<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Inner Warden Blog</title>
    <link>https://www.innerwarden.com/blog</link>
    <description>Technical articles on Linux server security, SSH brute-force detection, honeypots, threat intelligence sharing, and automated defense.</description>
    <language>en-us</language>
    <lastBuildDate>Sat, 28 Mar 2026 05:08:16 GMT</lastBuildDate>
    <atom:link href="https://www.innerwarden.com/rss.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>How Inner Warden Catches Obfuscated Reverse Shells (Tree-Sitter AST, Not Regex)</title>
      <link>https://www.innerwarden.com/blog/detect-obfuscated-reverse-shells</link>
      <guid isPermaLink="true">https://www.innerwarden.com/blog/detect-obfuscated-reverse-shells</guid>
      <pubDate>Sat, 21 Mar 2026 00:00:00 GMT</pubDate>
      <description>Why regex fails for obfuscated commands like hex-encoded payloads, base64 pipelines, and Python reverse shells. How tree-sitter AST analysis detects them structurally.</description>
      <category>Threat Detection</category>
    </item>
    <item>
      <title>We Built a Honeypot That Attackers Can’t Detect</title>
      <link>https://www.innerwarden.com/blog/honeypot-attackers-cant-detect</link>
      <guid isPermaLink="true">https://www.innerwarden.com/blog/honeypot-attackers-cant-detect</guid>
      <pubDate>Sat, 21 Mar 2026 00:00:00 GMT</pubDate>
      <description>Fake /proc/cpuinfo, /proc/self/cgroup, 25+ shell commands, and LLM fallback. How our honeypot passes the checks advanced attackers use to detect traps.</description>
      <category>Honeypots</category>
    </item>
    <item>
      <title>Monitor Your Server Security with Grafana and Prometheus</title>
      <link>https://www.innerwarden.com/blog/grafana-server-security-monitoring</link>
      <guid isPermaLink="true">https://www.innerwarden.com/blog/grafana-server-security-monitoring</guid>
      <pubDate>Sat, 21 Mar 2026 00:00:00 GMT</pubDate>
      <description>Tutorial: scrape Inner Warden’s /metrics endpoint with Prometheus and build a Grafana dashboard with events, incidents, AI latency, and execution panels.</description>
      <category>Monitoring</category>
    </item>
    <item>
      <title>Brute-Force Followed by Successful Login: The Attack Everyone Misses</title>
      <link>https://www.innerwarden.com/blog/detect-brute-force-success-login</link>
      <guid isPermaLink="true">https://www.innerwarden.com/blog/detect-brute-force-success-login</guid>
      <pubDate>Sat, 21 Mar 2026 00:00:00 GMT</pubDate>
      <description>Most tools alert on failed SSH logins. Almost none alert when a brute-forced IP then logs in successfully. That’s a compromise, not just an alert.</description>
      <category>Threat Detection</category>
    </item>
    <item>
      <title>Why We Switched to jemalloc (and How glibc malloc Was Eating 1GB RAM)</title>
      <link>https://www.innerwarden.com/blog/jemalloc-rust-memory-management</link>
      <guid isPermaLink="true">https://www.innerwarden.com/blog/jemalloc-rust-memory-management</guid>
      <pubDate>Sat, 21 Mar 2026 00:00:00 GMT</pubDate>
      <description>The story of how glibc malloc fragmentation caused our Rust daemon to grow to 1.3GB under bot traffic, and how jemalloc fixed it with 3 lines of code.</description>
      <category>Engineering</category>
    </item>
    <item>
      <title>11 Types of Sudo Abuse Inner Warden Detects (MITRE ATT&amp;CK Mapped)</title>
      <link>https://www.innerwarden.com/blog/sudo-abuse-mitre-attack-detection</link>
      <guid isPermaLink="true">https://www.innerwarden.com/blog/sudo-abuse-mitre-attack-detection</guid>
      <pubDate>Sat, 21 Mar 2026 00:00:00 GMT</pubDate>
      <description>Complete reference: SUID manipulation, SSH key injection, cron persistence, log tampering, and 7 more privilege abuse categories with MITRE ATT&amp;CK IDs.</description>
      <category>Threat Detection</category>
    </item>
    <item>
      <title>How to Tell Real Googlebot from Fake: Reverse DNS Verification</title>
      <link>https://www.innerwarden.com/blog/fake-bot-detection</link>
      <guid isPermaLink="true">https://www.innerwarden.com/blog/fake-bot-detection</guid>
      <pubDate>Thu, 19 Mar 2026 00:00:00 GMT</pubDate>
      <description>Attackers disguise as Googlebot to bypass security. Learn how reverse DNS verification catches fakes and why user-agent alone is not enough.</description>
      <category>Bot Security</category>
    </item>
    <item>
      <title>OpenClaw + Inner Warden: Your AI Agent Gets a Security Armor</title>
