Status: โ LIVE & PRODUKTIV | Version: 3.5.0 | Letzte Aktualisierung: 02.12.2025
ShadowOps ist ein vollstรคndig autonomer Security Guardian mit KI-gesteuerter Auto-Remediation, intelligenter Request-Queue, persistentem Lernsystem und Multi-Projekt-Management, der Sicherheitsbedrohungen nicht nur erkennt und analysiert, sondern eigenstรคndig behebt und aus Erfahrungen lernt.
๐ Vollstรคndige v3.1 Dokumentation: ACTIVE_SECURITY_GUARDIAN.md ๐ Dokumentations-รbersicht: DOCS_OVERVIEW.md ๐ง KI-Lernsystem Dokumentation: AI_LEARNING_MULTI_PROJECT.md ๐ง API Dokumentation: docs/API.md ๐ Setup Guide: docs/SETUP_GUIDE.md
- โ
Intelligentes Request-Queuing
- Priority-basierte AsyncIO Queue (verhindert Ollama รberlastung)
- 4 Prioritรคtsstufen: CRITICAL > HIGH > NORMAL > LOW
- Security-First: Security-Events erhalten IMMER Vorrang
- Single Worker Pattern (max 1 Ollama Request gleichzeitig)
- State Persistence & Performance-Statistiken
- โ
Live Dashboard in Discord
- Channel:
๐-ollama-queue - Updates alle 30 Sekunden
- Zeigt: Aktueller Request, Queue Size, Statistiken, Priority-Verteilung
- Worker-Status (Running/Stopped)
- Channel:
- โ
Admin Commands
/queue-status- Detaillierter Status/queue-stats- Performance-Statistiken/queue-clear- Queue leeren (ADMIN)/queue-pause//queue-resume- Worker steuern (ADMIN)
- โ
Auto-Resolve fรผr Service-Recovery
- Incidents werden automatisch geschlossen wenn Service wieder online
- Berechnet Ausfallzeit (Xh Ym)
- Thread-Update: "โ GELรST von Auto-Resolve: Dienst wieder erreichbar..."
- Komplette Timeline in Incident-Thread
- โ
Deutsche Incident-Meldungen
- Alle Embeds und Threads auf Deutsch
- "Vorfall", "Schweregrad", "Betroffene Projekte", etc.
- Konsistente รbersetzung im gesamten System
Vorteile:
- ๐ซ Keine Ollama-รberlastung mehr (450% CPU, 5.6GB RAM โ gelรถst)
- ๐ Security-First Prinzip garantiert
- ๐ Volle Transparenz durch Dashboard
- ๐ฉ๐ช Deutschsprachige Benutzeroberflรคche
- โ
Vollstรคndige KI-Trainings-Pipeline: Kontinuierliches Lernen fรผr bessere Patch Notes
- CHANGELOG.md-Parsing fรผr vollstรคndigen Kontext
- Automatische Qualitรคtsbewertung (0-100 Skala)
- Few-Shot-Learning mit Top-10 Beispielen
- Trainingsdaten-Sammlung (โฅ80 Score)
- โ
Discord Feedback-Sammlung
- Automatische Reaktions-Buttons (๐ โค๏ธ ๐ฅ ๐ ๐ โ)
- Benutzer-Feedback trainiert die KI
- Funktioniert fรผr ALLE Projekte automatisch
- โ
A/B Testing System
- 3 Prompt-Varianten mit Performance-Tracking
- Gewichtete Auswahl basierend auf Erfolg
- Kombinierte Bewertung (70% Qualitรคt + 30% Feedback)
- โ
Auto-Tuning Engine
- Automatische Performance-Analyse
- Verbesserungsvorschlรคge
- Automatische Varianten-Erstellung
- โ
Fine-Tuning Export
- Ollama-Format (JSONL) fรผr llama3.1
- LoRA-Format (Alpaca-Style)
- Auto-generiertes Fine-Tuning-Script
- โ
Admin-Befehle
/ai-stats- Trainings-Statistiken/ai-variants- Varianten-รbersicht/ai-tune- Tuning-Vorschlรคge/ai-export-finetune- Export fรผr Training
- โ
Multi-Projekt-Unterstรผtzung
- Gemeinsamer Lern-Pool (alle profitieren voneinander)
- Zero-Config (automatisch fรผr
use_ai: true) - Projekt-รผbergreifendes Lernen
- โ
Intelligentes RAM-Management (3-Stufen)
- Automatische Prozess-Bereinigung (unnรถtige Prozesse beenden)
- Ollama-Neustart zur RAM-Freigabe
- System-Cache-Flush als Fallback
- Bis zu 3 Retry-Versuche mit gleichem Modell
- Schรผtzt kritische Services (PostgreSQL, Redis, Nginx, etc.)
