GuardRail

Keeps you from going off the edge.
SCAN: 2026-04-20T03:41:09Z
8/12
Nodes Up
0
Critical
2
Medium
5
Low
108
Provider Patterns
0
Violations Today
13
Active Sessions
CLEAR
BlackIce Status
Threat Map / Fleet Nodes
lucidia
UP 14d
alice
UP 31d
aria
UP 7d
cecilia
UP 22d
gaia
UP 9d
anastasia
UP 3d
gematria
UP 45d
atticus
UP 12d
helios
DOWN
nyx
DOWN
selene
DOWN
kronos
DOWN
Firewall Rules
SourceDestPortAction
10.0.0.0/8*.blackroad.io443ALLOW
172.16.0.0/12roadtrip.local8094ALLOW
0.0.0.0/0admin.blackroad.io22DENY
0.0.0.0/0*.blackroad.io80DENY
192.168.1.0/24registry.local3101ALLOW
0.0.0.0/0*.blackroad.io443ALLOW
45.33.0.0/16**DENY
198.51.100.0/24**DENY
Audit Log
03:41:09atticusSCAN completed fleet-wide vulnerability assessment
03:38:22gematriaROTATED wireguard keypair for tunnel-07
03:35:01aliceRENEWED cert for roadtrip.blackroad.io (90d)
03:30:44ceciliaBLOCKED 3 requests from 45.33.12.91
03:28:17ariaVERIFIED provider wall patterns (108 active)
03:25:00systemHEARTBEAT all 8 active nodes responding
03:20:33atticusAUDITED token expiry for 13 sessions
03:15:11gaiaUPDATED firewall rule: deny 198.51.100.0/24
03:10:45lucidiaSYNCED compliance checklist (SOC2 updated)
03:05:22anastasiaSCRUBBED 0 provider violations from queue
03:00:00systemCRON daily cert expiry check initiated
02:55:18alicePATCHED CVE-2026-1142 on registry service
02:50:01atticusREJECTED login attempt from unknown IP
02:45:33gematriaLOGGED bandwidth anomaly on tunnel-03 (resolved)
Vulnerability Scanner
Buffer overflow in libcurlCVE-2026-1142
MEDIUM - patched 02:55
TLS renegotiation weaknessCVE-2026-0891
MEDIUM - mitigation applied
DNS cache poisoning vectorCVE-2026-0734
LOW - monitoring
HTTP/2 rapid reset variantCVE-2026-0622
LOW - edge mitigated
Stale session token reuseCVE-2026-0518
LOW - TTL reduced to 15m
CORS misconfigurationCVE-2026-0411
LOW - headers corrected
Log injection via user-agentCVE-2026-0305
LOW - sanitizer added
Identity / Active Sessions
alexa (human)SSHexp 18:00
atticusagentexp 04:00
gematriaagentexp 04:00
aliceagentexp 04:00
ariaagentexp 04:00
ceciliaagentexp 04:00
gaiaagentexp 04:00
anastasiaagentexp 04:00
lucidiaagentexp 04:00
roadtrip-hubserviceexp 06:00
roadcode-apiserviceexp 06:00
registryserviceexp 06:00
gatewayserviceexp 06:00
Failed logins (24h): 3 | Last: 02:50 from 91.234.17.xx
Provider Wall / One-Way Tickets
Active patterns108
Violations today0
Last scrub03:05:22
Scrub count (24h)288
Patterns added (7d)3
False positives (7d)0
Coverage100%
Engine version2.4.1
Wall integrity: nominal. No bypass attempts detected.
BlackIce / Zero-Day Detection
Threat Level
CLEARELEVATEDCRITICAL
Status: No threats detected
Last zero-day scan: 03:41:09Z
Heuristic engine: active
Behavioral analysis: nominal
Anomaly score: 0.02/1.00
Network / WireGuard Tunnels
tunnel-01 (alice)12.4 MB/s
tunnel-02 (lucidia)8.7 MB/s
tunnel-03 (gaia)3.2 MB/s
tunnel-04 (cecilia)5.1 MB/s
tunnel-05 (aria)7.9 MB/s
tunnel-06 (anastasia)2.8 MB/s
tunnel-07 (gematria)15.3 MB/s
tunnel-08 (atticus)4.6 MB/s
Connected peers: 8/12 | Total BW: 60.0 MB/s | Handshake: <2m ago
Certificates / SSL Expiry
blackroad.io87d
roadtrip.blackroad.io90d
roadcode.blackroad.io82d
brand.blackroad.io74d
os.blackroad.io71d
pay.blackroad.io68d
chain.blackroad.io65d
registry.blackroad.io60d
search.blackroad.io58d
api.blackroad.io55d
docs.blackroad.io52d
status.blackroad.io49d
portal.blackroad.io45d
labs.blackroad.io42d
cdn.blackroad.io38d
mail.blackroad.io33d
auth.blackroad.io21d
vault.blackroad.io18d
edge.blackroad.io14d
mesh.blackroad.io11d
Compliance
SOC2 Type II[x] Audit logged
SOC2 Type II[x] Access reviewed
SOC2 Type II[x] Encryption at rest
HIPAA[x] PHI isolated
HIPAA[x] BAA signed
HIPAA[x] Breach plan
FedRAMP[x] Boundary defined
FedRAMP[x] FIPS 140-2
FedRAMP[x] Continuous monitoring
GDPR[x] Data map current
GDPR[x] DPA executed
PCI-DSS[x] Cardholder isolated