Skip to content

V0.3.1 - IAC, Opsec, and Phishing Updates#5

Merged
Lavender-dll merged 29 commits into
mainfrom
dev
Apr 6, 2026
Merged

V0.3.1 - IAC, Opsec, and Phishing Updates#5
Lavender-dll merged 29 commits into
mainfrom
dev

Conversation

@Lavender-dll
Copy link
Copy Markdown
Member

Infrastructure as Code:

  • Add Terraform-based deploy CLI (DO, AWS, Azure, Cloudflare Worker)
    with full auto-deploy lifecycle: provision → cloud-init bootstrap →
    SCP config → docker compose up → health poll
  • Cloud-init clones repo, builds Docker image, creates runtime dirs
  • Auto-generate populated .env with API token, randomized health path,
    Let's Encrypt config, and upstream mapping per C2 framework
  • Provider-specific SSH handling (root/ubuntu/operator) with sudo
  • Move terraform modules into package for pip/pipx distribution
  • Fix DO tag validation (dots to dashes), SSH key dedup (fingerprint),
    config loader crash on unset env vars

OPSEC Hardening:

  • Add response header blocklist preventing Server, X-Powered-By, Via,
    and cloud provider headers from leaking through upstream responses
  • Inject persona Server header on proxied responses
  • Add HTTP fingerprint filter (header-order hashing, missing browser
    headers detection, minimal-header CLI tool detection)
  • Add response timing normalization (configurable jitter) to eliminate
    side-channel between proxied and locally-generated responses
  • Add age/SOPS encrypted config file support

Operational Resilience:

  • Add multi-path upstream failover with per-upstream circuit breakers
  • Add dynamic cloud provider IP range feeds (AWS, Azure, GCP JSON)
  • Add burn detection watchdog (vendor spike, multi-ASN probe patterns)
  • Add dead man's switch with configurable TTL-based auto-expiry
  • Add HTTP/2 listener support via h2 protocol

Phishing Framework Support:

  • Add phishing profile system (GoPhish, Evilginx, CuddlePhish, passthrough)
  • Add PhishingFilter for path-based validation (replaces ProfileFilter)
  • Add Evilginx phishlet file parsing
  • Add phishing-related redirection and decoy drop action

Decoy & Intelligence:

  • Add 6 decoy SPA sites (Banking, Financial, Healthcare, Hospital,
    InfraShield, Test blogs)
  • Add canary token injection (tracking pixel, honeypot link, hidden form)
  • Add decoy target rotation (random/round-robin strategy)
  • Add config hot-reload with atomic route swap and rollback

Operator Experience:

  • Add infraguard test-request CLI for dry-run filter validation
  • Add infraguard report CLI for HTML engagement report generation
  • Add operator audit log table in tracking database
  • Add circuit breaker pattern for upstream failure handling
  • Add WebSocket authentication, Prometheus metrics endpoint
  • Add Let's Encrypt auto-renewal via certbot Docker service

Bug Fixes:

  • Fix decoy drop action file serving
  • Fix WebSocket authentication
  • Fix Let's Encrypt cert path configuration
  • Fix config loader empty TLS block and empty domain key handling

Lavender-exe and others added 29 commits March 30, 2026 12:58
- Added Kaine Profile
- Added BRC4 example
- Updated Infrastructure Diagram
- Added command posts dashboard which consolidates all the redirectors into one place
- Added new filtering mode "Hard Block", updated .env.example and configs to show this change
- Updated Infrastructure Diagram to reflect new additions
…ments

- Harden response header sanitization with BLOCKED_HEADERS blocklist
  and persona Server header injection on proxied responses
- Add age/SOPS encrypted config support in the config loader
- Add HTTP fingerprint filter for client identification in the pipeline
- Add response timing normalization to prevent side-channel analysis
- Add dynamic cloud provider IP range feeds (AWS, Azure, GCP)
- Add `infraguard test-request` CLI for dry-run filter validation
- Add multi-path upstream failover with per-upstream circuit breakers
- Enable HTTP/2 listener support via h2 protocol
- Add canary token injection (tracking pixel, honeypot link, hidden form)
  into decoy HTML responses
- Add decoy target rotation (random/round-robin) for drop actions
- Add burn detection watchdog monitoring vendor spike and multi-ASN probes
- Add operator audit log table and helpers in the tracking database
- Add dead man's switch with configurable TTL-based auto-expiry
- Add `infraguard report` CLI for HTML engagement report generation
- Fix config loader crash when env vars are unset (empty TLS blocks,
  empty-string domain keys)
Cloud-init (DO, AWS, Azure):
- Clone InfraGuard from repo URL, build Docker image via
  docker compose build, create runtime dirs, signal ready
- Replace docker_image variable with repo_url
  (default: https://github.com/Whispergate/InfraGuard.git)

Deploy CLI post-provisioning (6-step lifecycle):
- Wait for cloud-init bootstrap completion via SSH polling
- Generate config bundle with populated .env (auto-generated
  API token, randomized health path, Let's Encrypt, upstream)
- SCP config.yaml, C2 profile, and .env to /opt/infraguard/
- SSH to start docker compose services (proxy + dashboard)
- Health poll to confirm InfraGuard is running

Provider-specific SSH handling:
- DO: root user, fingerprint-based key lookup
- AWS: ubuntu user, key pair resource, sudo for docker
- Azure: operator user, admin_ssh_key block, sudo for docker

Additional fixes:
- Move terraform modules into infraguard/deploy/terraform/ so
  they are included in pip/pipx installs (fixes "No configuration
  files" error when installed outside the repo)
- Stage .tf files into work_dir before terraform init
- Fix DO tag validation (dots replaced with dashes)
- Fix DO SSH key 422 error (use fingerprint instead of resource)
- Fix config loader crash on unset env vars (empty TLS blocks,
  empty-string domain keys)
[0.3.1] OPSEC hardening, IaC auto-deploy, phishing support, and operational improvements
@Lavender-dll Lavender-dll merged commit a2dfa76 into main Apr 6, 2026
@Lavender-dll Lavender-dll deleted the dev branch April 6, 2026 17:08
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants