If you are using CPAN to install the module you do not have to download the source code manually. Stable releases of the source code can be found on the download page or on Github.

git clone


You can install the modules with CPAN.

cpan -i Shadowd::Connector

Or by hand.

perl Makefile.PL
make install


To protect CGI applications you simply have to load the module.

use Shadowd::Connector::CGI;

This can be automated by executing Perl scripts with:

perl -mShadowd::Connector::CGI


Mojolicious applications require a small modification. It is necessary to create a hook to intercept requests.

use Shadowd::Connector::Mojolicious;

sub startup {
  my $app = shift;

  $app->hook(before_dispatch => sub {
    my $self = shift;
    return Shadowd::Connector::Mojolicious->new($self)->start();

  # ...


Mojolicious::Lite applications require a small change as well.

use Shadowd::Connector::Mojolicious;

under sub {
  my $self = shift;
  return Shadowd::Connector::Mojolicious->new($self)->start();

The connector is only executed if the request matches a route.


Copy the configuration file from misc/examples/connectors.ini to /etc/shadowd/connectors.ini and edit it. The file is annotated and should be self-explanatory, but if you are stuck you can find more information in the documentation. Make sure that it is readable by the web server user, otherwise your site will not work anymore.

If you plan to protect multiple applications you can use the environment variable SHADOWD_CONNECTOR_CONFIG to specify different configuration files for every target.

Ignore sensitive input!

You should use the ignore function of the connector to disregard very sensitive input, e.g., passwords.

What’s next?

You have successfully installed Shadow Daemon, now you can start with the configuration. If you do not know how to configure Shadow Daemon check out the tutorial about rules.