Sentinel V2 is a comprehensive security analysis tool that scans URLs and files for potential threats using AI-powered analysis and hardware-level isolation.
Live Demo Link: https://drive.google.com/file/d/1jy5iANMI_XVaP-9raeXwklDTjbCV2huM/view?usp=drive_link
- URL Scanning: LLM-powered phishing detection with domain whitelisting
- File Scanning: Firecracker microVM isolation for behavioral analysis
- Threat Scoring: Risk levels (LOW/MEDIUM/HIGH) with confidence scores
- Real-time Protection: Browser extension with automatic scanning
- CLI Tool - Command-line scanner for URLs and files
- Chrome Extension - Real-time browser protection
- Rust Backend - Firecracker-based file analysis
- Python Bridge - Native messaging for extension-backend communication
- ✅ Threat scoring (0-100 scale)
- ✅ Risk indicators and detailed analysis
- ✅ Scan history and statistics
- ✅ CSV/JSON export
- ✅ Persistent local logging
- ✅ Warning modals for high-risk threats
- ✅ Dashboard with analytics
- Windows 10/11 with WSL2 (Ubuntu)
- Chrome Browser
- Rust (latest stable)
- Python 3.8+
- Firecracker (for file scanning)
wsl
sudo apt-get update
sudo apt-get install -y build-essential curl python3 python3-pip wgetcurl --proto '=https' --tlsv1.2 -sSf https://sh.rustup.rs | sh
source $HOME/.cargo/envcd ~/sentinel_v2
pip3 install click requestscd ~/sentinel_v2/linux-backend
cargo build --releasecd ~/sentinel_v2/linux-backend
chmod +x firecracker_setup.sh
./firecracker_setup.sh- Open Chrome:
chrome://extensions/ - Enable "Developer mode"
- Click "Load unpacked"
- Select:
C:\Users\YourName\Downloads\sentinel_v2\sentinel_v2\extension
Double-click: sentinel_v2\host-bridge\register_host.reg
Scan URL:
.\sentinel.bat scan-url "https://example.com"Scan File:
.\sentinel.bat scan-file "/mnt/c/Users/YourName/file.exe"- Click Sentinel V2 icon in toolbar
- Enter URL or file path
- Click "Scan URL" or "Scan File"
- View results in popup
- Click "View Dashboard" for history
Set in host-bridge/bridge.py:
HF_TOKEN- Hugging Face API tokenVT_API_KEY- VirusTotal API key
- WSL:
~/sentinel_v2/logs/scan_history.json - Windows:
\\wsl$\Ubuntu\home\{user}\sentinel_v2\logs\scan_history.json
sentinel_v2/
├── cli_app/ # Python CLI application
│ ├── sentinel.py # Main CLI script
│ └── log_manager.py # File logging
├── linux-backend/ # Rust backend
│ └── src/main.rs # Firecracker integration
├── host-bridge/ # Native messaging bridge
│ ├── bridge.py # Python bridge script
│ └── launcher.bat # Windows launcher
├── extension/ # Chrome extension
│ ├── popup.html # Extension popup
│ ├── dashboard.html # Dashboard UI
│ └── warning.html # Threat warning modal
└── logs/ # Scan logs (auto-generated)
- LLM Analysis - AI-powered URL threat detection
- Pattern Matching - Keyword and TLD analysis
- Firecracker MicroVM - Hardware-isolated file execution
- Domain Whitelist - Trusted site verification
- Phishing URL patterns
- Suspicious file extensions
- Malicious behavior analysis
- Double extension detection
# Re-register native host
reg import sentinel_v2\host-bridge\register_host.reg# Add user to kvm group
sudo usermod -aG kvm $USER
# Restart WSL
wsl --shutdown# Create logs directory
mkdir -p ~/sentinel_v2/logs- CSV: Spreadsheet-compatible format
- JSON: Full data with statistics
- Scans:
chrome.storage.local - Logs:
~/sentinel_v2/logs/scan_history.json
# Test URL scan
.\sentinel.bat scan-url "https://google.com"
# Test file scan
.\sentinel.bat scan-file "/home/user/testfile"wsl
cd ~/sentinel_v2/linux-backend
cargo build --releaseMIT License
Sentinel V2 Development Team
For issues and feature requests, please open an issue on GitHub.