- โ
HMAC-SHA256 Signature Verification: Sichere GuildScout โ ShadowOps Kommunikation
- Schรผtzt vor gefรคlschten/gespooften Alerts
- Validiert Webhook-Authentizitรคt mit Shared Secret
- Constant-time Signatur-Vergleich verhindert Timing-Attacks
- Konfigurierbar per Projekt:
webhook_secretin Config
- โ
Automatische Request-Validierung
- Validiert
X-Webhook-SignatureHeader Format - Lehnt ungรผltige Signaturen mit HTTP 403 ab
- Abwรคrtskompatibel (Legacy-Modus ohne Secret)
- Detailliertes Security-Logging fรผr Audits
- Validiert
- โ
Erweiterte GuildScout Integration
- Unterstรผtzt alle neuen GuildScout v2.3.0 Alerts:
- Health Monitoring Alerts
- Performance Profiling Events
- Weekly Report Summaries
- Database Monitoring Warnings
- Unterstรผtzt alle neuen GuildScout v2.3.0 Alerts:
Konfiguration:
projects:
guildscout:
webhook_secret: guildscout_shadowops_secure_key_2024
# Muss identisch mit GuildScout Config sein!Security Best Practices:
- Verwende starke, zufรคllige Secrets (min. 32 Zeichen)
- Rotiere Secrets regelmรครig (alle 90 Tage)
- Verwende HTTPS fรผr Produktions-Webhooks
- รberwache abgelehnte Requests (403 Errors)
- โ Automatic Channel Setup: Bot auto-creates monitoring channels on customer servers
- โ External Notifications: Send Git updates and status alerts to customer Discord servers
- โ AI-Generated Patch Notes: Professional, user-friendly updates with Ollama llama3.1
- โ Dual-Channel System: Technical logs (internal) + friendly updates (customers)
- โ Per-Project Configuration: Configurable language (DE/EN) and notification types
- โ Message Splitting: Automatic handling of Discord's 4096 character limit
- โ Centralized Monitoring: ShadowOps handles all notifications (Option B)
- โ
Manual Setup Command:
/setup-customer-serverfor existing guilds
- โ CrowdSec Integration Fixed: Corrected JSON parsing, now shows "๐ข Aktiv"
- โ Fail2ban Integration Fixed: Resolved systemd restrictions, now shows "๐ข Aktiv"
- โ GitHub Webhook Logging: Fixed logger connection for full webhook visibility
- โ Firewall Configuration: Port 9090 opened with HMAC security
- โ SQL Knowledge Base: Persistent storage for fixes, strategies, and success rates
- โ Git History Analysis: Learns from past commits to understand codebase evolution
- โ Code Structure Analyzer: Deep understanding of project architecture
- โ Log-Based Learning: Analyzes security logs to improve threat detection
- โ Success Rate Tracking: Historical performance metrics guide strategy selection
- โ Best Strategy Recommendations: AI suggests fixes based on proven success
- โ Adaptive Retry Logic: Failed fixes inform better subsequent attempts
- โ GitHub Webhook Integration: Auto-deploy on push/PR merge events
- โ Automated Patch-Notes: Detaillierte Change-Notifications bei Git-Push fรผr interne und Kunden-Channels.
