Crates.io | bulwark-cli |
lib.rs | bulwark-cli |
version | 0.6.0 |
source | src |
created_at | 2023-05-19 18:43:11.507343 |
updated_at | 2024-06-27 18:30:51.263002 |
description | Bulwark is a fast, modern, open-source web application security engine. |
homepage | https://bulwark.security/ |
repository | https://github.com/bulwark-security/bulwark |
max_upload_size | |
id | 869034 |
size | 691,170 |
Automated security decision-making under uncertainty.
Bulwark is a fast, modern, open-source web application firewall (WAF) and API security gateway. It simplifies the implementation of detective security controls while offering comprehensive visibility into your web services. Bulwark's detection-as-code approach to rule definition offers security teams higher confidence in their response to persistent and adaptive threats. Bulwark plugins offer a wide range of capabilities, enabling security teams to define and evolve detections rapidly, without making changes to the underlying application.
robots.txt
or scraping site data at abnormal
frequencies, without negatively affecting well-behaved bots and crawlers. This is especially relevant for
users that may be concerned about their sites being incorporated into training data without authorization.wasm32-wasi
target needed to build plugins: rustup target add wasm32-wasi
cargo install bulwark-cli
In a Bulwark deployment, there are several pieces working together. In the current version of Bulwark, Envoy handles the initial HTTP request processing. Bulwark uses Envoy's external processing API to hook that processing and perform security decision-making on the traffic. In most configurations, there will be an interior service that handles the actual business logic of the web application and Envoy will be configured to send the traffic onwards once Bulwark has made its decision. It's recommended to use Bulwark alongside a Redis server to maintain state across multiple Bulwark instances, although this is not strictly necessary if Bulwark is only used with stateless detection plugins.
An example Envoy configuration file is provided as a starting point for the typical deployment setup just described. The Envoy server would be launched with the following command:
envoy -c envoy.yaml
Bulwark's own configuration file is a TOML file that defines which detection plugins should be used to process a request, as well as details like the listening port and the address for the Redis server. The listening port in Bulwark's configuration must match the port number given for the corresponding external processing filter section in Envoy's configuration. Bulwark is launched with the following command:
bulwark-cli ext-processor -c bulwark.toml
Bulwark plugins are compiled to WebAssembly before use. While it's recommended to do this using a workflow like GitHub Actions, you can also do this manually, particularly for development. To compile a Bulwark plugin:
bulwark-cli build -p rules/example-plugin -o dist/plugins/
Check out the list of open issues. We actively maintain a list of issues suitable for new contributors to the project. Alternatively, detection plugins may be contributed to the community ruleset.
We do not require contributors to sign a license agreement (CLA) because we want users of Bulwark to be confident that the software will remain available under its current license.
This project is licensed under the Apache 2.0 license with the LLVM exception. See LICENSE for more details.
Unless you explicitly state otherwise, any contribution intentionally submitted for inclusion in this project by you, as defined in the Apache 2.0 license, shall be licensed as above, without any additional terms or conditions.
To start, check if the answer to your question can be found in any of the guides or API documentation. If you aren't able to find an answer there, check the Bulwark project's discussion forum. We are happy to help answer your questions and provide guidance through our community forum.