Skip to content
View nevinshine's full-sized avatar
:octocat:
Building Sentinel
:octocat:
Building Sentinel

Block or report nevinshine

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
nevinshine/README.md
nevin@fedora-lab:~$ ./fetch_status --deep-scan --verbose

      ███╗   ██╗ ███████╗ ██╗   ██╗ ██╗ ███╗   ██╗
      ████╗  ██║ ██╔════╝ ██║   ██║ ██║ ████╗  ██║
      ██╔██╗ ██║ █████╗   ██║   ██║ ██║ ██╔██╗ ██║
      ██║╚██╗██║ ██╔══╝   ╚██╗ ██╔╝ ██║ ██║╚██╗██║
      ██║ ╚████║ ███████╗  ╚████╔╝  ██║ ██║ ╚████║
      ╚═╝  ╚═══╝ ╚══════╝   ╚═══╝   ╚═╝ ╚═╝  ╚═══╝

  -----------------[ SMALL STATS ]-----------------

  USER       nevinshine
  ROLE       Systems Security Research Engineer
  HOST       Fedora Linux 43 (Custom Kernel 6.18.7)
  CONTEXT    System Security Researcher (CS Undergrad)

  -----------------[ CURRENT OBJECTIVE ]-----------

  TASK       Unified Runtime Migration (v3.2)
  STATUS     Refactoring ptrace(2) logic to LSM BPF.
             Benchmarking XDP drop rates on kernel 6.18.

  -----------------[ SYSTEM COMPONENTS ]-----------

  [SENSOR]   Browser Eye ... DOM-based Semantic Taint Tracking
  [BRAIN]    Cortex ........ gRPC Intent Verification (Python)
  [CORE]     Sentinel ...... LSM Hooks (bprm_check_security)
  [EDGE]     Hyperion ...... XDP Packet Drop (Zero-Copy)

  -----------------[ ACTIVE RESEARCH LAB ]---------

  [SENTINEL] Runtime Defense Engine
             └─ CORE:   C, Rust, eBPF (LSM Hooks)
             └─ DESC:   Maps syscall arguments to process intent using 
                        eBPF LSM hooks. Detects data exfiltration and 
                        injection without context switching.
                        (Zero overhead on the hot path).

  [HYPERION] Network Security Layer
             └─ CORE:   C, eBPF (XDP), Python
             └─ DESC:   Attaches directly to NIC driver. Inspects L7 
                        payloads and drops hostile packets before SKB 
                        allocation (Zero-Copy enforcement).

  [VAULT]    Security Control Plane
             └─ CORE:   SQL, Access Logic, gRPC
             └─ DESC:   Authoritative backend for the defense grid. 
                        Handles dynamic policy distribution, logging, 
                        and real-time enforcement updates.

  [KERNEL]   Custom Research Builds
             └─ HOST:   Fedora 43, Kernel 6.18
             └─ DESC:   Namespace experiments, cgroup v2 resource 
                        isolation, seccomp filter crafting, and 
                        distro rice configs.

  -----------------[ BINARY ARSENAL ]--------------

  LANGUAGES  C, Go, Rust, Python, x86 Assembly
  KERNEL     eBPF, LSM Hooks, XDP, Namespaces, cgroups v2
  NETWORKING TC-BPF, Protobuf, gRPC, L7 Dissection
  DEBUG      GDB, bpftool, strace, Wireshark, perf
  INTERESTS  Kernel Hacking, Distro Ricing, Poetry

  -----------------[ CONTACT UPLINK ]--------------

  EMAIL      nevinshine05@outlook.com
  LINKEDIN   linkedin.com/in/nevin-shine-b403b932b
  GITHUB     github.com/nevinshine

nevin@fedora-lab:~$ uptime
  up 20y — hacking kernels, no swap needed.

nevin@fedora-lab:~$ _

Pinned Loading

  1. sentinel-runtime sentinel-runtime Public template

    Runtime Malware Analysis Engine using Linux ptrace & Isolation Forests.

    C 1

  2. hyperion-xdp hyperion-xdp Public

    High-performance stateful network defense using eBPF/XDP. The Network Satellite for the Sentinel Runtime research system.

    C 4 1

  3. telos-runtime telos-runtime Public

    A closed-loop security runtime preventing "The Great Exfiltration" and Indirect Prompt Injection in Autonomous AI Agents.

    Python 1

  4. system-security-research-dossier system-security-research-dossier Public

    The Systems Security Research Dossier documents my unified runtime verification architecture. It features Sentinel, a closed-loop host defense using ptrace for active blocking, and Hyperion, a high…

    Python