You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+4-20Lines changed: 4 additions & 20 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,27 +7,11 @@ C++20 defensive log analysis CLI for Linux authentication logs, with parser cove
7
7
8
8
It parses `auth.log` / `secure`-style syslog input and `journalctl --output=short-full`-style input, normalizes authentication evidence, applies configurable rule-based detections, and emits deterministic Markdown and JSON reports.
9
9
10
-
## Why this project exists
10
+
## Overview
11
11
12
-
Many small security tools can detect a handful of known log patterns. Fewer tools make their parsing limits visible.
12
+
LogLens is a defensive, public-safe repository for log parsing and detection engineering. It focuses on parser observability as well as detections: unsupported lines are surfaced as telemetry instead of being silently ignored.
13
13
14
-
LogLens is designed around three ideas:
15
-
16
-
- detection engineering over offensive functionality
17
-
- parser observability over silent failure
18
-
- repository discipline over throwaway scripts
19
-
20
-
The project reports suspicious login activity while also surfacing parser coverage, unknown-line buckets, CI status, and code scanning hygiene.
21
-
22
-
## Scope
23
-
24
-
LogLens is a defensive, public-safe repository.
25
-
It is intended for log parsing, detection experiments, and engineering practice.
26
-
It does not provide exploitation, persistence, credential attack automation, or live offensive capability.
27
-
28
-
---
29
-
30
-
LogLens is a defensive C++20 CLI that parses Linux authentication logs and produces concise Markdown and JSON reports for suspicious authentication activity. The project is intended for portfolio-grade detection engineering work, not offensive security or attack automation.
14
+
The project does not provide exploitation, persistence, credential attack automation, or live offensive capability.
31
15
32
16
## Repository Checks
33
17
@@ -36,7 +20,7 @@ LogLens includes two minimal GitHub Actions workflows:
36
20
-`CI` builds and tests the project on `ubuntu-latest` and `windows-latest`
37
21
-`CodeQL` runs GitHub code scanning for C/C++ on pushes, pull requests, and a weekly schedule
38
22
39
-
Both workflows are intended to stay stable enough to require on pull requests to `main`. The repository hardening note is in [`docs/repo-hardening.md`](./docs/repo-hardening.md).
23
+
Both workflows are intended to stay stable enough to require on pull requests to `main`. The repository hardening note is in [`docs/repo-hardening.md`](./docs/repo-hardening.md), and vulnerability reporting guidance is in [`SECURITY.md`](./SECURITY.md).
0 commit comments