eden-core

module
v0.0.0-...-ffa7aea Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Jun 29, 2025 License: MIT

README ΒΆ

Eden Core

Universal Source Code Protection System

Overview

Eden Core is a universal source code protection system that uses enterprise-grade cryptography (secp256k1 elliptic curve) to protect source code files from various programming languages. It provides enterprise-grade security with advanced features like multi-signature authentication, time-based access control, ownership management, and programmable access policies.

Go Version

Universal Source Code Protection System

Advanced cryptographic protection using secp256k1 elliptic curve cryptography


Features

Core Security
  • secp256k1 Elliptic Curve - Enterprise-grade cryptography
  • XOR Encryption with ECDH - Key derivation from elliptic curve operations
  • Multi-layer Protection - Configurable security layers
  • Advanced Features: MultiAuth, TimeLock, Ownership control, PolicyScript
Language Support
  • Universal: Python, PHP, JavaScript, Go, Java, Ruby, Perl
  • Cross-platform: Windows, macOS, Linux
  • Runtime Protection: Files remain encrypted at rest

Quick Start

Installation
git clone https://github.com/purwowd/eden-core.git
cd eden-core
make build
Basic Usage
# 1. Protect a file
./bin/eden -protect -input app.py -output ./protected

# 2. Run protected file (Two Options Available)

# Option A: Using eden -run (CLI with full control)
./bin/eden -run -input protected/files/[file_id].eden

# Option B: Using eden-run (Simplified execution)
./bin/eden-run protected/files/[file_id].eden

# Show examples
./bin/eden -examples
Running Protected Applications

Eden Core provides two ways to execute protected applications:

Method 1: eden -run (CLI Interface)
# Basic execution
eden -run -input myapp.eden

# With verbose output for debugging
eden -run -input myapp.eden -verbose

# Silent mode (no banner)
eden -run -input myapp.eden -quiet
Method 2: eden-run (Simplified Execution)
# Direct execution (most convenient)
eden-run myapp.eden

# Silent mode
eden-run -q myapp.eden

# Get help
eden-run --help
When to Use Which?
Scenario Recommended Reason
Development & Debugging eden -run More control and verbose options
Production Deployment eden-run Cleaner, simpler syntax
CI/CD Pipelines eden-run Less complex command structure
System Integration eden-run Can be installed system-wide
System-wide Installation
# Install eden-run globally for easier access
make install-runner

# Now you can run .eden files from anywhere
eden-run /path/to/any/protected/app.eden
Understanding Protection Output

When you protect a file, Eden Core generates a unique structure:

# Protect a file
eden -protect -input app.py -output ./protected

# Expected output:
# Protected file stored: ./protected/files/a1b2c3d4e5f6.eden
# Key file stored: ./protected/keys/a1b2c3d4e5f6.key
# File ID: a1b2c3d4e5f6

The protection process creates:

  • Protected file: ./protected/files/[file_id].eden - Encrypted source code
  • Key file: ./protected/keys/[file_id].key - Cryptographic keys
  • File ID: [file_id] - Unique identifier for the protected file
Complete Documentation

πŸ“– User Guide - Complete documentation including:

  • Installation & Quick Start
  • Usage Guide & Examples
  • Performance Optimization
  • Security Features
  • Troubleshooting & Best Practices
  • Advanced Features & API Reference

Command Line Interface

Protection Commands
# Basic protection
eden -protect -input <file> -output <dir>

# Advanced protection with MultiAuth
eden -protect -input <file> -multiauth '2-of-3' -signers 'key1,key2,key3'

# Time-locked protection
eden -protect -input <file> -timelock '+24h'

# Ownership-based protection
eden -protect -input <file> -ownership-mode -ownership-value 1000000
Execution Commands
# Method 1: Full CLI control
eden -run -input <protected-file.eden>
eden -run -input <protected-file.eden> -verbose
eden -run -input <protected-file.eden> -quiet

# Method 2: Simplified execution  
eden-run <protected-file.eden>
eden-run -q <protected-file.eden>        # Quiet mode
eden-run --help                          # Help information
Management Commands
# Deprotect files
eden -deprotect -input <protected-file> -keyfile <keyfile> -output <dir>

# Show available examples
eden -examples

# Security analysis
eden -security

# Performance benchmarks
eden -benchmark
Practical Examples
# Complete workflow example
eden -protect -input webapp.py -output ./secure/
eden-run secure/files/abc123def.eden

# Advanced security workflow
eden -protect -input critical-app.py -multiauth '2-of-3' -timelock '+7days'
eden -run -input protected/files/xyz789.eden -verbose

# Production deployment
eden -protect -input production-app.py -output /opt/secure/
sudo eden-run /opt/secure/files/production.eden

Configuration

Environment variables:

export EDEN_LOG_LEVEL=info
export EDEN_SECURITY_MAX_FILE_SIZE=104857600
export EDEN_STORAGE_BASE_PATH=./data

Architecture

Project Structure
eden-core/
β”œβ”€β”€ cmd/eden/              # CLI application
β”œβ”€β”€ pkg/
β”‚   β”œβ”€β”€ core/              # Protection engine
β”‚   β”œβ”€β”€ crypto/            # Cryptographic operations
β”‚   └── network/           # Network security
β”œβ”€β”€ internal/
β”‚   β”œβ”€β”€ config/            # Configuration management
β”‚   └── storage/           # Storage management
β”œβ”€β”€ examples/              # Usage examples
└── tests/                 # Test suite
Security Stack
Input Validation β†’ MultiAuth/TimeLock/Ownership β†’ XOR+ECDH β†’ secp256k1 β†’ Encrypted Storage

Security Specification

Component Implementation
Symmetric Encryption XOR with ECDH-derived keys
Asymmetric Crypto secp256k1 Elliptic Curve
Key Derivation ECDH + SHA-256
Digital Signatures ECDSA
Security Level 256-bit

Testing

# Run tests
make test

# Run benchmarks  
go test -bench=. ./pkg/core/

# Coverage report
go test -coverprofile=coverage.out ./...

Docker Support

docker build -t eden-core .
docker run -v $(pwd):/workspace eden-core -protect -input /workspace/app.py

Performance

Operation Performance
File Protection ~1000 files/second
Encryption ~50MB/second
Key Generation ~500 keys/second

License

MIT License - see LICENSE file for details.


Support


Built with Go for Enterprise Security

Directories ΒΆ

Path Synopsis
cmd
eden command
eden-run command
internal
adapters
Package adapters provides concrete implementations of interfaces
Package adapters provides concrete implementations of interfaces
interfaces
Package interfaces defines contracts for dependency injection and testing
Package interfaces defines contracts for dependency injection and testing
pkg
crypto
Package crypto provides elliptic curve cryptography functionality implementing the F = K Β· G formula using secp256k1 curve for enterprise-grade security.
Package crypto provides elliptic curve cryptography functionality implementing the F = K Β· G formula using secp256k1 curve for enterprise-grade security.
monitoring
Package monitoring provides performance tracking and metrics collection
Package monitoring provides performance tracking and metrics collection
network
Package network provides cryptographic zero trust networking for distributed source code protection and verification
Package network provides cryptographic zero trust networking for distributed source code protection and verification
tests
mocks
Package mocks provides mock implementations for testing
Package mocks provides mock implementations for testing

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL