NAXSI is an open-source, high performance, low rules maintenance WAF for NGINX
Clone or download
z0r0 and buixor Scientific notation in json (Fix #437) (#438)
* Fixing scientific notation number parsing as a JSON value
Latest commit 2a7cb69 Oct 9, 2018

README.md

naxsi logo

coverity travis-ci coveralls codecov CII Best Practices Gitter

We need your help

Please fill in this little feedback survey, 2 minutes of your time, great help for us !

What is Naxsi?

NAXSI means Nginx Anti XSS & SQL Injection.

Technically, it is a third party nginx module, available as a package for many UNIX-like platforms. This module, by default, reads a small subset of simple (and readable) rules containing 99% of known patterns involved in website vulnerabilities. For example, <, | or drop are not supposed to be part of a URI.

Being very simple, those patterns may match legitimate queries, it is the Naxsi's administrator duty to add specific rules that will whitelist legitimate behaviours. The administrator can either add whitelists manually by analyzing nginx's error log, or (recommended) start the project with an intensive auto-learning phase that will automatically generate whitelisting rules regarding a website's behaviour.

In short, Naxsi behaves like a DROP-by-default firewall, the only task is to add required ACCEPT rules for the target website to work properly.

Why is it different?

Contrary to most Web Application Firewalls, Naxsi doesn't rely on a signature base like an antivirus, and thus cannot be circumvented by an "unknown" attack pattern. Naxsi is Free software (as in freedom) and free (as in free beer) to use.

What does it run on?

Naxsi should be compatible with any nginx version.

It depends on libpcre for its regexp support, and is reported to work great on NetBSD, FreeBSD, OpenBSD, Debian, Ubuntu and CentOS.

Getting started

nxapi-dashboard logo

Security issues

If you find a security issue, please send it by email to tko@nbs-system.com; you can use the gpg key 0x251A28DE2685AED4 to encrypt it.