Skip to content

Prototype service to inspect and ascertain possible phishing/scam URLs and send out takedown requests

License

Notifications You must be signed in to change notification settings

FYP-ScamSword/site-inspect

Repository files navigation

Link inspection

About

A full-stack web application which inspects facilitates the process of inspecting suspicious links and sending takedown requests to the relevant DNS providers. This tool is intended to help with proactive scam prevention and response.

For more information on DNS registrars and takedown methods, refer to our takedown document

For more information on the URL inspection feature, refer to our url inspection document

Built With

Getting Started

Prerequisites

Usage

  1. Create .env file in ./url-inspection
GOOGLE_API_KEY=<Your google API key>
DBCONN=mongodb://mongodb:27017/link_inspection
AWS_ACCESS_KEY_ID=<your AWS_ACCESS_KEY_ID>
AWS_SECRET_ACCESS_KEY=<your AWS_SECRET_ACCESS_KEY>
BUCKET="<s3 bucket name>"

To run the app locally:

  1. Note that you will need mongodb and mongo tools as mentioned in the prequisites section.

  2. Run the following commands.

cd ./url-inspection
./import.sh

You will see the following output if it ran successfully:

2023-02-19T03:00:50.320+0800    connected to: mongodb://localhost:27017/link-inspection
2023-02-19T03:00:50.415+0800    10 document(s) imported successfully. 0 document(s) failed to import.
2023-02-19T03:00:50.513+0800    connected to: mongodb://localhost:27017/link-inspection
2023-02-19T03:00:50.603+0800    28 document(s) imported successfully. 0 document(s) failed to import.
MongoDB Import Completed
  1. Install the dependencies.
npm install
  1. Start the application by running the following command.
node server.js

Unless you define PORT in the .env file, it will run on port 8080.

  1. Once the application is up and running, you can send a request to the API:
POST http://localhost:8080/api/linkinspect
{
    "inspectURL": "<url to inspect>"
}

If successful, you will see the following response:

{
    "message": "Link inspection request successful."
}

Log files/reports are uploaded to the S3 bucket defined in the .env file.


To build and run as a docker container:

  1. Run the following command in the root folder.
docker-compose up -d --build
  1. Once the container is up and running, you can send a request to the API:
POST http://localhost:30000/api/linkinspect
{
    "inspectURL": "<url to inspect>"
}

If successful, you will see the following response:

{
    "message": "Link inspection request successful."
}

Log files/reports are uploaded to the S3 bucket defined in the .env file.

Roadmap

Contributing

License

See LICENSE.md

About

Prototype service to inspect and ascertain possible phishing/scam URLs and send out takedown requests

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 4

  •  
  •  
  •  
  •