vaxinx-stoplight-code

πŸ›‘οΈ VAXINX Stoplight Scanner β€” v3.0-VAULT

think_like_attacker β†’ act_like_defender

A Python + JSON + HTML hybrid cybersecurity tool that simulates real-world defensive analysis using a Stoplight Risk Model (RED / YELLOW / GREEN).

Part of the VAXINX Protocolβ„’ ecosystem β€” a reverse-learning engineering system where:

BUILD β†’ TEST β†’ BREAK β†’ UNDERSTAND β†’ IMPROVE β†’ DEPLOY

This project combines:


LIVE

https://regislara-byte.github.io/vaxinx-stoplight-code/dashboard/


🌐 Ecosystem Links

Platform Link
🧠 GitHub https://github.com/regislara-byte
πŸ“‘ Live Dashboard https://regislara-byte.github.io/vaxinx-cert-dashboard/
πŸŽ“ Credly https://www.credly.com/users/regis-lara

⚑ What’s New in v3.0-VAULT

Feature Details
πŸ€– YARA Rule Engine Loads all .yar / .yara rules from rules/
🌐 Flask REST API Live scan API + dashboard serving
πŸ“‘ SSE Streaming Real-time file-by-file scan feed
πŸ” Quarantine Vault Fernet encrypted .vxlocked files
🎨 Dashboard Alignment Integrated VAXINX dashboard ecosystem
🧾 Visual Lore Artifacts AI-readable engineering documentation workflow
βš™οΈ Automation Pipeline Batch deployment + push workflow system

🚦 Stoplight Risk Model

Signal Decision Action
🟒 GREEN Allow Safe β€” no threat indicators detected
🟑 YELLOW Inspect Suspicious β€” manual review required
πŸ”΄ RED Quarantine High risk β€” encrypted into .vxlocked vault

🧬 VAXINX Evolution Phases

🟒 PHASE 1 β€” Scanner Core

Foundation systems:


🟑 PHASE 2 β€” Defensive Analysis Expansion

Detection upgrades:


πŸ”΄ PHASE 3 β€” Vault Encryption Layer

Security enhancements:


πŸ”΅ PHASE 4 β€” Live Ecosystem Integration

Operational upgrades:


🟣 PHASE 5 β€” VLA + Automation Workflow

Engineering acceleration systems:


🧠 Core System Modules

VAXINX_SYSTEM = {
  "file_scanner":    "Python-based threat detection engine",
  "stoplight_logic": "RED / YELLOW / GREEN classification",
  "yara_engine":     "Rule-based pattern matching",
  "flask_api":       "REST API + SSE live stream",
  "vault_engine":    "Encrypted quarantine system",
  "json_reports":    "Structured scan output",
  "html_dashboard":  "Visual cyber intelligence UI",
  "vla_system":      "Visual Lore Artifacts workflow",
  "automation":      "Deployment + push workflow pipeline"
}

πŸ” Detection Engine

File Analysis


Advanced Detection


Quarantine Vault

Triggered automatically when:

stoplight == RED

Features:


πŸ“ Project Structure

vaxinx-stoplight-code/
β”œβ”€β”€ scanner_v3.py
β”œβ”€β”€ restore_quarantine.py
β”œβ”€β”€ vaxinx_crypto.py
β”œβ”€β”€ README.md
β”‚
β”œβ”€β”€ automation/
β”‚   β”œβ”€β”€ push_all.bat
β”‚   β”œβ”€β”€ push_readme.bat
β”‚   β”œβ”€β”€ push_dashboard.bat
β”‚   β”œβ”€β”€ push_vla.bat
β”‚   β”œβ”€β”€ deploy_dashboard.bat
β”‚   β”œβ”€β”€ launch_scanner.bat
β”‚   └── install_deps_py312.bat
β”‚
β”œβ”€β”€ dashboard/
β”‚   β”œβ”€β”€ index.html
β”‚   └── Vaxinx_Doppio.gif
β”‚
β”œβ”€β”€ assets/
β”‚   └── visualloreartifacts/
β”‚       β”œβ”€β”€ 001-python312-install.png
β”‚       β”œβ”€β”€ 002-yara-ok-repl.png
β”‚       β”œβ”€β”€ 003-crypto-dependency-fix.png
β”‚       β”œβ”€β”€ 004-vscode-interpreter-switch.png
β”‚       └── 005-scanner-runtime-validation.png
β”‚
β”œβ”€β”€ test_lab/
β”œβ”€β”€ quarantine/
β”œβ”€β”€ reports/
β”œβ”€β”€ logs/
β”œβ”€β”€ rules/
└── .vault_keys/

πŸ–ΌοΈ Visual Lore Artifacts (VLA)

This repository follows a:

Visual Lore Artifacts (VLA)

workflow philosophy.

