Layout

Shadow Daemon intercepts requests after they are parsed by the target language or framework but before they are processed by the target application. This is achieved by injecting a small connector into the application that forwards all relevant information about the request to the shadowd server. The server processes and analyzes the data with the blacklist, whitelist, and integrity check and returns the identifiers of dangerous input. The connector uses the identifiers to defuse all threats and, unless the request is completely blocked, the originally requested resource of the target application is loaded.

Layout