Expand description
Shadow Mirroring Module
Provides zero-latency traffic mirroring for suspicious actors to honeypot endpoints.
§Architecture
Request → Detection → Risk Score → Decision Point
│
├── risk < min: Pass through (no mirror)
├── min ≤ risk < max: SHADOW MIRROR + Pass
└── risk ≥ max: Block (no mirror needed)
│
▼
tokio::spawn() ──► Async HTTP POST to Honeypot
(fire & forget)§Key Features
- Zero production latency: Fire-and-forget async mirroring
- Per-IP rate limiting: Prevents honeypot flooding
- Configurable thresholds: Risk score window for mirroring
- HMAC signing: Optional payload authentication
- Sampling: Configurable percentage of eligible traffic
Structs§
- Mirror
Payload - JSON payload sent to honeypot endpoints.
- Rate
Limiter - Per-IP rate limiter using sliding window algorithm.
- Rate
Limiter Stats - Statistics from the rate limiter.
- Shadow
Client Stats - Shadow mirror client statistics.
- Shadow
Mirror Client - Async HTTP client for delivering shadow mirror payloads to honeypots.
- Shadow
Mirror Config - Configuration for shadow mirroring suspicious traffic to honeypots.
- Shadow
Mirror Manager - Manager for shadow mirroring operations.
- Shadow
Mirror Stats - Statistics about shadow mirroring operations.
Enums§
- Shadow
Config Error - Errors from shadow mirror configuration validation.
- Shadow
Mirror Error - Errors that can occur during shadow mirror operations.
Functions§
- is_
sensitive_ header - Checks if a header name is considered sensitive.