      <link>https://www.innerwarden.com/blog/openclaw-integration</link>
      <guid isPermaLink="true">https://www.innerwarden.com/blog/openclaw-integration</guid>
      <pubDate>Thu, 19 Mar 2026 00:00:00 GMT</pubDate>
      <description>How Inner Warden protects OpenClaw agents from executing dangerous commands, and how OpenClaw keeps Inner Warden healthy in return.</description>
      <category>Integration</category>
    </item>
    <item>
      <title>How to Set Up Suricata IDS with Automated Response</title>
      <link>https://www.innerwarden.com/blog/suricata-automated-response</link>
      <guid isPermaLink="true">https://www.innerwarden.com/blog/suricata-automated-response</guid>
      <pubDate>Wed, 18 Mar 2026 00:00:00 GMT</pubDate>
      <description>Connect Suricata IDS alerts to automatic firewall blocking. Inner Warden promotes IDS alerts to incidents, AI decides, firewall blocks. The complete alert-to-block pipeline.</description>
      <category>Network IDS</category>
    </item>
    <item>
      <title>How to Protect Docker Containers from Runtime Attacks</title>
      <link>https://www.innerwarden.com/blog/docker-container-security</link>
      <guid isPermaLink="true">https://www.innerwarden.com/blog/docker-container-security</guid>
      <pubDate>Wed, 18 Mar 2026 00:00:00 GMT</pubDate>
      <description>Monitor Docker containers for OOM kills, rapid restarts, and escape attempts. Automatically pause compromised containers with a TTL-based recovery.</description>
      <category>Container Security</category>
    </item>
    <item>
      <title>How to Protect AI Agents Running on Your Server</title>
      <link>https://www.innerwarden.com/blog/protect-ai-agents-server</link>
      <guid isPermaLink="true">https://www.innerwarden.com/blog/protect-ai-agents-server</guid>
      <pubDate>Wed, 18 Mar 2026 00:00:00 GMT</pubDate>
      <description>AI agents run commands on your server. Inner Warden&apos;s check-command API validates commands before execution, scoring risk and blocking dangerous operations.</description>
      <category>AI Agent Security</category>
    </item>
    <item>
      <title>What Is Credential Stuffing and How to Stop It</title>
      <link>https://www.innerwarden.com/blog/credential-stuffing-protection</link>
      <guid isPermaLink="true">https://www.innerwarden.com/blog/credential-stuffing-protection</guid>
      <pubDate>Tue, 17 Mar 2026 00:00:00 GMT</pubDate>
      <description>Understand the difference between credential stuffing and brute-force attacks. Learn how to detect many-username attacks from a single IP and block them automatically.</description>
      <category>SSH Security</category>
    </item>
    <item>
      <title>How to Set Up Telegram Alerts for Server Security</title>
      <link>https://www.innerwarden.com/blog/telegram-server-security-alerts</link>
      <guid isPermaLink="true">https://www.innerwarden.com/blog/telegram-server-security-alerts</guid>
      <pubDate>Tue, 17 Mar 2026 00:00:00 GMT</pubDate>
      <description>Set up real-time Telegram notifications for server security events. Bot commands, inline approve/deny buttons, and AI-powered conversations about your server&apos;s status.</description>
      <category>Notifications</category>
    </item>
    <item>
      <title>What Happens When Your Server Gets Attacked: A Real 24-Hour Log</title>
      <link>https://www.innerwarden.com/blog/server-attack-24-hours</link>
      <guid isPermaLink="true">https://www.innerwarden.com/blog/server-attack-24-hours</guid>
      <pubDate>Tue, 17 Mar 2026 00:00:00 GMT</pubDate>
      <description>A real 24-hour narrative of attacks against a public VPS: SSH brute-force, web scanners, credential stuffing, and honeypot captures. All blocked automatically.</description>
      <category>Real-World Security</category>
    </item>
    <item>
      <title>How to Use AI for Server Security Without Giving It Root Access</title>
      <link>https://www.innerwarden.com/blog/ai-security-without-root</link>
      <guid isPermaLink="true">https://www.innerwarden.com/blog/ai-security-without-root</guid>
      <pubDate>Tue, 17 Mar 2026 00:00:00 GMT</pubDate>
      <description>Inner Warden&apos;s AI isolation model: the model reads data and returns JSON recommendations, Rust validates and executes. The model never sees a shell. Even a compromised model cannot harm your server.</description>
      <category>AI Safety</category>
    </item>
    <item>
      <title>Open Source Server Security Tools in 2026: A Practical Guide</title>