- โ Real-Time Health Monitoring: Continuous uptime tracking for all projects
- โ Automated Deployment: Complete CI/CD pipeline with safety checks
- โ Incident Management: Auto-detection, tracking, and Discord threads
- โ Customer Notifications: Professional, user-friendly status updates
- โ
Project Dashboard:
/projekt-statusand/alle-projektecommands - โ Automatic Rollback: Failed deployments trigger instant restoration
- โ 150+ Comprehensive Tests: Full coverage for all critical systems
- โ Unit Tests: Config, AI Service, Orchestrator, Knowledge Base, Event Watcher
- โ Integration Tests: End-to-end learning workflows
- โ AI Learning Documentation: Tests demonstrate how AI learns patterns
- โ pytest Configuration: Professional test infrastructure
- โ Test Fixtures: 20+ reusable fixtures for consistent testing
- โ Echte Fix-Execution: NPM audit fix, Docker rebuilds, Firewall-Updates, File Restoration
- โ Automatische Backups: Vor JEDER รnderung mit 7-Tage Retention & Rollback
- โ Impact-Analyse: Projekt-bewusste Entscheidungen (ShadowOps, GuildScout, Nexus, Sicherheitstool)
- โ Service Management: Graceful Start/Stop mit Health Checks & Dependency-Ordering
- โ Koordinierte Remediation: Multi-Event Batching mit single approval flow
- โ Safety First: Dry-Run Mode, DO-NOT-TOUCH Validation, Circuit Breaker, Command Validation
- โ Live Discord Updates: Echtzeit-Feedback wรคhrend kompletter Execution (Backup โ Fix โ Verify โ Restart)
- Hybrid AI System: Ollama (local llama3.1) โ Claude โ OpenAI (fallback chain)
- RAG Context: Projekt-Wissen + DO-NOT-TOUCH Regeln + Infrastructure Knowledge + Code Structure
- SQL Knowledge Base: Persistent learning across sessions
- Event History: Remembers ALL previous fix attempts with outcomes
- Confidence-Based: <85% confidence โ automatisch blockiert
- Batch-Processing: Mehrere Events โ 1 koordinierter Plan
- Adaptive Strategies: AI learns from failures and improves over time
- Git History Integration: Analyzes commit patterns for better context
1. ๐จ Security Event erkannt
โโ> Event Watcher โ Orchestrator (10s Batch-Fenster)
2. ๐ง AI Query Knowledge Base
โโ Check previous fixes for similar events
โโ Load best strategies based on success rate
โโ Analyze code structure and git history
3. ๐ค KI-Analyse (ALLE Events zusammen)
โโ Hybrid AI mit RAG Context + KB + Code Analysis
โโ Koordinierter Multi-Phasen Plan
โโ Impact-Analyse (Projekte, Downtime, Risks)
4. โ Single Approval Request
โโ Kompletter Plan mit allen Phasen
โโ Betroffene Projekte + Downtime-Schรคtzung
โโ Historical success rate (if applicable)
โโ Rollback-Strategie
5. ๐ง Autonome Execution
โโ Phase 0: Backups erstellen
โโ Phase 1-N: Fixes ausfรผhren (npm audit, Docker rebuild, etc.)
โโ Verification: Re-Scans prรผfen Erfolg
โโ Bei Fehler: Automatischer Rollback!
