Sentinel
FeaturedMaintenance

Sentinel

Minimal programmable network intrusion detector — a quiet guardian for your open ports.

GolangNetwork SecurityPacket AnalysisUser ExperienceCommand Line Interfaces
Source Code

Project Overview

🧩 Sentinel

Minimal programmable network intrusion detector — a quiet guardian for your open ports.

Sentinel is a lightweight, local-first network intrusion detector (NID) designed for developers and DevSecOps engineers.
It watches your network traffic, alerts on suspicious activity, and optionally blocks unsafe connections — all configured from a single file.


✨ Features

  • 🧱 Lightweight packet inspection via pcap/BPF
  • ⚙️ One-file configuration (sentinel.toml)
  • 🧩 Preset modes: dev, strict, passive, honeypot
  • 🔔 Real-time alerts on new listeners or unknown IPs
  • 🚫 Optional auto-blocking for denied ports or domains

⚙️ Usage

# Start Sentinel with default config
sentinel run

# Or specify a config file
sentinel run --config sentinel.toml

Example sentinel.toml:

mode = "strict"

[allow]
domains = ["github.com", "docker.io"]
ports = [22, 443]

[deny]
ports = [23, 3389]

[thresholds]
max_connections_per_minute = 100
alert_on_new_listener = true

🧠 Philosophy

Sentinel focuses on practical local defense — no enterprise bloat, no cloud analytics, no hidden data flow. Just clean, minimal, programmable security for your machine.


📜 License

MIT — open source and always free.

Project Details

StatusMaintenance
CategoryFeatured
RepositoryGitHub
DemoPrivate