Skip to content

Integrity Check

🛡️ File Information

Property Value
Binary Name integrity-check
Version 9.0.1
File Size 9.4MB
Author Warith Al Maawali
License Proprietary
Category Security & Authentication
Description A system integrity checker for verifying script and configuration files
JSON Data View Raw JSON

SHA256 Checksum

9113f3eba4d7d97c75825269d254e6c2ee4f7f7b333e84ae489a36caec487c21

🛡️ Key Features

Integrity Verification

Feature Description
Hash Verification SHA256 checksums for all tracked files
Signature Validation Cryptographic signatures prevent forgery
Version Tracking Compares local vs remote package versions
Configuration Auditing Validates config file syntax and security

Why Integrity Check is Essential

Benefit Description
Tamper Detection Immediately identifies modified system files
Malware Prevention Detects unauthorized changes to binaries
Security Auditing Regular verification ensures system integrity
Compliance Maintains audit trail of system modifications

🛡️ ⚡ TL;DR - Essential Commands

# Verify integrity of all tracked files
sudo integrity-check check_integrity

# Generate new baseline hashes
sudo integrity-check generate

# Verify cryptographic signatures
integrity-check check_signatures

# Run comprehensive check (integrity + versions + signatures)
integrity-check check_all

# View recent integrity logs
integrity-check view_logs

🛡️ Understanding System Integrity

How Integrity Checking Works

Integrity Check maintains a database of known-good file hashes and compares them against current files:

# Check integrity of all system files
sudo integrity-check check_integrity

What Gets Checked:

Location Description
System Binaries /usr/bin, /usr/sbin
Dashboard Scripts dashboard/hooks/
Configuration Files /etc/
Kodachi Binaries Kodachi-specific binaries and tools

Generating Baselines

After fresh installation or verified updates:

# Generate new hash database
sudo integrity-check generate

This creates a baseline of all file hashes that future checks compare against.

Signature Verification

Verify cryptographic signatures on signed files:

# Check all file signatures
integrity-check check_signatures

Signatures ensure files haven't been modified since signing by Kodachi developers.

Version Checking

Compare local package versions with remote repositories:

# Check if packages are up-to-date
integrity-check check_version

Identifies outdated packages that may have security vulnerabilities.

Configuration Validation

Verify configuration file integrity and syntax:

# Validate all config files
integrity-check check_config

Ensures configuration files haven't been corrupted or maliciously modified.

Comprehensive Security Audit

Run all checks in sequence:

# Complete system integrity audit
integrity-check check_all

This performs: 1. File integrity verification 2. Signature validation 3. Version checking 4. Configuration auditing

Viewing Audit Logs

# View recent integrity check results
integrity-check view_logs

# View logs with verbose details
integrity-check view_logs --verbose

Interpreting Results

Result Status:

Status Meaning
✓ PASS File matches known-good hash
✗ FAIL File has been modified
⚠ WARNING File missing or new file detected
🔒 SIGNED Valid cryptographic signature

JSON Output Examples:

# Get results in JSON format for automation
integrity-check check_integrity --json
integrity-check check_signatures --json

# Parse results with jq
integrity-check check_all --json | jq '.failed_files[]'
integrity-check check_all --json | jq '.summary.total_failures'

Common Modifications to Investigate:

Type Description
Binary Files Modified binaries in system directories
Script Changes Script modifications in hooks directory
Config Changes Unexpected configuration changes
New Files New files in sensitive locations

🛡️ Advanced Commands

For advanced users who need access to all available commands and options, please refer to the auto-generated command reference which includes:

Feature Description
Custom Paths Custom file path specifications
Hash Algorithms Hash algorithm selection
Incremental Checks Incremental checking options
Network Verification Network verification settings
Validation Modes Strict validation modes
JSON Formatting JSON output formatting
CLI Reference All command-line flags and parameters

🛡️ Security Notes

Important Security Practices:

Practice Description
Post-Update Checks Run integrity checks after system updates
Trusted Baselines Generate new baselines only on trusted systems
Immediate Investigation Investigate all failed integrity checks immediately
Key Updates Keep signature keys updated
Regular Audits Run comprehensive checks regularly
Log Retention Save logs for security audits

🛡️ Performance

Metric Value
Check Time 10-30 seconds for full scan
Memory Usage ~40MB during scanning
CPU Usage < 20% during checks
Database Size ~10MB for hash storage
Network Usage Minimal (version checks only)

🛡️ Support

Resource Link
Website digi77.com
Anonymity Verifier kodachi.cloud
Discord Support discord.gg/KEFErEx
GitHub github.com/WMAL

Back to top