aiwaf 0.1.9.1.6__py3-none-any.whl → 0.1.9.1.8__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of aiwaf might be problematic. Click here for more details.

aiwaf/__init__.py CHANGED
@@ -1,6 +1,6 @@
1
1
  default_app_config = "aiwaf.apps.AiwafConfig"
2
2
 
3
- __version__ = "0.1.9.1.6"
3
+ __version__ = "0.1.9.1.8"
4
4
 
5
5
  # Note: Middleware classes are available from aiwaf.middleware
6
6
  # Import them only when needed to avoid circular imports during Django app loading
@@ -1,5 +1,6 @@
1
1
  from django.core.management.base import BaseCommand
2
2
  from aiwaf.storage import get_blacklist_store, get_exemption_store
3
+ import sys
3
4
 
4
5
  class Command(BaseCommand):
5
6
  help = 'Reset AI-WAF by clearing all blacklist and exemption (whitelist) entries'
@@ -26,12 +27,29 @@ class Command(BaseCommand):
26
27
  exemptions_only = options['exemptions_only']
27
28
  confirm = options['confirm']
28
29
 
29
- blacklist_store = get_blacklist_store()
30
- exemption_store = get_exemption_store()
30
+ try:
31
+ blacklist_store = get_blacklist_store()
32
+ exemption_store = get_exemption_store()
33
+ except Exception as e:
34
+ self.stdout.write(self.style.ERROR(f'Error initializing stores: {e}'))
35
+ return
31
36
 
32
- # Count current entries
33
- blacklist_count = len(blacklist_store.get_all())
34
- exemption_count = len(exemption_store.get_all())
37
+ # Count current entries safely
38
+ try:
39
+ blacklist_entries = blacklist_store.get_all()
40
+ blacklist_count = len(blacklist_entries)
41
+ except Exception as e:
42
+ self.stdout.write(self.style.WARNING(f'Warning: Could not count blacklist entries: {e}'))
43
+ blacklist_count = 0
44
+ blacklist_entries = []
45
+
46
+ try:
47
+ exemption_entries = exemption_store.get_all()
48
+ exemption_count = len(exemption_entries)
49
+ except Exception as e:
50
+ self.stdout.write(self.style.WARNING(f'Warning: Could not count exemption entries: {e}'))
51
+ exemption_count = 0
52
+ exemption_entries = []
35
53
 
36
54
  if blacklist_only and exemptions_only:
37
55
  self.stdout.write(self.style.ERROR('Cannot use both --blacklist-only and --exemptions-only flags'))
@@ -55,29 +73,47 @@ class Command(BaseCommand):
55
73
  self.stdout.write(f"AI-WAF Reset: {action}")
56
74
 
57
75
  if not confirm:
58
- response = input("Are you sure you want to proceed? [y/N]: ")
59
- if response.lower() not in ['y', 'yes']:
60
- self.stdout.write(self.style.WARNING('Operation cancelled'))
76
+ try:
77
+ response = input("Are you sure you want to proceed? [y/N]: ")
78
+ if response.lower() not in ['y', 'yes']:
79
+ self.stdout.write(self.style.WARNING('Operation cancelled'))
80
+ return
81
+ except (EOFError, KeyboardInterrupt):
82
+ self.stdout.write(self.style.WARNING('\nOperation cancelled'))
61
83
  return
62
84
 
63
85
  # Perform the reset
64
- deleted_counts = {'blacklist': 0, 'exemptions': 0}
86
+ deleted_counts = {'blacklist': 0, 'exemptions': 0, 'errors': []}
65
87
 
66
88
  if clear_blacklist:
67
89
  # Clear blacklist entries
68
- blacklist_entries = blacklist_store.get_all()
69
- for entry in blacklist_entries:
70
- blacklist_store.remove_ip(entry['ip_address'])
71
- deleted_counts['blacklist'] = len(blacklist_entries)
90
+ try:
91
+ for entry in blacklist_entries:
92
+ try:
93
+ blacklist_store.remove_ip(entry['ip_address'])
94
+ deleted_counts['blacklist'] += 1
95
+ except Exception as e:
96
+ deleted_counts['errors'].append(f"Error removing blacklist IP {entry.get('ip_address', 'unknown')}: {e}")
97
+ except Exception as e:
98
+ deleted_counts['errors'].append(f"Error clearing blacklist: {e}")
72
99
 
