chainwall 2.2.3 → 2.2.4
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +5 -5
- package/package.json +1 -1
package/README.md
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
<div align="center">
|
|
2
2
|
|
|
3
|
-
<img src=".github/images/banner.
|
|
3
|
+
<img src="https://raw.githubusercontent.com/consulalialpric/chainwall/main/.github/images/banner.jpg" width="700" alt="CHAINWALL">
|
|
4
4
|
|
|
5
5
|
<br><br>
|
|
6
6
|
|
|
@@ -31,7 +31,7 @@ chainwall
|
|
|
31
31
|
That's it. Two commands. The interactive dashboard opens and walks you through everything — scan for secrets, audit your AI tools, monitor runtime behavior, and configure protection. No flags to memorize, no config files to write.
|
|
32
32
|
|
|
33
33
|
<p align="center">
|
|
34
|
-
<img src=".github/images/dashboard.png" width="680" alt="ChainWall Dashboard">
|
|
34
|
+
<img src="https://raw.githubusercontent.com/consulalialpric/chainwall/main/.github/images/dashboard.png" width="680" alt="ChainWall Dashboard">
|
|
35
35
|
</p>
|
|
36
36
|
|
|
37
37
|
> [!TIP]
|
|
@@ -78,7 +78,7 @@ ChainWall closes the gap. Scan what's exposed, see which tools can reach it, and
|
|
|
78
78
|
## See It in Action
|
|
79
79
|
|
|
80
80
|
<p align="center">
|
|
81
|
-
<img src=".github/images/demo.gif" width="680" alt="ChainWall TUI Demo">
|
|
81
|
+
<img src="https://raw.githubusercontent.com/consulalialpric/chainwall/main/.github/images/demo.gif" width="680" alt="ChainWall TUI Demo">
|
|
82
82
|
</p>
|
|
83
83
|
|
|
84
84
|
---
|
|
@@ -90,7 +90,7 @@ ChainWall closes the gap. Scan what's exposed, see which tools can reach it, and
|
|
|
90
90
|
ChainWall walks your filesystem and matches every file against 241 detection patterns — credentials, private keys, crypto seeds, PII, dangerous commands, supply chain attacks, and cryptojacking. Entropy validation filters out false positives so you only see real secrets. System-level scans target the specific locations where credentials actually live: `~/.aws`, `~/.ssh`, `~/.gnupg`, browser profiles, and more.
|
|
91
91
|
|
|
92
92
|
<p align="center">
|
|
93
|
-
<img src=".github/images/scan.png" width="640" alt="ChainWall scan results">
|
|
93
|
+
<img src="https://raw.githubusercontent.com/consulalialpric/chainwall/main/.github/images/scan.png" width="640" alt="ChainWall scan results">
|
|
94
94
|
</p>
|
|
95
95
|
|
|
96
96
|
### Audit
|
|
@@ -100,7 +100,7 @@ The auditor detects every AI tool on your machine — 18 tools across three acce
|
|
|
100
100
|
Sections like MCP Servers, VS Code Extensions, and Environment Variables show "None found." when your system is clean — that's the goal. If something is lurking, ChainWall will surface it.
|
|
101
101
|
|
|
102
102
|
<p align="center">
|
|
103
|
-
<img src=".github/images/audit.png" width="640" alt="ChainWall audit results">
|
|
103
|
+
<img src="https://raw.githubusercontent.com/consulalialpric/chainwall/main/.github/images/audit.png" width="640" alt="ChainWall audit results">
|
|
104
104
|
</p>
|
|
105
105
|
|
|
106
106
|
### Monitor
|