Identity-Aware Session Active
Zero Trust Deep Dive
You have bypassed the public perimeter. This dashboard demonstrates the specific security engineering choices I implemented to protect this environment using 100% Cloudflare-native technology.
fingerprint
Layer 7 Identity Proxy (ZTNA)
This subdomain is hidden from the public internet. Access is granted only via JSON Web Token (JWT) validation after successful GitHub OAuth authentication.
Engineering Note: This eliminates the need for a VPN and prevents credential-stuffing attacks on the application origin.
bolt
Edge Logic (Cloudflare Workers)
A Worker sits in front of this site, acting as a programmable gateway to harden responses and analyze traffic in real-time.
Your Edge IP
Scanning...
Request Origin
Scanning...
CF-Ray ID
Scanning...
Active Security Headers
Analyzing headers...
shield_lock
WAF Enforcement (L3-L7)
I have configured custom Web Application Firewall rules to mitigate common attack vectors including XSS, SQLi, and unauthorized path enumeration.
XSS Filtering
Bot Fight Mode
Country Blocking