73
100
  if clear_exemptions:
74
101
  # Clear exemption entries
75
- exemption_entries = exemption_store.get_all()
76
- for entry in exemption_entries:
77
- exemption_store.remove_ip(entry['ip_address'])
78
- deleted_counts['exemptions'] = len(exemption_entries)
102
+ try:
103
+ for entry in exemption_entries:
104
+ try:
105
+ exemption_store.remove_ip(entry['ip_address'])
106
+ deleted_counts['exemptions'] += 1
107
+ except Exception as e:
108
+ deleted_counts['errors'].append(f"Error removing exemption IP {entry.get('ip_address', 'unknown')}: {e}")
109
+ except Exception as e:
110
+ deleted_counts['errors'].append(f"Error clearing exemptions: {e}")
79
111
 
80
112
  # Report results
113
+ if deleted_counts['errors']:
114
+ for error in deleted_counts['errors']:
115
+ self.stdout.write(self.style.WARNING(f"⚠️ {error}"))
116
+
81
117
  if clear_blacklist and clear_exemptions:
82
118
  self.stdout.write(
83
119
  self.style.SUCCESS(
@@ -93,3 +129,8 @@ class Command(BaseCommand):
93
129
  self.stdout.write(
94
130
  self.style.SUCCESS(f"✅ Exemptions cleared: Deleted {deleted_counts['exemptions']} entries")
95
131
  )
132
+
133
+ if deleted_counts['errors']:
134
+ self.stdout.write(
135
+ self.style.WARNING(f"⚠️ Completed with {len(deleted_counts['errors'])} errors (see above)")
136
+ )
@@ -0,0 +1,66 @@
1
+ from django.core.management.base import BaseCommand
2
+ from aiwaf.storage import get_blacklist_store
3
+
4
+ class Command(BaseCommand):
5
+ help = 'Clear all blacklist entries (fast method)'
6
+
7
+ def add_arguments(self, parser):
8
+ parser.add_argument(
9
+ '--confirm',
10
+ action='store_true',
11
+ help='Skip confirmation prompt'
12
+ )
13
+
14
+ def handle(self, *args, **options):
15
+ confirm = options['confirm']
16
+
17
+ try:
18
+ blacklist_store = get_blacklist_store()
19
+ except Exception as e:
20
+ self.stdout.write(self.style.ERROR(f'Error initializing blacklist store: {e}'))
21
+ return
22
+
23
+ # Count current entries safely
24
+ try:
25
+ blacklist_entries = blacklist_store.get_all()
26
+ blacklist_count = len(blacklist_entries)
27
+ except Exception as e:
28
+ self.stdout.write(self.style.WARNING(f'Warning: Could not count blacklist entries: {e}'))
29
+ # Try to get count using clear_all method which returns count
30
+ blacklist_count = "unknown number of"
31
+
32
+ # Show what will be cleared
33
+ self.stdout.write(f"Clear Blacklist: Will remove {blacklist_count} blacklist entries")
34
+
35
+ if not confirm:
36
+ try:
37
+ response = input("Are you sure you want to proceed? [y/N]: ")
38
+ if response.lower() not in ['y', 'yes']:
39
+ self.stdout.write(self.style.WARNING('Operation cancelled'))
40
+ return
41
+ except (EOFError, KeyboardInterrupt):
42
+ self.stdout.write(self.style.WARNING('\nOperation cancelled'))
43
+ return
44
+
45
+ # Perform the reset using clear_all for better performance
46
+ try:
47
+ if hasattr(blacklist_store, 'clear_all'):
48
+ deleted_count = blacklist_store.clear_all()
49
+ self.stdout.write(
50
+ self.style.SUCCESS(f"✅ Blacklist cleared: Deleted {deleted_count} entries")
51
+ )
52
+ else:
53
+ # Fallback to individual deletion
54
+ deleted_count = 0
55
+ for entry in blacklist_entries:
56
+ try:
57
+ blacklist_store.remove_ip(entry['ip_address'])
58
+ deleted_count += 1
59
+ except Exception as e:
60
+ self.stdout.write(self.style.WARNING(f"⚠️ Error removing IP {entry.get('ip_address', 'unknown')}: {e}"))
61
+
62
+ self.stdout.write(
63
+ self.style.SUCCESS(f"✅ Blacklist cleared: Deleted {deleted_count} entries")
64
+ )
65
+ except Exception as e:
66
+ self.stdout.write(self.style.ERROR(f'Error clearing blacklist: {e}'))
aiwaf/middleware.py CHANGED
@@ -17,7 +17,7 @@ from django.urls import get_resolver
17
17
  from .trainer import STATIC_KW, STATUS_IDX, path_exists_in_django
18
18
  from .blacklist_manager import BlacklistManager
19
19
  from .models import IPExemption
20
- from .utils import is_exempt, get_ip, is_ip_exempted
20
+ from .utils import is_exempt, get_ip, is_ip_exempted, is_exempt_path
21
21
  from .storage import get_keyword_store
22
22
 
