<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Maicon Ribeiro Esteves</title>
    <description>The latest articles on DEV Community by Maicon Ribeiro Esteves (@maicon_ribeiroesteves_32).</description>
    <link>https://dev.to/maicon_ribeiroesteves_32</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3923096%2F870e496b-cacb-431b-b463-c27277caad7c.jpg</url>
      <title>DEV Community: Maicon Ribeiro Esteves</title>
      <link>https://dev.to/maicon_ribeiroesteves_32</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/maicon_ribeiroesteves_32"/>
    <language>en</language>
    <item>
      <title>Inner Warden: A Lightweight Open Source eBPF EDR for Linux that Actually Blocks Attacks</title>
      <dc:creator>Maicon Ribeiro Esteves</dc:creator>
      <pubDate>Sun, 10 May 2026 09:54:20 +0000</pubDate>
      <link>https://dev.to/maicon_ribeiroesteves_32/inner-warden-a-lightweight-open-source-ebpf-edr-for-linux-that-actually-blocks-attacks-22fp</link>
      <guid>https://dev.to/maicon_ribeiroesteves_32/inner-warden-a-lightweight-open-source-ebpf-edr-for-linux-that-actually-blocks-attacks-22fp</guid>
      <description>&lt;h1&gt;
  
  
  Inner Warden: an autonomous eBPF security agent that fights back
&lt;/h1&gt;

&lt;p&gt;Most security tools only send alerts. Then someone has to wake up, read logs, and react.&lt;/p&gt;

&lt;p&gt;Inner Warden does it differently. It detects, decides, and blocks threats in real time, locally on your server, with a tiny footprint of around 29MB.&lt;/p&gt;

&lt;h2&gt;
  
  
  What it does
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;40+ eBPF kernel hooks (tracepoints, kprobes, LSM, XDP)&lt;/li&gt;
&lt;li&gt;Behavioral DNA tracking for processes and attackers&lt;/li&gt;
&lt;li&gt;On device anomaly detection with a small autoencoder&lt;/li&gt;
&lt;li&gt;Cross layer correlation between kernel, userspace, and network&lt;/li&gt;
&lt;li&gt;Wire speed blocking through XDP&lt;/li&gt;
&lt;li&gt;Automatic honeypot, JA3/JA4 fingerprinting, Sigma and YARA rules&lt;/li&gt;
&lt;li&gt;Mesh network between nodes, so when one detects, all the others block&lt;/li&gt;
&lt;li&gt;Dry run mode is the default, so it is safe to test&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Who is it for
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Self hosters and homelab people&lt;/li&gt;
&lt;li&gt;Anyone running a Linux server exposed to the internet&lt;/li&gt;
&lt;li&gt;Developers running AI agents (LangChain, CrewAI, OpenAI tools, and similar)&lt;/li&gt;
&lt;li&gt;SREs and sysadmins who want autonomous response instead of 3am alerts&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Live demo
&lt;/h2&gt;

&lt;p&gt;You can watch a real server getting attacked right now here:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.innerwarden.com/live" rel="noopener noreferrer"&gt;https://www.innerwarden.com/live&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;There are scripts on the page if you want to try the attacks yourself.&lt;/p&gt;

&lt;h2&gt;
  
  
  One command install
&lt;/h2&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;curl &lt;span class="nt"&gt;-fsSL&lt;/span&gt; https://innerwarden.com/install | &lt;span class="nb"&gt;sudo &lt;/span&gt;bash
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;It starts in dry run mode, so nothing is blocked until you decide.&lt;/p&gt;

&lt;h2&gt;
  
  
  Links
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;GitHub: &lt;a href="https://github.com/InnerWarden/innerwarden" rel="noopener noreferrer"&gt;https://github.com/InnerWarden/innerwarden&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Website: &lt;a href="https://www.innerwarden.com" rel="noopener noreferrer"&gt;https://www.innerwarden.com&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Live attack demo: &lt;a href="https://www.innerwarden.com/live" rel="noopener noreferrer"&gt;https://www.innerwarden.com/live&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The project is under active development (currently v0.13.1) and I am looking for contributors, specially people with experience in:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Low level Rust and eBPF&lt;/li&gt;
&lt;li&gt;Detection engineering and red teaming&lt;/li&gt;
&lt;li&gt;Testing and real world scenarios&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If you like Rust, eBPF, cybersecurity, or self hosted infrastructure, I would really love your feedback. Try it, break it, open issues. Every bug report helps a lot.&lt;/p&gt;

&lt;p&gt;Thanks for reading.&lt;/p&gt;

</description>
      <category>rust</category>
      <category>ebpf</category>
      <category>cybersecurity</category>
      <category>opensource</category>
    </item>
  </channel>
</rss>
