dovecot in LXC container mailctlCLI: user management, aliases, SSL, mesh backup- Webmail (Roundcube) integration
- Mesh P2P mail backup sync
- Created
-
DNS Provider Enhanced — DONE (2026-02-05)
- Added
dnsctl generate- auto-generate subdomain A records - Added
dnsctl suggest- name suggestions by category - Added
dnsctl mail-setup- MX, SPF, DMARC records - Added
dnsctl dkim-add- DKIM TXT record
- Added
-
Subdomain Generator Tool — DONE (2026-02-05)
secubox-subdomainCLI for generative subdomain management- Automates: DNS A record + HAProxy vhost + UCI registration
- Uses wildcard certificate (*.zone) for instant SSL
- Quick-add shortcuts for common services (gitea, grafana, jellyfin, etc.)
- Part of Punk Exposure infrastructure
Recently Completed (2026-02-07)
- Mesh Onboarding Testing — VALIDATED
- Token generation: POST
/api/master-link/tokenwith HMAC tokens + TTL - IPK download: GET
/api/master-link/ipk?token=serves pre-built 12KB IPK - Dynamic IPK:
ml_ipk_generatecreates join packages on-the-fly - Join flow: request → approval → peer added at depth+1
- Blockchain:
peer_approvedblocks recorded correctly - Threat Intel: 288 local IOCs, 67 threat_ioc blocks in chain
- Token generation: POST
Just Completed (2026-02-11)
-
InterceptoR Services Dashboard — DONE (2026-02-11)
- Created
luci.services-registryRPCD handler with 4 methods - Aggregates: HAProxy vhosts, Tor onions, mitmproxy instances, init.d services, LuCI apps, system metrics
- Dynamic KISS dashboard with 5 tabs: Published, Proxies, Services, Dashboards, Metrics
- Service emoji registry for visual identification
- CrowdSec stats integration (alerts, bans)
- 10-second live polling
- Fixed
kiss-theme.jssingleton pattern for LuCI module loading
- Created
-
mitmproxy Multi-Instance Support — DONE (2026-02-11)
- Updated init.d script with
config_foreach start_instance instance - Updated mitmproxyctl with
list-instances, instance-awareservice-run/stop - UCI config for dual instances: out (LAN→Internet), in (WAF/services)
- Cloned containers: mitmproxy-out, mitmproxy-in
- Documented in README.md
- Updated init.d script with
-
Cookie Tracker LuCI Dashboard — DONE (2026-02-11)
- Created
luci-app-cookie-trackerwith KISS theme - RPCD handler with 6 methods: status, list, report, block, unblock, classify
- Category breakdown visualization (essential, functional, analytics, advertising, tracking)
- Top trackers list with one-click blocking
- Blocked domains display
- 69 known tracker domains pre-loaded
- mitmproxy addon linked for cookie capture
- Created
-
CDN Cache KISS Theme — DONE (2026-02-11)
- Rewrote overview.js with full KISS styling
- Circular gauge for hit ratio
- Stats grid, top domains table, 10s polling
-
IoT Guard Implementation — DONE (2026-02-11)
- Created
secubox-iot-guardpackage for IoT device isolation and security - OUI-based classification with 100+ IoT manufacturer prefixes
- 10 device classes with risk scoring (0-100)
- Anomaly detection: bandwidth spikes, new destinations, port scans, time anomalies
- Integration: Client Guardian (zones), MAC Guardian (L2), Vortex Firewall (DNS), Bandwidth Manager (QoS)
- CLI:
iot-guardctlwith status/list/show/scan/isolate/trust/block/anomalies/cloud-map - Created
luci-app-iot-guardwith KISS-style dashboard - 4 views: Overview, Devices, Policies, Settings
- RPCD handler with 11 methods + public ACL for unauthenticated access
- Created
Next Up — Couche 1
-
Guacamole Pre-built Binaries
- Current LXC build-from-source approach is too slow
- Need to find/create pre-built ARM64 binaries for guacd + Tomcat
-
Multi-Node Mesh Testing
- Deploy second SecuBox node to test real peer-to-peer sync
