verified_user

Security Lab: Admin Console

Identity: Verifying JWT...
Identity-Aware Session Active

Zero Trust Deep Dive

You have bypassed the public perimeter. This dashboard demonstrates the specific security engineering choices I implemented to protect this environment using 100% Cloudflare-native technology.

fingerprint

Layer 7 Identity Proxy (ZTNA)

This subdomain is hidden from the public internet. Access is granted only via JSON Web Token (JWT) validation after successful GitHub OAuth authentication.

Engineering Note: This eliminates the need for a VPN and prevents credential-stuffing attacks on the application origin.
bolt

Edge Logic (Cloudflare Workers)

A Worker sits in front of this site, acting as a programmable gateway to harden responses and analyze traffic in real-time.

Your Edge IP Scanning...
Request Origin Scanning...
CF-Ray ID Scanning...
Active Security Headers
Analyzing headers...
shield_lock

WAF Enforcement (L3-L7)

I have configured custom Web Application Firewall rules to mitigate common attack vectors including XSS, SQLi, and unauthorized path enumeration.

XSS Filtering Bot Fight Mode Country Blocking