TraceGuard is a local-first security log analyzer. It parses web access logs, applies detection rules, scores suspicious activity, and turns noisy events into an incident-style report.
- Security-focused backend logic
- Log parsing and event normalization
- Detection rules for brute force, probing, scanner user agents, and error bursts
- CLI and web UI surfaces
- Standard-library Python implementation with tests
cd traceguard
./run.shThat runs the tests, starts the local server, and prints the URL.
Manual commands:
python3 -m unittest discover -s tests
python3 server.pyThe server prints the exact local URL and keeps running until you press Ctrl+C. It starts on http://127.0.0.1:4181, or the next open port if that one is busy.
CLI:
python3 -m traceguard.cli samples/access.log- Repeated
401or403responses on login paths - Common probe targets such as
.env,wp-admin, andphpmyadmin - Scanner-style user agents such as
sqlmap,nikto,masscan, andnmap - High 404 rate from one IP
- Suspicious HTTP methods
- Add YAML rule loading
- Enrich IPs with GeoIP metadata
- Stream logs from Nginx or Apache files
- Save investigations to SQLite
- Export incident reports as PDF