Builds SHA-256 hash chains for tamper-evident append-only logs from syslog, JSON, or text files. Verifies integrity, pinpoints tampering, and anchors checkpoints to timestamp services.
npx claudepluginhub killvxk/cybersecurity-skills-zhThis skill uses the workspace's default tool permissions.
1. 安装依赖:`pip install requests`
Builds append-only log integrity chain using SHA-256 hash chaining for tamper detection. Supports ingestion from syslog/JSON/text, chain verification, pinpoint tampering identification, and external timestamp anchoring.
Implements append-only log integrity chain with SHA-256 hash chaining for tamper detection. Supports ingestion from syslog/JSON/text, verification, pinpoint tamper ID, and external timestamp anchoring.
Implements tamper-evident audit logging, SIEM integration, vulnerability scanning, and compliance reporting for Python, Go, TypeScript apps.
Share bugs, ideas, or general feedback.
pip install requestspython scripts/agent.py --log-file /var/log/syslog --chain-file log_chain.json --verify --output integrity_report.json
{"index": 42, "timestamp": "2024-01-15T10:30:00Z", "content_hash": "a1b2c3...",
"prev_hash": "d4e5f6...", "chain_hash": "SHA256(prev_hash + timestamp + content_hash)"}
若第 42 条条目被修改,chain_hash[42] 将不匹配 SHA256(chain_hash[41] + ...),从第 42 条起的所有条目都将被标记为无效。