- Validate bidirectional threat intelligence sharing
Couche 2 — AI Gateway
Recently Completed (2026-02-06)
-
DNS Guard AI Migration — DONE (2026-02-06)
- Created
secubox-dns-guarddaemon with 5 detection modules:- DGA (Domain Generation Algorithm) detection via entropy analysis
- DNS tunneling/exfiltration detection
- Rate anomaly detection (queries/min, unique domains/min)
- Known bad domain matching against blocklists
- TLD anomaly detection (suspicious TLDs, punycode/IDN)
- LocalAI integration for intelligent threat analysis
- Approval workflow: auto-apply or queue for review
- Updated
luci-app-dnsguardv1.1.0 with:- AI Guard tab with pending blocks approval
- Real-time alerts panel
- Domain analysis with AI
- Detection module status display
- Created
-
LocalAI Multi-Channel Emancipation — DONE (2026-02-06)
- Exposed LocalAI via Punk Exposure:
- Tor:
b7lmlfs3b55jhgqdwbn6unhjhlfflq6ch235xa2gsdvxe7toxcf7qyad.onion - DNS/SSL:
localai.secubox.local - mDNS:
_secubox._tcp.local(mesh advertised)
- Tor:
- Exposed LocalAI via Punk Exposure:
-
Threat Analyst Agent — DONE (2026-02-05)
- Created
secubox-threat-analystautonomous threat analysis daemon - Rule generation for mitmproxy (Python), CrowdSec (YAML), WAF (JSON)
- Approval workflow: auto-apply mitmproxy, queue CrowdSec/WAF
- Created
luci-app-threat-analystwith AI chatbot dashboard - RPCD handler with 10 methods for status, chat, rules, approval
- Created
-
Threat Analyst KISS Dashboard v0.1.0 — DONE (2026-02-05)
- Regenerated LuCI dashboard following CrowdSec KISS template pattern
- External CSS loading, baseclass.extend() API pattern
- CVE alerts in System Health section
- CVE column in threats table with NVD hyperlinks
- AI Security Assistant chat interface
-
MCP Server Implementation — DONE (2026-02-06)
- Created
secubox-mcp-serverpackage with JSON-RPC 2.0 over stdio - 9 core tools: crowdsec.alerts/decisions, waf.logs, dns.queries, network.flows, system.metrics, wireguard.status, uci.get/set
- 5 AI-powered tools (via LocalAI): ai.analyze_threats, ai.cve_lookup, ai.suggest_waf_rules, ai.explain_ban, ai.security_posture
- Claude Desktop integration via SSH
- Created
Next Up — v0.18 AI Components
-
DNS Guard Migration— DONE (2026-02-06) -
LocalAI Upgrade → 3.9— DONE (2026-02-06)- Upgraded to v3.9.0 with Agent Jobs Panel and Memory Reclaimer
- Updated README with complete CLI reference and model presets
Couche 3 — MirrorNetworking
Just Completed (2026-02-07)
-
MirrorNet Core Package — DONE
- Created
secubox-mirrornetwith 5 library modules:identity.sh- DID-based identity (did:plc:), keypair generation, signingreputation.sh- Peer trust scoring (0-100), event logging, decay, ban thresholdsmirror.sh- Service mirroring, upstream management, HAProxy backend generationgossip.sh- Enhanced gossip protocol, priority routing, deduplication, TTL-based forwardinghealth.sh- Peer health monitoring, latency/packet loss, anomaly detection, alerts
mirrorctlCLI with 30+ commands- UCI config for roles (master/submaster/peer), reputation, gossip, mirror, health settings
- Created
-
MirrorNet Dashboard — DONE
- Created
luci-app-secubox-mirrorwith RPCD handler (15 methods) - Identity card with DID, hostname, role, version
- Peer reputation table with trust levels and reset action
- Gossip protocol stats (sent/received/forwarded/dropped)
- Health alerts panel with acknowledgment
- Mirrored services table
- Created
-
SecuBox Identity Package — DONE
- Created
secubox-identitystandalone identity management - DID generation (did:plc:) compatible with AT Protocol
- Keypair management (HMAC-SHA256, Ed25519 fallback)
- Key rotation with backup
