Skip to content

XORD-AI/CerberusEye

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

CerberusEye

Research Infrastructure for the Sigmund Protocol

🌐 Official Website | 📄 Read the White Paper

Overview

CerberusEye is a localized infrastructure auditing tool designed to quantify the exposure of self-hosted LLM inference endpoints. It serves as the data collection methodology for the research paper "The Glass Box Paradox."

Deployment & Usage

1. Bring Your Own Key (BYOK) This tool distributes no API keys. To utilize the OSINT features (Shodan, Censys, LeakIX), you must enter your own credentials. These keys are stored locally on your machine in config.ini and are never transmitted to XORD.

2. Automatic Launch The server on port 5000 starts automatically. You only need to open the interface and click INITIATE SCAN to begin operations.

3. Offline / Free Mode API keys are not required to use the tool. You can use the "Manual IP List" feature to scan specific targets without any third-party services. The tool's deep scanning and vulnerability detection logic functions 100% offline.

Advanced Configuration (config.ini)

The repository includes a template file named config.ini. This file controls the OSINT data sources.

To enable third-party scanning:

  1. Open config.ini in any text editor.
  2. Paste your API keys directly after the = symbol for each service.
  3. Save the file and restart CerberusEye.exe.

Example:

[leakix]
api_key = 

[shodan]
api_key = 

[censys]
api_key =

About

A Quantitative Analysis of Unauthenticated LLM Infrastructure

Topics

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages