Eden Core
Universal Source Code Protection System
Overview
Eden Core is a universal source code protection system that uses enterprise-grade cryptography (secp256k1 elliptic curve) to protect source code files from various programming languages. It provides enterprise-grade security with advanced features like multi-signature authentication, time-based access control, ownership management, and programmable access policies.

Universal Source Code Protection System
Advanced cryptographic protection using secp256k1 elliptic curve cryptography
Features
Core Security
- secp256k1 Elliptic Curve - Enterprise-grade cryptography
- XOR Encryption with ECDH - Key derivation from elliptic curve operations
- Multi-layer Protection - Configurable security layers
- Advanced Features: MultiAuth, TimeLock, Ownership control, PolicyScript
Language Support
- Universal: Python, PHP, JavaScript, Go, Java, Ruby, Perl
- Cross-platform: Windows, macOS, Linux
- Runtime Protection: Files remain encrypted at rest
Quick Start
Installation
git clone https://github.com/purwowd/eden-core.git
cd eden-core
make build
Basic Usage
# 1. Protect a file
./bin/eden -protect -input app.py -output ./protected
# 2. Run protected file (Two Options Available)
# Option A: Using eden -run (CLI with full control)
./bin/eden -run -input protected/files/[file_id].eden
# Option B: Using eden-run (Simplified execution)
./bin/eden-run protected/files/[file_id].eden
# Show examples
./bin/eden -examples
Running Protected Applications
Eden Core provides two ways to execute protected applications:
Method 1: eden -run (CLI Interface)
# Basic execution
eden -run -input myapp.eden
# With verbose output for debugging
eden -run -input myapp.eden -verbose
# Silent mode (no banner)
eden -run -input myapp.eden -quiet
Method 2: eden-run (Simplified Execution)
# Direct execution (most convenient)
eden-run myapp.eden
# Silent mode
eden-run -q myapp.eden
# Get help
eden-run --help
When to Use Which?
| Scenario |
Recommended |
Reason |
| Development & Debugging |
eden -run |
More control and verbose options |
| Production Deployment |
eden-run |
Cleaner, simpler syntax |
| CI/CD Pipelines |
eden-run |
Less complex command structure |
| System Integration |
eden-run |
Can be installed system-wide |
System-wide Installation
# Install eden-run globally for easier access
make install-runner
# Now you can run .eden files from anywhere
eden-run /path/to/any/protected/app.eden
Understanding Protection Output
When you protect a file, Eden Core generates a unique structure:
# Protect a file
eden -protect -input app.py -output ./protected
# Expected output:
# Protected file stored: ./protected/files/a1b2c3d4e5f6.eden
# Key file stored: ./protected/keys/a1b2c3d4e5f6.key
# File ID: a1b2c3d4e5f6
The protection process creates:
- Protected file:
./protected/files/[file_id].eden - Encrypted source code
- Key file:
./protected/keys/[file_id].key - Cryptographic keys
- File ID:
[file_id] - Unique identifier for the protected file
Complete Documentation
π User Guide - Complete documentation including:
- Installation & Quick Start
- Usage Guide & Examples
- Performance Optimization
- Security Features
- Troubleshooting & Best Practices
- Advanced Features & API Reference
Command Line Interface
Protection Commands
# Basic protection
eden -protect -input <file> -output <dir>
# Advanced protection with MultiAuth
eden -protect -input <file> -multiauth '2-of-3' -signers 'key1,key2,key3'
# Time-locked protection
eden -protect -input <file> -timelock '+24h'
# Ownership-based protection
eden -protect -input <file> -ownership-mode -ownership-value 1000000
Execution Commands
# Method 1: Full CLI control
eden -run -input <protected-file.eden>
eden -run -input <protected-file.eden> -verbose
eden -run -input <protected-file.eden> -quiet
# Method 2: Simplified execution
eden-run <protected-file.eden>
eden-run -q <protected-file.eden> # Quiet mode
eden-run --help # Help information
Management Commands
# Deprotect files
eden -deprotect -input <protected-file> -keyfile <keyfile> -output <dir>
# Show available examples
eden -examples
# Security analysis
eden -security
# Performance benchmarks
eden -benchmark
Practical Examples
# Complete workflow example
eden -protect -input webapp.py -output ./secure/
eden-run secure/files/abc123def.eden
# Advanced security workflow
eden -protect -input critical-app.py -multiauth '2-of-3' -timelock '+7days'
eden -run -input protected/files/xyz789.eden -verbose
# Production deployment
eden -protect -input production-app.py -output /opt/secure/
sudo eden-run /opt/secure/files/production.eden
Configuration
Environment variables:
export EDEN_LOG_LEVEL=info
export EDEN_SECURITY_MAX_FILE_SIZE=104857600
export EDEN_STORAGE_BASE_PATH=./data
Architecture
Project Structure
eden-core/
βββ cmd/eden/ # CLI application
βββ pkg/
β βββ core/ # Protection engine
β βββ crypto/ # Cryptographic operations
β βββ network/ # Network security
βββ internal/
β βββ config/ # Configuration management
β βββ storage/ # Storage management
βββ examples/ # Usage examples
βββ tests/ # Test suite
Security Stack
Input Validation β MultiAuth/TimeLock/Ownership β XOR+ECDH β secp256k1 β Encrypted Storage
Security Specification
| Component |
Implementation |
| Symmetric Encryption |
XOR with ECDH-derived keys |
| Asymmetric Crypto |
secp256k1 Elliptic Curve |
| Key Derivation |
ECDH + SHA-256 |
| Digital Signatures |
ECDSA |
| Security Level |
256-bit |
Testing
# Run tests
make test
# Run benchmarks
go test -bench=. ./pkg/core/
# Coverage report
go test -coverprofile=coverage.out ./...
Docker Support
docker build -t eden-core .
docker run -v $(pwd):/workspace eden-core -protect -input /workspace/app.py
| Operation |
Performance |
| File Protection |
~1000 files/second |
| Encryption |
~50MB/second |
| Key Generation |
~500 keys/second |
License
MIT License - see LICENSE file for details.
Support
Built with Go for Enterprise Security