The folder:

assets/visualloreartifacts/

contains timestamped screenshots documenting:


🎯 Purpose of VLA

VLA exists to provide:


🧠 VLA Philosophy

Instead of only reading code:

README β†’ code β†’ guess architecture

VLA enables:

screenshot β†’ instant context β†’ faster understanding

This creates:


βš™οΈ Automation Workflow

This project uses lightweight .bat automation systems to accelerate deployment and reduce repetitive terminal workflows.


Automation Structure

automation/
β”œβ”€β”€ push_all.bat
β”œβ”€β”€ push_readme.bat
β”œβ”€β”€ push_dashboard.bat
β”œβ”€β”€ push_vla.bat
β”œβ”€β”€ deploy_dashboard.bat
β”œβ”€β”€ launch_scanner.bat
└── install_deps_py312.bat

⚑ Purpose


🧠 Automation Philosophy

Automate the friction.
Preserve the thinking.

Coding logic, architecture, and security reasoning remain human-directed.

Automation handles:


▢️ How to Run

Recommended:

Python 3.12 is recommended for:


2. Install Dependencies

Core packages:

py -3.12 -m pip install cryptography flask flask-cors

Optional YARA support:

py -3.12 -m pip install yara-python

3. Run Scanner

py -3.12 scanner_v3.py

Default scan target:

test_lab/

Reports generated to:

reports/scan_report.json

4. Web Dashboard Mode

py -3.12 scanner_v3.py --serve

Open browser:

http://127.0.0.1:5000

5. API Endpoints

Method Endpoint Description
GET / Dashboard UI
GET /api/status Scanner health
GET /api/report Latest scan report
GET /api/rules Loaded YARA rules
POST /api/scan Trigger scan
GET /api/stream Live SSE feed

πŸ”„ Quarantine & Restore

Auto-Quarantine

Triggered automatically on:

RED classification

Flow:

  1. File encrypted with Fernet
  2. Stored as .vxlocked
  3. Logged into runtime logs
  4. Optional overwrite process

Restore Vaulted Files

py -3.12 restore_quarantine.py

πŸ§ͺ Threat Logic Reference

IDS  = detect anomalies
IPS  = block threats inline
SIEM = correlate logs
DLP  = prevent data exfiltration

risk     = probability Γ— impact
security = prevent β†’ detect β†’ respond β†’ recover

πŸŽ“ Verified Credentials

All certifications reflected in the VAXINX dashboard ecosystem.

Type Credential
πŸ… Badge Introduction to Cybersecurity
πŸ“œ Certificate Introduction to Cybersecurity
βœ… Achievement Resource Specialist
βœ… Achievement Network Defense
βœ… Achievement System Safeguards
βœ… Achievement Threat Analysis
βœ… Achievement Cybersecurity Administration

Issuer:

Cisco Networking Academy

πŸ“‘ Roadmap


⚠️ Security Notes

Never Commit

secret.key
.vault_keys/

Recommended .gitignore:

secret.key
.vault_keys/
quarantine/
logs/
*.pyc
__pycache__/

Use .gitignore aggressively for:


Important

This project:


🧠 Engineering Philosophy

This repository is intentionally designed as:

The goal is not only to build tools, but to document:


🧾 License β€” VAXINX Protocolβ„’

Creator : VAXINX (Regis Lara)
Purpose : Educational / Defensive Cybersecurity

βœ” Free to use for learning
❌ Not for offensive or malicious use
βœ” Attribution required

"One Seed. 12 Phrase. Immunity."

πŸ›‘οΈ VAXINX Protocolβ„’ β€” You don’t just scan files. You understand threats before they happen.