      <link>https://www.innerwarden.com/blog/open-source-server-security-2026</link>
      <guid isPermaLink="true">https://www.innerwarden.com/blog/open-source-server-security-2026</guid>
      <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
      <description>A practical overview of the best open source security tools for Linux servers in 2026: Falco, Suricata, osquery, fail2ban, and Inner Warden. How they work together in a unified stack.</description>
      <category>Security Stack</category>
    </item>
    <item>
      <title>How to Detect and Block Port Scanning on Your Server</title>
      <link>https://www.innerwarden.com/blog/detect-port-scanning</link>
      <guid isPermaLink="true">https://www.innerwarden.com/blog/detect-port-scanning</guid>
      <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
      <description>Learn what port scanning is, why attackers do it, how to detect it with sliding-window analysis, and how to automatically block scanners at the firewall.</description>
      <category>Network Security</category>
    </item>
    <item>
      <title>How to Detect Web Scanners (Nikto, sqlmap, Nuclei) on Your Server</title>
      <link>https://www.innerwarden.com/blog/detect-web-scanners</link>
      <guid isPermaLink="true">https://www.innerwarden.com/blog/detect-web-scanners</guid>
      <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
      <description>Detect automated web vulnerability scanners like Nikto, sqlmap, and Nuclei using user-agent signatures and HTTP error flood analysis. Auto-block and rate-limit via nginx.</description>
      <category>Web Security</category>
    </item>
    <item>
      <title>How to Monitor and Respond to sudo Abuse on Linux</title>
      <link>https://www.innerwarden.com/blog/monitor-sudo-abuse</link>
      <guid isPermaLink="true">https://www.innerwarden.com/blog/monitor-sudo-abuse</guid>
      <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
      <description>Detect sudo abuse patterns like burst privileged commands and lateral movement. Automatically suspend sudo access with a TTL and get Telegram alerts.</description>
      <category>Privilege Escalation</category>
    </item>
    <item>
      <title>How to Detect SSH Brute-Force Attacks on Your Linux Server</title>
      <link>https://www.innerwarden.com/blog/detect-ssh-brute-force</link>
      <guid isPermaLink="true">https://www.innerwarden.com/blog/detect-ssh-brute-force</guid>
      <pubDate>Sun, 15 Mar 2026 00:00:00 GMT</pubDate>
      <description>Learn how to detect SSH brute-force attacks in real time, why fail2ban alone is not enough, and how to set up automated blocking with AI-powered confidence scoring.</description>
      <category>SSH Security</category>
    </item>
    <item>
      <title>How to Set Up an SSH Honeypot That Captures Attacker Behavior</title>
      <link>https://www.innerwarden.com/blog/ssh-honeypot-setup</link>
      <guid isPermaLink="true">https://www.innerwarden.com/blog/ssh-honeypot-setup</guid>
      <pubDate>Sun, 15 Mar 2026 00:00:00 GMT</pubDate>
      <description>Set up an LLM-powered SSH honeypot that responds to attackers naturally, captures credentials and commands, and auto-blocks after the session ends.</description>
      <category>Honeypots</category>
    </item>
    <item>
      <title>How to Share Threat Intelligence: AbuseIPDB + Cloudflare Automatic Blocking</title>
      <link>https://www.innerwarden.com/blog/threat-intelligence-sharing</link>
      <guid isPermaLink="true">https://www.innerwarden.com/blog/threat-intelligence-sharing</guid>
      <pubDate>Sun, 15 Mar 2026 00:00:00 GMT</pubDate>
      <description>Automatically report blocked IPs to AbuseIPDB and push firewall rules to Cloudflare WAF. Detect, block, report, and protect other servers from the same attacker.</description>
      <category>Threat Intelligence</category>
    </item>
    <item>
      <title>Fail2ban vs Inner Warden: What’s the Difference?</title>
      <link>https://www.innerwarden.com/blog/fail2ban-vs-innerwarden</link>
      <guid isPermaLink="true">https://www.innerwarden.com/blog/fail2ban-vs-innerwarden</guid>
      <pubDate>Sun, 15 Mar 2026 00:00:00 GMT</pubDate>
      <description>A fair comparison of fail2ban and Inner Warden. Both block IPs from SSH brute-force, but Inner Warden adds stateful detection, AI triage, dashboards, Telegram alerts, honeypots, and threat intelligence sharing.</description>
      <category>Comparison</category>
    </item>
  </channel>
</rss>