โโ Record result to Knowledge Base
6. โ
Completion & Learning
โโ Discord: Status + Results + Stats
โโ Save fix outcome to SQL KB
โโ Update success rates
โโ Improve future strategies
- Fail2ban - IP-Bans bei Brute-Force-Angriffen
- CrowdSec - KI-basierte Bedrohungserkennung
- AIDE - File Integrity Monitoring
- Docker Security Scans - Container-Schwachstellen (Trivy)
- Project Health Checks - Real-time monitoring for all services
- Incident Detection - Automatic incident creation and tracking
- GitHub Events - Detaillierte Patch-Notes fรผr Push, PR und Release Events
- Deployment Status - Real-time deployment progress
/status- Gesamt-Sicherheitsstatus/scan- Manuellen Docker-Scan triggern/threats- Letzte erkannte Bedrohungen/bans- Aktuell gebannte IPs (Fail2ban + CrowdSec)/aide- AIDE Integrity Check Status
/remediation-stats- Auto-Remediation Statistiken/stop-all-fixes- ๐ EMERGENCY: Stoppt alle laufenden Fixes/set-approval-mode [mode]- รndere Approval Mode (paranoid/auto/dry-run)
/get-ai-stats- AI-Provider Status und Fallback-Chain/reload-context- Lade Project-Context neu
/projekt-status [name]- Status fรผr spezifisches Projekt (Uptime, Response Time, Health)/alle-projekte- รbersicht aller รผberwachten Projekte
- Rich Embeds - Farbcodierte Alerts (๐ด CRITICAL, ๐ HIGH, ๐ข OK)
- Multi-Channel Support - Kategorisierte Channels (Security, AI Learning, Deployments, etc.)
- Project Tagging - Filtere Alerts nach Projekt
- Role Permissions - Admin-only Commands
- Auto-Reconnect - Robust gegen Netzwerk-Probleme
- Incident Threads - Automatische Discord-Threads pro Incident
- Real-Time Dashboards - Live project status updates
- Python 3.9+
- Discord Bot Token (siehe Setup)
- Systemd (fรผr Service)
- Root/Sudo-Zugriff (fรผr Log-Zugriff und Deployments)
- Optional: GitHub Webhook fรผr Auto-Deploy
- Optional: Ollama fรผr lokale AI (llama3.1)
- Gehe zu Discord Developer Portal
- "New Application" โ Name:
ShadowOps - Bot-Tab โ "Add Bot"
- "Reset Token" โ Token kopieren (
โ ๏ธ nur einmal sichtbar!) - Unter "Privileged Gateway Intents":
- โ Message Content Intent (optional)
- โ Server Members Intent (optional)
- OAuth2 โ URL Generator:
- Scopes:
bot,applications.commands - Permissions:
Send Messages,Embed Links,Use Slash Commands,Create Public Threads,Send Messages in Threads
- Scopes:
- Generierte URL รถffnen โ Bot zu Server einladen
cd /home/user/shadowops-bot
# Dependencies installieren
pip3 install -r requirements.txt
# Config erstellen
cp config/config.example.yaml config/config.yaml
nano config/config.yaml # guild_id und andere statische IDs eintragen
# Secrets als Umgebungsvariablen setzen
# (z.B. in ~/.bashrc, ~/.zshrc oder einer .env Datei, die vom Service geladen wird)
export DISCORD_BOT_TOKEN="DEIN_BOT_TOKEN_HIER"
# Optional:
# export ANTHROPIC_API_KEY="DEIN_ANTHROPIC_KEY"
# export OPENAI_API_KEY="DEIN_OPENAI_KEY"sudo cp shadowops-bot.service /etc/systemd/system/
sudo systemctl daemon-reload
sudo systemctl enable shadowops-bot
sudo systemctl start shadowops-bot
# Status prรผfen
sudo systemctl status shadowops-bot
# Logs live verfolgen
sudo journalctl -u shadowops-bot -fDer Bot erstellt automatisch alle benรถtigten Channels beim ersten Start:
๐ค Auto-Remediation Kategorie:
๐จ-security-alerts- Sicherheits-Alarmeโ -approval-requests- Fix-Genehmigungenโ๏ธ-execution-logs- Execution-Logs๐-stats- Tรคgliche Statistiken๐ง -ai-learning- AI Learning Logs๐ง-code-fixes- Code Fixer Logsโก-orchestrator- Orchestrator Logs
โน๏ธ Channel-Fallbacks: Falls die Auto-Remediation-Notification-IDs nicht gesetzt sind, nutzt der Bot automatisch die IDs aus
channels.*(z.B.channels.ai_learning,channels.code_fixes,channels.orchestrator). So bleiben AI-Learning und Discord-Logs aktiv, selbst wenn die Notifications-Section fehlt.
