User-space deployment
No kernel hooks, packet tampering, or special cloud account required. Run it in front of an HTTP service.
Open-source alpha - v0.4.1
Always-on bot deflection for small HTTP services.
Put a local reverse proxy in front of your app. Clean traffic passes through. Known probes and low-end abuse get harmless mirror responses that waste bot effort without a cloud account, kernel hooks, or retaliation.
Small services get scraped, scanned, and shoved around before they have a security team. Net Ward gives them a local buffer that behaves like infrastructure, not theater.
Operating model
Net Ward is built for teams that need a practical buffer in front of a small service. It is not a cloud WAF and it is not a hostile countermeasure. It is a local reverse proxy that classifies request shape and routes known abuse into safe, plausible mirrors.
Forwarded to the upstream service.
Matched against bundled or operator patterns.
Returns harmless fake pages, redirects, or status shapes.
No kernel hooks, packet tampering, or special cloud account required. Run it in front of an HTTP service.
Mirror responses are normal HTTP responses. No malware, no retaliation, no collection of submitted secrets.
Ship with bundled probe patterns, disable collisions, and add local patterns with insertion-time validation.
Includes an operator load generator to measure latency, error rates, and process resource behavior.
Quick start
Point `upstream_target` at the service you want to protect, then put Net Ward in front of it.
pip install -e .
python -m netward --config example_config.json
Proof
Net Ward v0.4.1 shipped only after an internal pre-launch security review found and closed the launch-blocking issues. The public release includes the patch notes, known limitations, and operator guidance instead of asking users to trust a vague claim.
Published from commit a14414f after the security patch.
Full local suite was green before launch.
Basic Auth loop, flood self-denial, and 502 deception oracle were fixed.
Fingerprinting, detection, install path, supply chain, and runtime load.
Known limits
Net Ward is an alpha. The changelog documents the boundaries operators need to plan around: regex policy is best-effort static analysis in v0.4.1, reverse-proxy source awareness is deferred, Windows DB ACL enforcement is deferred, and coordinated low-rate multi-source floods are v0.5 work.
Support the work
Net Ward is open-source alpha software. Sponsorship helps fund testing, documentation, and the v0.5 work already called out in the changelog.
No. It is a small reverse-proxy deception layer. It does not replace application security or a full edge stack.
No. Net Ward returns harmless HTTP responses. The mirror layer is meant to deflect automated abuse, not retaliate.
The design goal is fail open: classification, storage, or mirror failures should pass traffic to upstream.
Small teams running HTTP services that want a practical, local deflection layer and are comfortable operating alpha software.
Ready to inspect it?