Cloud Sync Decoy Monitor is a desktop utility that deploys decoy files into synced cloud folders (for example OneDrive/Google Drive) and records beacon callbacks when those files are opened.
- Deploys HTML/PDF decoy files to discovered sync folders.
- Embeds beacon callbacks in generated HTML decoys.
- Runs a local receiver to log alert events.
- Stores events in SQLite and JSON evidence files.
- Supports optional signed beacons (
HMAC-SHA256) for request authenticity. - Supports rate limiting, dedupe, and retention pruning.
This project is currently released under Apache-2.0 (free/open source).
Licensing note for future versions:
- Future releases may use a different license (including commercial licensing).
- This specific released version remains under Apache-2.0.
aisv_main.py: GUI app (setup, deployment, quick operations)beacon_receiver.py: local alert receiver and evidence writerrandomizers.py: decoy filename/subject randomizationreceiver_config.template.json: receiver configuration templatesmoke_test.ps1: end-to-end smoke test helperSECURITY.md: security reporting and hardening notesRELEASE_CHECKLIST.md: pre-release checklist
- Windows + Python 3.11+ recommended
- Cloudflare Tunnel (
cloudflared) for public endpoint routing
Install dependencies:
python -m pip install -r requirements.txt- Start receiver.
- Start app.
- Run quick setup.
- Deploy decoys.
$env:GPSD_SMTP_HOST="smtp.yourprovider.com"
$env:GPSD_SMTP_PORT="587"
$env:GPSD_SMTP_TLS_MODE="starttls"
$env:GPSD_SMTP_USERNAME="alerts@yourdomain.com"
$env:GPSD_SMTP_FROM="alerts@yourdomain.com"
$env:GPSD_SECONDARY_EMAIL="you@yourdomain.com"
$env:GPSD_SMTP_PASSWORD="your-secret-password"
$env:GPSD_BEACON_SECRET="set-a-long-random-secret"
$env:GPSD_REQUIRE_SIGNATURE="true"
$env:GPSD_BIND_HOST="127.0.0.1"
python beacon_receiver.pypython aisv_main.pyIn the UI:
- Click
Quick Setup (Recommended) - Optionally click
Validate Setup - Click
Start Monitoring - Optionally click
Start All Servicesto launch receiver+tunnel from UI
Set beacon URL to your tunnel endpoint, for example:
https://defense.01ai.ai/log
Core receiver vars:
GPSD_SMTP_HOSTGPSD_SMTP_PORTGPSD_SMTP_TLS_MODE(ssl,starttls,plain)GPSD_SMTP_USERNAMEGPSD_SMTP_FROMGPSD_SECONDARY_EMAILGPSD_SMTP_PASSWORD
Security/hardening vars:
GPSD_BEACON_SECRET(recommended)GPSD_REQUIRE_SIGNATURE(true/false)GPSD_BIND_HOST(default127.0.0.1)GPSD_RATE_LIMIT_WINDOW_SECGPSD_RATE_LIMIT_MAX_PER_IPGPSD_DEDUPE_WINDOW_SECGPSD_RETENTION_DAYSGPSD_MAX_EVIDENCE_FILES
Optional vars:
GPSD_TUNNEL_URLGPSD_LISTEN_PORT
Runtime artifacts are stored in:
%LOCALAPPDATA%\CloudSyncDecoyMonitorwhen writable- fallback:
./.gpsdefense_data
Includes:
config.jsonsys_integrity.logsecurity_suite.dbevidence/*.jsonreceiver_run.logtunnel_run.log
powershell -ExecutionPolicy Bypass -File .\smoke_test.ps1- Do not commit runtime logs, DBs, or evidence artifacts.
- Rotate credentials immediately after accidental exposure.
- Keep tunnel private and avoid direct internet exposure of receiver host.
- Use signed beacons in production.
You are responsible for operating this software in compliance with applicable laws, privacy requirements, and consent obligations in your jurisdiction.