๐ Multi-Project Kategorie (v3.1):
๐ฅ-customer-alerts- Kunden-sichtbare Alerts๐-customer-status- Projekt-Status Updates๐-deployment-log- Deployment-Benachrichtigungen
๐ก Tipp: Der Bot updated die Config automatisch mit allen Channel-IDs!
Vollstรคndige Konfigurationsdokumentation: docs/API.md
Basis-Config in config/config.yaml:
discord:
# token: "" # WIRD JETZT รBER ENV VAR: DISCORD_BOT_TOKEN GESETZT
guild_id: 123456789
ai:
ollama:
enabled: true
url: http://localhost:11434
model: phi3:mini
model_critical: llama3.1
hybrid_models: true
anthropic:
enabled: false
# api_key: "" # WIRD JETZT รBER ENV VAR: ANTHROPIC_API_KEY GESETZT
openai:
enabled: false
# api_key: "" # WIRD JETZT รBER ENV VAR: OPENAI_API_KEY GESETZT
auto_remediation:
enabled: true
dry_run: false
approval_mode: paranoid # paranoid | auto | dry-run
max_batch_size: 10
projects:
shadowops-bot:
enabled: true
path: /home/user/shadowops-bot
branch: main
monitor:
enabled: true
url: http://localhost:5000/health
check_interval: 60
deploy:
run_tests: true
test_command: pytest tests/
github:
enabled: false
webhook_secret: "your_webhook_secret"
webhook_port: 8080
auto_deploy: true
deploy_branches: [main, master]
deployment:
backup_dir: backups
max_backups: 5
health_check_timeout: 30โน๏ธ Config Loader: Die Einstellungen kรถnnen per Attribute und Dictionary-Access gelesen werden (z.B.
config.discord['token']oderconfig['discord']). Fehlende Pflichtfelder (discord.token,discord.guild_id) lรถsen einen klarenKeyErroraus, damit Fehlkonfigurationen sofort auffallen.
Security Commands:
/status - Gesamt-Sicherheitsstatus
/scan - Docker Security Scan
/threats [hours] - Bedrohungen der letzten X Stunden
/bans [limit] - Gebannte IPs
/aide - AIDE Check-Status
Auto-Remediation:
/remediation-stats - Statistiken
/stop-all-fixes - Emergency Stop
/set-approval-mode [mode] - Approval Mode รคndern
AI System:
/get-ai-stats - AI Provider Status
/reload-context - Context neu laden
Multi-Project:
/projekt-status [name] - Detaillierter Projekt-Status
/alle-projekte - รbersicht aller Projekte
- Repository Settings โ Webhooks โ Add webhook
- Payload URL:
http://your-server:8080/webhook - Content type:
application/json - Secret: (from config.yaml)
- Events:
Push,Pull request,Release
# Dependencies installieren
pip3 install -r requirements.txt
pip3 install -r requirements-dev.txt
# Tests ausfรผhren
pytest tests/ -v
# Mit Coverage
pytest tests/ --cov=src --cov-report=html
# Einzelne Test-Kategorie
pytest tests/unit/ -v
pytest tests/integration/ -v
# Bot lokal testen
python3 src/bot.py
# Logs anschauen
tail -f logs/shadowops.log
# Service neu starten
sudo systemctl restart shadowops-botshadowops-bot/
โโโ src/
โ โโโ bot.py # Haupt-Bot-Logik
โ โโโ cogs/ # NEU: Modulare Slash Commands
โ โ โโโ admin.py
โ โ โโโ inspector.py
โ โ โโโ monitoring.py
โ โโโ integrations/
โ โ โโโ ai_service.py # AI Service (Ollama/Claude/OpenAI)
โ โ โโโ orchestrator.py # Remediation Orchestrator
โ โ โโโ event_watcher.py # Security Event Watcher
โ โ โโโ knowledge_base.py # SQL Learning System
โ โ โโโ code_analyzer.py # Code Structure Analyzer
โ โ โโโ context_manager.py # RAG Context Manager