23
23
  MODEL_PATH = getattr(
@@ -191,10 +191,12 @@ class AIAnomalyMiddleware(MiddlewareMixin):
191
191
  key = f"aiwaf:{ip}"
192
192
  data = cache.get(key, [])
193
193
  path_len = len(request.path)
194
- if not path_exists_in_django(request.path) and not is_exempt(request):
194
+
195
+ # Use the same scoring logic as trainer.py
196
+ known_path = path_exists_in_django(request.path)
197
+ kw_hits = 0
198
+ if not known_path and not is_exempt_path(request.path):
195
199
  kw_hits = sum(1 for kw in STATIC_KW if kw in request.path.lower())
196
- else:
197
- kw_hits = 0
198
200
 
199
201
  resp_time = now - getattr(request, "_start_time", now)
200
202
  status_code = str(response.status_code)
@@ -206,11 +208,60 @@ class AIAnomalyMiddleware(MiddlewareMixin):
206
208
 
207
209
  # Only use AI model if it's available
208
210
  if self.model is not None and self.model.predict(X)[0] == -1:
209
- # BlacklistManager.block() now checks exemptions internally
210
- BlacklistManager.block(ip, "AI anomaly")
211
- # Check if actually blocked (exempted IPs won't be blocked)
212
- if BlacklistManager.is_blocked(ip):
213
- return JsonResponse({"error": "blocked"}, status=403)
211
+ # AI detected anomaly - but analyze patterns before blocking (like trainer.py)
212
+
213
+ # Get recent behavior data for this IP to make intelligent blocking decision
214
+ recent_data = [d for d in data if now - d[0] <= 300] # Last 5 minutes
215
+
216
+ if recent_data:
217
+ # Calculate behavior metrics similar to trainer.py
218
+ recent_kw_hits = []
219
+ recent_404s = 0
220
+ recent_burst_counts = []
221
+
222
+ for entry_time, entry_path, entry_status, entry_resp_time in recent_data:
223
+ # Calculate keyword hits for this entry
224
+ entry_known_path = path_exists_in_django(entry_path)
225
+ entry_kw_hits = 0
226
+ if not entry_known_path and not is_exempt_path(entry_path):
227
+ entry_kw_hits = sum(1 for kw in STATIC_KW if kw in entry_path.lower())
228
+ recent_kw_hits.append(entry_kw_hits)
229
+
230
+ # Count 404s
231
+ if entry_status == 404:
232
+ recent_404s += 1
233
+
234
+ # Calculate burst for this entry (requests within 10 seconds)
235
+ entry_burst = sum(1 for (t, _, _, _) in recent_data if abs(entry_time - t) <= 10)
236
+ recent_burst_counts.append(entry_burst)
237
+
238
+ # Calculate averages and maximums
239
+ avg_kw_hits = sum(recent_kw_hits) / len(recent_kw_hits) if recent_kw_hits else 0
240
+ max_404s = recent_404s
241
+ avg_burst = sum(recent_burst_counts) / len(recent_burst_counts) if recent_burst_counts else 0
242
+ total_requests = len(recent_data)
243
+
244
+ # Don't block if it looks like legitimate behavior (same thresholds as trainer.py):
245
+ if (
246
+ avg_kw_hits < 2 and # Not hitting many malicious keywords
247
+ max_404s < 10 and # Not excessive 404s
248
+ avg_burst < 15 and # Not excessive burst activity
249
+ total_requests < 100 # Not excessive total requests
250
+ ):
251
+ # Anomalous but looks legitimate - don't block
252
+ pass
253
+ else:
254
+ # Block if it shows clear signs of malicious behavior
255
+ BlacklistManager.block(ip, f"AI anomaly + suspicious patterns (kw:{avg_kw_hits:.1f}, 404s:{max_404s}, burst:{avg_burst:.1f})")
256
+ # Check if actually blocked (exempted IPs won't be blocked)
257
+ if BlacklistManager.is_blocked(ip):
258
+ return JsonResponse({"error": "blocked"}, status=403)
259
+ else:
260
+ # No recent data to analyze - be more conservative, only block on very suspicious current request
261
+ if kw_hits >= 2 or status_idx == STATUS_IDX.index("404"):
262
+ BlacklistManager.block(ip, "AI anomaly + immediate suspicious behavior")
263
+ if BlacklistManager.is_blocked(ip):
264
+ return JsonResponse({"error": "blocked"}, status=403)
214
265
 
