These are real audit artifacts generated by running awf locally:
sudo awf --allow-domains github.com,api.github.com \
--audit-dir /tmp/audit-sample \
--build-local \
-- bash -c 'curl -s https://api.github.com/zen; curl -s https://evil.example.com || true; sleep 2'| File | Description |
|---|---|
policy-manifest.json |
Structured description of all firewall rules with evaluation order |
access.log |
Squid access log in the firewall_detailed text format |
audit.jsonl |
Squid access log in structured JSONL format (machine-readable) |
squid.conf |
Generated Squid proxy configuration snapshot |
docker-compose.redacted.yml |
Container orchestration config with secrets replaced by [REDACTED] |
- In
access.log:TCP_TUNNEL:HIER_DIRECT= allowed,TCP_DENIED:HIER_NONE= blocked - In
audit.jsonl: Same data in JSON format, one object per line - In
policy-manifest.json: Rules evaluated top-to-bottom;deny-unsafe-portsanddeny-raw-ipv4come before domain rules - In
squid.conf: The actual ACL rules and log format directives - In
docker-compose.redacted.yml: NoteAWF_SQUID_CONFIG_B64: '[REDACTED]'— secrets are stripped