serve as a reverse proxy to protect your web services from attacks and exploits.
Find a file
2024-06-24 14:51:58 +08:00
.github/ISSUE_TEMPLATE Update 2bug-report.yaml 2023-10-27 15:15:45 +08:00
backend fix: add behavior source (#843) 2024-04-24 18:31:52 +08:00
blazehttp@23e8b59cd2 feat: update blazehttp 2023-11-21 12:16:56 +08:00
blockpage feat: add 4.2.0 version doc 2024-01-19 17:59:54 +08:00
documents feat: 6.1.3 2024-06-21 19:53:16 +08:00
images Add files via upload 2024-06-05 23:48:39 +08:00
lua-resty-t1k@6446166301 加上了几个子模块 2023-06-26 22:49:23 +08:00
plugins@209e7c0e00 加上了几个子模块 2023-06-26 22:49:23 +08:00
release feat: 去掉 collie 限制 2024-06-24 14:51:58 +08:00
website fix: discount_end_tip 2024-06-18 20:17:37 +08:00
yanshi add yanshi 2023-07-20 15:19:03 +08:00
.dockerignore feat: add dockerfile for whole site 2023-11-04 18:17:11 +08:00
.gitignore feat: change release log 2023-12-28 15:36:15 +08:00
.gitmodules add about us link 2023-07-20 15:15:47 +08:00
CHANGELOG.md feat: 6.1.3 2024-06-21 19:53:16 +08:00
Dockerfile fix: website 2024-06-06 17:26:16 +08:00
FAQ.md doc: update the container name in doc 2024-01-11 11:16:56 +08:00
LICENSE.md feat: update license 2024-03-13 17:38:46 +08:00
README.md Update README.md 2024-06-12 22:02:51 +08:00
README_CN.md Update README_CN.md 2024-06-03 15:05:06 +08:00

SafeLine, the best free WAF for webmaster

SafeLine is a web security gateway to protect your websites from attacks and exploits.

It defenses for all of web attacks, such as sql injection, code injection, os command injection, CRLF injection, ldap injection, xpath injection, rce, xss, xxe, ssrf, path traversal, backdoor, bruteforce, http-flood, bot abused and so on.

🏠Home   |   📖Documentation   |   🔍Live Demo   |   中文版

     

Screenshots

How It Works

SafeLine is developed based on nginx, it serves as a reverse proxy middleware to detect and cleans web attacks, its core capabilities include:

  • Defenses for web attacks
  • Proactive bot abused defense
  • HTML & JS code encryption
  • IP-based rate limiting
  • Web Access Control List

Installation

中国大陆用户安装国际版可能会导致无法连接云服务,请查看 中文版安装文档

Automatic Deploy

👍Recommended

Use the following command to start the automated installation of SafeLine. (This process requires root privileges)

bash -c "$(curl -fsSLk https://waf.chaitin.com/release/latest/setup.sh)"

After the command is executed, it means the installation is successfully. Please go to "Use Web UI" directly.

Mannually Deploy

to see Documentation

Usage

Login

Open the web console page https://<safeline-ip>:9443/ in the browser, then you will see below.

Execute the following command to get administrator account

docker exec safeline-mgt /app/mgt-cli reset-admin --once

After the command is successfully executed, you will see the following content

Please must remember this content

[SafeLine] Initial usernameadmin
[SafeLine] Initial password**********
[SafeLine] Done

Enter the password in the previous step and you will successfully logged into SafeLine.

Protecting a website

Log into the SafeLine Web Admin Console, go to the "Site" -> "Website" page and click the "Add Site" button in the upper right corner.

In the next dialog box, enter the information to the original website.

  • Domain: domain name of your original website, or hostname, or ip address, for example: www.chaitin.com
  • Port: port that SafeLine will listen, such as 80 or 443. (for https websites, please check the SSL option)
  • Upstream: real address of your original website, through which SafeLine will forward traffic to it

After completing the above settings, please resolve the domain name you just entered to the IP address of the server where SafeLine is located.

Then you can access the website protected by the SafeLine through the domain name like this.

Try to attack your website

Now, your website is protected by SafeLine, lets try tp attack it and see what happens.

If https://chaitin.com is a website protected by SafeLine, here are some test cases for common attacks:

  • SQL Injection: https://chaitin.com/?id=1+and+1=2+union+select+1
  • XSS: https://chaitin.com/?id=<img+src=x+onerror=alert()>
  • Path Traversal: https://chaitin.com/?id=../../../../etc/passwd
  • Code Injection: https://chaitin.com/?id=phpinfo();system('id')
  • XXE: https://chaitin.com/?id=<?xml+version="1.0"?><!DOCTYPE+foo+SYSTEM+"">

Replace chaitin.com in the above cases with your website domain name and try to access it.

Check the web console of SafeLine to see the attack list

To view the specific details of the attack, click "detail"

Star History

Star History Chart

Automaton Generator | Lua Plugin | T1K Protocol | WAF Test Tool