215
266
  data.append((now, request.path, response.status_code, resp_time))
216
267
  data = [d for d in data if now - d[0] < self.WINDOW]
aiwaf/storage.py CHANGED
@@ -132,6 +132,31 @@ class ModelBlacklistStore:
132
132
  except Exception:
133
133
  return []
134
134
 
135
+ @staticmethod
136
+ def get_all():
137
+ """Get all blacklist entries as dictionaries"""
138
+ _import_models()
139
+ if BlacklistEntry is None:
140
+ return []
141
+ try:
142
+ return list(BlacklistEntry.objects.values('ip_address', 'reason', 'created_at'))
143
+ except Exception:
144
+ return []
145
+
146
+ @staticmethod
147
+ def clear_all():
148
+ """Clear all blacklist entries"""
149
+ _import_models()
150
+ if BlacklistEntry is None:
151
+ return 0
152
+ try:
153
+ count = BlacklistEntry.objects.count()
154
+ BlacklistEntry.objects.all().delete()
155
+ return count
156
+ except Exception as e:
157
+ print(f"Error clearing all blacklist entries: {e}")
158
+ return 0
159
+
135
160
  class ModelExemptionStore:
136
161
  @staticmethod
137
162
  def is_exempted(ip):
@@ -192,6 +217,20 @@ class ModelExemptionStore:
192
217
  except Exception:
193
218
  return []
194
219
 