โ โ โโโ github_integration.py # GitHub Webhooks
โ โ โโโ project_monitor.py # Multi-Project Monitoring
โ โ โโโ deployment_manager.py # Auto-Deployment
โ โ โโโ incident_manager.py # Incident Tracking
โ โ โโโ customer_notifications.py # Customer-Facing Alerts
โ โ โโโ fail2ban.py # Fail2ban Integration
โ โ โโโ crowdsec.py # CrowdSec Integration
โ โ โโโ aide.py # AIDE Integration
โ โ โโโ docker.py # Docker Scan Integration
โ โโโ utils/
โ โโโ config.py # Config-Loader
โ โโโ state_manager.py # NEU: State-Management
โ โโโ logger.py # Logging
โ โโโ embeds.py # Discord Embed-Builder
โ โโโ discord_logger.py # Discord Channel Logger
โโโ tests/
โ โโโ conftest.py # Test Fixtures
โ โโโ unit/ # Unit Tests (150+)
โ โ โโโ test_config.py
โ โ โโโ test_ai_service.py
โ โ โโโ test_orchestrator.py
โ โ โโโ test_knowledge_base.py
โ โ โโโ test_event_watcher.py
โ โ โโโ test_github_integration.py
โ โ โโโ test_project_monitor.py
โ โ โโโ test_incident_manager.py
โ โโโ integration/
โ โโโ test_learning_workflow.py # End-to-End Tests
โโโ config/
โ โโโ config.example.yaml # Example Config
โ โโโ config.yaml # Your Config (gitignored)
โ โโโ DO-NOT-TOUCH.md # Safety Rules
โ โโโ INFRASTRUCTURE.md # Infrastructure Knowledge
โ โโโ PROJECT_*.md # Project Documentation
โโโ context/ # AI Context Files
โ โโโ git_history/ # Git History Analysis
โ โโโ logs/ # Log Learning Files
โโโ data/ # Persistent Data
โ โโโ state.json # NEU: Dynamic State File
โ โโโ knowledge_base.db # SQL Learning Database
โ โโโ project_monitor_state.json # Project Monitor State
โ โโโ incidents.json # Incident Tracking
โโโ backups/ # Auto-Backups (gitignored)
โโโ logs/ # Log-Dateien (gitignored)
โโโ docs/ # Documentation
โ โโโ API.md # API Documentation
โ โโโ SETUP_GUIDE.md # Setup Guide
โ โโโ ACTIVE_SECURITY_GUARDIAN.md # Feature Documentation
โ โโโ DOCS_OVERVIEW.md # Documentation Overview
โโโ requirements.txt # Python Dependencies
โโโ requirements-dev.txt # Dev Dependencies
โโโ pytest.ini # pytest Configuration
โโโ safe_upgrades.yaml # Upgrade Recommendations
โโโ shadowops-bot.service # Systemd Service
โโโ CHANGELOG.md # Version History
โโโ README.md # This file
- Secrets Management: Secrets (Token, API Keys) mรผssen als Umgebungsvariablen gesetzt werden.
- Config-Schutz: Niemals die
config.yamloder.env-Dateien committen! - File Permissions:
chmod 600 config/config.yaml - Service-User: Bot lรคuft als nicht-root user
- Rate Limiting: Eingebaut gegen Spam
- Webhook Verification: HMAC signatures for GitHub webhooks
- DO-NOT-TOUCH Validation: Critical files protected
- Dry-Run Mode: Test fixes without execution
- Automatic Backups: Before every change
- Rollback Capability: Instant restoration on failure
- Persistent Learning: SQL database survives restarts
- Exponential Backoff: Smart retry logic for API calls
- Circuit Breaker: Prevents cascade failures
- Race Condition Protection: Async locks for shared state
- Memory Management: Automatic cleanup of old data
- Health Monitoring: Continuous project uptime tracking
- Auto-Recovery: Projects automatically resume after downtime
See CHANGELOG.md for detailed version history.
