Introduction
Sentinel Flow is an open-source, real-time Broken Access Control (BAC) platform aligned with OWASP thinking: it learns from real HTTP traffic instead of relying on stale RBAC spreadsheets, then surfaces when access looks wrong. The system distinguishes two violation families: vertical issues—where a role hits an endpoint outside the statistically learned role-to-route mapping (labeled vertical_idor in code and APIs)—and horizontal IDOR, where access crosses resource ownership boundaries (same role, wrong user or object). Together, those cover privilege escalation-style misuse and cross-user object access, not only “wrong page for your role.”
What You'll Find Here
- Project Overview — Architecture and core value propositions
- Purpose — Why Sentinel Flow exists and the problems it solves
- Dashboard — Control plane: agents, findings, learn-mapping, Kafka orchestration
- Agent — The Go-based reverse proxy that intercepts and forwards traffic
- Detection Engine — Backend service that learns patterns and detects violations
- Tools — Docker, Kafka, and PostgreSQL used in the stack
Quick Facts
- Zero-config rule generation through traffic-based learning
- Self-hosted and open-source with simple Docker deployment
- Low friction adoption via lightweight agent architecture
Getting started
- Clone this repository.
- Start the stack with
docker compose up -d(see repositorydocker-compose.ymland Tools for dependencies such as the externalwebnetwork). - Point traffic at the agent — the bundled Compose file maps the Go agent to host port 9000 (
9000:9000). - Open the Dashboard — the Remix/Node dashboard listens on 3000 inside its container; expose that port in Compose or your reverse proxy when you need browser access. Use Project overview for how components fit together and Tools for Kafka topics and database defaults.