220
+ @staticmethod
221
+ def clear_all():
222
+ """Clear all exemption entries"""
223
+ _import_models()
224
+ if IPExemption is None:
225
+ return 0
226
+ try:
227
+ count = IPExemption.objects.count()
228
+ IPExemption.objects.all().delete()
229
+ return count
230
+ except Exception as e:
231
+ print(f"Error clearing all exemption entries: {e}")
232
+ return 0
233
+
195
234
  class ModelKeywordStore:
196
235
  @staticmethod
197
236
  def add_keyword(keyword, count=1):
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.4
2
2
  Name: aiwaf
3
- Version: 0.1.9.1.6
3
+ Version: 0.1.9.1.8
4
4
  Summary: AI-powered Web Application Firewall
5
5
  Home-page: https://github.com/aayushgauba/aiwaf
6
6
  Author: Aayush Gauba
@@ -1,11 +1,11 @@
1
- aiwaf/__init__.py,sha256=a8AUvwMuCDX-PCu3FtSH2GKroDDvM1zG6q6KbYyuo6k,220
1
+ aiwaf/__init__.py,sha256=6Skp_JeKxRpqn9klnS2qAtRKuXdwAMCdNd6OVq8AKyk,220
2
2
  aiwaf/apps.py,sha256=nCez-Ptlv2kaEk5HenA8b1pATz1VfhrHP1344gwcY1A,142
3
3
  aiwaf/blacklist_manager.py,sha256=LYCeKFB-7e_C6Bg2WeFJWFIIQlrfRMPuGp30ivrnhQY,1196
4
4
  aiwaf/decorators.py,sha256=IUKOdM_gdroffImRZep1g1wT6gNqD10zGwcp28hsJCs,825
5
- aiwaf/middleware.py,sha256=4Ox0pUdB7rMT1Sw5XHO6-udQrfqyF9VGdkkkgLioRJ0,12470
5
+ aiwaf/middleware.py,sha256=EMAQA_Gnz0jv4nevlognT921ZeBEro13J_DSv_mQ3Dw,15482
6
6
  aiwaf/middleware_logger.py,sha256=LWZVDAnjh6CGESirA8eMbhGgJKB7lVDGRQqVroH95Lo,4742
7
7
  aiwaf/models.py,sha256=vQxgY19BDVMjoO903UNrTZC1pNoLltMU6wbyWPoAEns,2719
8
- aiwaf/storage.py,sha256=HYSnis7S8ETsos_NxWkd05OoiHXMhIWQy8FcFTqO4vk,8408
8
+ aiwaf/storage.py,sha256=UlCk-j0xtiEPlC7RFHGz811Dh-GP-Ce5ZSuKQp_GY2k,9565
9
9
  aiwaf/trainer.py,sha256=1RPjWVOdGQ3qSrjFopw8HKu7THVTMvF4nNYouij6i_A,10685
10
10
  aiwaf/utils.py,sha256=BJk5vJCYdGPl_4QQiknjhCbkzv5HZCXgFcBJDMJpHok,3390
11
11
  aiwaf/management/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
@@ -14,8 +14,9 @@ aiwaf/management/commands/add_exemption.py,sha256=U_ByfJw1EstAZ8DaSoRb97IGwYzXs0
14
14
  aiwaf/management/commands/add_ipexemption.py,sha256=sSf3d9hGK9RqqlBYkCrnrd8KZWGT-derSpoWnEY4H60,952
15
15
  aiwaf/management/commands/aiwaf_diagnose.py,sha256=nXFRhq66N4QC3e4scYJ2sUngJce-0yDxtBO3R2BllRM,6134
16
16
  aiwaf/management/commands/aiwaf_logging.py,sha256=FCIqULn2tii2vD9VxL7vk3PV4k4vr7kaA00KyaCExYY,7692
17
- aiwaf/management/commands/aiwaf_reset.py,sha256=0FIBqpZS8xgFFvAKJ-0zAC_-QNQwRkOHpXb8N-OdFr8,3740
17
+ aiwaf/management/commands/aiwaf_reset.py,sha256=wG7EcdPqkxmjF2ivQOmZ7swuvHVJ_OVLgOEijGLvmFs,5586
18
18
  aiwaf/management/commands/check_dependencies.py,sha256=GOZl00pDwW2cJjDvIaCeB3yWxmeYcJDRTIpmOTLvy2c,37204
19
+ aiwaf/management/commands/clear_blacklist.py,sha256=Tisedg0EVlc3E01mA3hBZQorwMzc5j1cns-oYshja0g,2770
19
20
  aiwaf/management/commands/clear_cache.py,sha256=cdnuTgxkhKLqT_6k6yTcEBlREovNRQxAE51ceXlGYMA,647
20
21
  aiwaf/management/commands/debug_csv.py,sha256=Lddqp37mIn0zdvHf4GbuNTWYyJ5h8bumDcGmFSAioi0,6801
21
22
  aiwaf/management/commands/detect_and_train.py,sha256=-o-LZ7QZ5GeJPCekryox1DGXKMmFEkwwrcDsiM166K0,269
@@ -27,8 +28,8 @@ aiwaf/management/commands/test_exemption_fix.py,sha256=ngyGaHUCmQQ6y--6j4q1viZJt
27
28
  aiwaf/resources/model.pkl,sha256=5t6h9BX8yoh2xct85MXOO60jdlWyg1APskUOW0jZE1Y,1288265
28
29
  aiwaf/templatetags/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
29
30
  aiwaf/templatetags/aiwaf_tags.py,sha256=XXfb7Tl4DjU3Sc40GbqdaqOEtKTUKELBEk58u83wBNw,357
30
- aiwaf-0.1.9.1.6.dist-info/licenses/LICENSE,sha256=Ir8PX4dxgAcdB0wqNPIkw84fzIIRKE75NoUil9RX0QU,1069
31
- aiwaf-0.1.9.1.6.dist-info/METADATA,sha256=d9OfrFnIC8H5G1l8_hASPjqdF4Fe3nRk9I6YEBN5RnI,22145
32
- aiwaf-0.1.9.1.6.dist-info/WHEEL,sha256=_zCd3N1l69ArxyTb8rzEoP9TpbYXkqRFSNOD5OuxnTs,91
33
- aiwaf-0.1.9.1.6.dist-info/top_level.txt,sha256=kU6EyjobT6UPCxuWpI_BvcHDG0I2tMgKaPlWzVxe2xI,6
34
- aiwaf-0.1.9.1.6.dist-info/RECORD,,
31
+ aiwaf-0.1.9.1.8.dist-info/licenses/LICENSE,sha256=Ir8PX4dxgAcdB0wqNPIkw84fzIIRKE75NoUil9RX0QU,1069
32
+ aiwaf-0.1.9.1.8.dist-info/METADATA,sha256=MaHb3s4la_-tR6UZ5ht5-jbdvu6PO8mZavNYktvGVMM,22145
33
+ aiwaf-0.1.9.1.8.dist-info/WHEEL,sha256=_zCd3N1l69ArxyTb8rzEoP9TpbYXkqRFSNOD5OuxnTs,91
34
+ aiwaf-0.1.9.1.8.dist-info/top_level.txt,sha256=kU6EyjobT6UPCxuWpI_BvcHDG0I2tMgKaPlWzVxe2xI,6
35
+ aiwaf-0.1.9.1.8.dist-info/RECORD,,