- Peer identity storage and resolution
- Trust scoring integration
identityctlCLI with 25+ commands
- Created
-
P2P Intel Package — DONE
- Created
secubox-p2p-intelfor signed IOC sharing - Collector: CrowdSec, mitmproxy, WAF, DNS Guard sources
- Signer: Cryptographic signing of IOC batches
- Validator: Source trust, age, format validation
- Applier: nftables/iptables/CrowdSec application
- Approval workflow for manual review
p2p-intelctlCLI with 20+ commands
- Created
MirrorNet Packages Summary (v0.19)
| Package | Status | Description |
|---|---|---|
secubox-mirrornet |
DONE | Core mesh orchestration, gossip, health |
secubox-identity |
DONE | DID-based identity, key management, trust |
secubox-p2p-intel |
DONE | IOC signed gossip, validation, application |
luci-app-secubox-mirror |
DONE | Dashboard for peers, trust, services |
Master/Slave CDN Architecture (User Vision)
"multipoint CDN for SSL dependencies, root/master with *.sb, xxx.sb slaved, first peek meshed, submastering/multimixslaving"
Target architecture for service mirroring:
- Root Master owns wildcard domain
*.secubox.io(or similar) - Slave Nodes get delegated subdomains (
node1.secubox.io) - First Peek = service discovery auto-registers in mesh
- Mirror Cascade = master pushes exposure config to slaves
- Submastering = hierarchical delegation (master → submaster → slaves)
Required components:
- Dynamic DNS delegation with zone transfer
- Service mirroring via reverse proxy chaining
- Gossip-based exposure config sync
- Trust hierarchy with certificate delegation
Communication Layer (v1.0)
secubox-voip— Asterisk micro-PBXsecubox-matrix— Conduit Matrix server
Couche 4 — Roadmap Tracking
v0.18.0 Progress
| Item | Status |
|---|---|
| Core Mesh modules | 35+ DONE |
| Guacamole | DEFERRED |
| MCP Server | DONE |
| Threat Analyst | DONE |
| DNS Guard AI Migration | DONE |
| LocalAI 3.9 | DONE |
| LocalAI Emancipation | DONE (Tor + DNS + mDNS) |
v1.0.0 Progress
| Item | Status |
|---|---|
| Config Advisor | DONE |
| ANSSI CSPN Compliance | DONE |
| Remediation Engine | DONE |
| LuCI Dashboard | DONE |
Just Completed (2026-02-07)
-
Config Advisor Package — DONE
- Created
secubox-config-advisor- ANSSI CSPN compliance checking daemon - 7 check categories, 25+ security rules
- Risk scoring (0-100) with grade (A-F) and risk level
- Auto-remediation for 7 checks with dry-run mode
- LocalAI integration for AI-powered suggestions
config-advisorctlCLI with 20+ commands
- Created
-
Config Advisor Dashboard — DONE
- Created
luci-app-config-advisor- LuCI dashboard - Score display with grade circle and risk level
- Compliance view by category with pass/fail/warn badges
- Remediation view with apply/preview buttons
- Settings for framework, weights, categories, LocalAI
- Created
Certifications
- ANSSI CSPN: Config Advisor compliance tool DONE
- GDPR: Currently compliant
- ISO 27001, NIS2, SOC2: Planned for v1.1+
Strategic Documents Received
SecuBox_LocalAI_Strategic_Analysis.html— AI Management Layer roadmapSecuBox_AI_Gateway_Hybrid_Architecture.html— Hybrid Local/Cloud architectureSecuBox_MirrorNetworking_Paradigm_Reversal.html— EnigmaBox autopsy → MirrorNetSecuBox_Fanzine_v3_Feb2026.html— 4-layer architecture overview
Known Bugs (Deferred)
- Tor Shield / opkg conflict: opkg downloads fail (
wget returned 4) when Tor Shield is active. Likely DNS/routing interference.
Blockers / Risks
- No automated regression tests for LuCI views; manual verification required after SCP deploy.
- Guacamole ARM64 pre-built binaries not readily available.
- MCP Server requires understanding of Model Context Protocol specification.