๐ Multi-Guild Customer Notifications:
- Automatic channel setup on customer servers
- AI-generated patch notes (Ollama llama3.1)
- Dual-channel system (internal technical + customer friendly)
- Per-project language configuration (DE/EN)
- Message splitting for long patch notes
- Manual setup command
/setup-customer-server
๐ง Security Integration Fixes:
- Fixed CrowdSec integration (JSON parsing)
- Fixed Fail2ban integration (systemd restrictions)
- Fixed GitHub webhook logging
- Opened port 9090 with HMAC security
๐ Documentation:
- Complete multi-guild setup guide
- Customer onboarding instructions
- GitHub webhook configuration guide
- Security integration fixes documentation
๐ง Persistent Learning System:
- SQL Knowledge Base for permanent learning
- Git history analysis for codebase understanding
- Code structure analyzer for architecture insights
- Enhanced AI prompts with log-based learning
- Success rate tracking and best strategy recommendations
๐ Multi-Project Infrastructure:
- GitHub webhook integration with auto-deploy
- Real-time project health monitoring
- Automated deployment system with rollback
- Incident management with Discord threads
- Customer-facing notification system
- Project status commands (
/projekt-status,/alle-projekte)
๐งช Enterprise Test Suite:
- 150+ comprehensive tests (unit + integration)
- AI learning workflow demonstrations
- pytest configuration with fixtures
- Full coverage for critical systems
๐ง Code Improvements:
- Before/after verification for fixes
- Race condition protection
- Retry logic with exponential backoff
- Service validation
- Memory leak prevention
๐ฎ New Commands:
/set-approval-mode- Change remediation mode/get-ai-stats- AI provider status/reload-context- Reload project context/projekt-status- Detailed project status/alle-projekte- All projects overview
- AI Learning System with event history tracking
- Smart Docker image analysis
- CVE-aware upgrade recommendations
- Multi-project execution
- Git history learning
- AI Service fixes
- HTTP client conflict resolution
- Event-driven auto-remediation
- AI-powered analysis
- Live status updates
- Initial Release
- Basic security monitoring
- Discord integration
- Total Lines of Code: 15,000+
- Test Coverage: 150+ tests
- AI Integrations: 3 (Ollama, Claude, OpenAI)
- Security Integrations: 4 (Fail2ban, CrowdSec, AIDE, Trivy)
- Discord Commands: 14
- Supported Projects: Unlimited
- Deployment Automation: Full CI/CD
- Incident Tracking: Automatic with threads
MIT License - Erstellt von CommanderShadow
Bot startet nicht:
# Logs prรผfen
sudo journalctl -u shadowops-bot -f
# Service-Status
sudo systemctl status shadowops-bot
# Config validieren
python3 -c "from src.utils.config import get_config; get_config()"Slash Commands werden nicht angezeigt:
# Commands neu synchronisieren (automatisch beim Bot-Start)
# Kann bis zu 1 Stunde dauern (Discord Cache)AI Service funktioniert nicht:
# Ollama Status prรผfen
curl http://localhost:11434/api/tags
# AI Stats in Discord
/get-ai-statsDeployments schlagen fehl:
# Permissions prรผfen
sudo -l
# Backup-Verzeichnis prรผfen
ls -la backups/
# Deployment-Logs
tail -f logs/shadowops.log | grep deployment- ๐ Setup Guide - Schritt-fรผr-Schritt Installation
- ๐ง API Documentation - Vollstรคndige API-Referenz
- ๐ Docs Overview - Dokumentations-Index
- Logs prรผfen:
sudo journalctl -u shadowops-bot -f - Service-Status:
sudo systemctl status shadowops-bot - Permissions prรผfen: Bot braucht Zugriff auf Logs und Deployment-Pfade
- Test-Suite ausfรผhren:
pytest tests/ -v - GitHub Issues: Report a Bug
Made with ๐ก๏ธ by CommanderShadow
ShadowOps v3.1 - The Ultimate AI-Powered Security Guardian