⚡ RUST · 615+ OWASP RULES · ML + eBPF · WASM · 36-PAGE DASHBOARD

PROTECT.SHIBUYA.

The most advanced open-source WAF ever built.
ML anomaly detection. eBPF kernel blocking. 615+ OWASP rules.
The WAF that makes Cloudflare nervous.

For issues or more info:  germainluperto@gmail.com
<5msP99 Latency
1µseBPF Block
615+CRS Rules
36Dashboard Pages
SQLi BLOCKED 4,291
XSS BLOCKED 2,841
RCE BLOCKED 1,203
BOT DETECTED 8,917
PATH TRAVERSAL 712
ZERO-DAY ML 89
eBPF DROPS 19,402
SQLi BLOCKED ↑ LIVE
XSS BLOCKED ↑ LIVE
RCE BLOCKED ↑ LIVE
BOT DETECTED ↑ LIVE
PATH TRAVERSAL ↑ LIVE
ZERO-DAY ML ↑ LIVE
eBPF DROPS ↑ LIVE
// killer features — what makes shibuya unstoppable

The features no other
WAF dares to ship.

9 weapons in one stack. Each module is a game-changer. Together, they're an impenetrable fortress built in Rust.

01
Kernel Power · Linux Only

eBPF / XDP Kernel-Level Blocking

Shibuya drops an XDP hook directly in the Linux kernel. Packets from known-malicious IPs get killed before they ever reach your application or even the WAF itself. IP blacklists stored in eBPF maps for O(1) lookup on millions of IPs. SYN flood protection included. Toggle on/off at runtime via Admin API — no restart needed.

XDP hookeBPF mapsSYN floodO(1) lookupruntime toggle
⚡ Blocking latency: ~1 microsecond — faster than any userspace WAF possible
02
🧠 AI Security · Explainable

Dual ML Engine with SHAP Explainability

Two independent ML models run in parallel: an IsolationForest (via ONNX runtime) detects anomalies, and a Random Forest classifies attacks across 10 classes: SQLi, XSS, RCE, SSRF, XXE, SSTI, NoSQLi, Path Traversal, Command Injection, Benign. SHAP-like explainability shows exactly which top-5 features triggered the alert. Human-in-the-loop feedback loop. A/B model testing. Data drift detection.

IsolationForestRandom ForestONNX runtimeSHAP explainA/B testingdrift detection
🧠 ML inference <5ms · 10 attack classes · full confidence scoring
03
🛡️ OWASP Standard · ModSec Compatible

615+ CRS Rules — Full ModSecurity-Compatible Engine

Native SecRule parser with the full OWASP Core Rule Set — the enterprise-standard ruleset used worldwide. Every operator: @rx @pm @detectSQLi @detectXSS @ipMatch @validateByteRange. Anomaly scoring with 4 paranoia levels. ReDoS protection built-in. Rules hot-reload without downtime. Custom rule creation via Admin API or CLI.

942xxx SQLi941xxx XSS932xxx RCE930xxx LFI920xxx ProtocolReDoS guardhot-reload
🛡️ 615 rule files · 4 paranoia levels · hot-reload in production
04
🧩 Extensibility · Any Language

WASM Plugin System — Extend in Any Language

Extend Shibuya with WebAssembly plugins written in any language — Rust, Go, C, AssemblyScript, anything that compiles to WASM. Each plugin runs in a fully sandboxed environment with configurable memory limits, execution time caps, and fuel budgets. A host API lets plugins inspect and modify requests in real-time. No other open-source WAF has this.

any languagesandboxedmemory limitstime limitsfuel budgethost API
🧩 Any language → WASM → instant Shibuya plugin, zero core changes
05
🎭 Zero-Risk · Test in Prod

Shadow Mode + Traffic Replay Engine

Deploy new rules to production without any risk. Shadow mode logs what would have been blocked — without blocking anything. Configurable per-route, per-percentage (0–100%). Request replay engine captures real traffic to PostgreSQL and replays it against new policy versions, generating a full diff report: "old policy vs new policy" — with zero production impact.

per-route shadow0–100% capturePostgreSQL storereplay enginediff reports
🎭 Test policy changes on real traffic — zero risk, full insight
06
📐 API-First · Schema-Driven

Native GraphQL + OpenAPI Protection

Import your OpenAPI 3.x spec and Shibuya auto-generates positive security rules — only documented endpoints, methods, and schemas are allowed. GraphQL gets: depth analysis, complexity scoring, alias count validation, batch size limits, and introspection blocking. JWT validation and OAuth 2.0 for API auth. Response validation to catch data leakage on the way out.

OpenAPI 3.xpositive securityGraphQL depthcomplexity limitJWT/OAuthresponse validation
📐 Import spec → instant API protection with zero rules written manually
07
🔥 Included · Unique in the Market

Ashigaru Lab — A Complete Vulnerable Attack Environment, Shipped With Shibuya

No other WAF on the market ships with a built-in attack lab. Ashigaru is a full Docker-based environment with 6 deliberately vulnerable services — real exploitable vulnerabilities — so you can validate the WAF against actual attacks, not synthetic benchmarks. A Red Team Bot automates attacks. The War Room provides a full test suite dashboard. Test everything before you go live.

Express REST (5 vulns)React SSR (XSS+RCE)Flask AI (Prompt Injection)Apollo GraphQLPHP Legacy (SQLi+LFI)Red Team Bot
🔥 Real vulnerabilities · Real attacks · Real WAF validation — included, free
ASHIGARU — 6 VULNERABLE SERVICES
SQLi × 5Express Gateway
REST API
XSS + RCEReact Frontend
SSR attacks
Prompt InjectionFlask AI Search
LLM bypass
GraphQL AttacksApollo Engine
Depth + batch
SQLi + LFIPHP Legacy
Classic vulns
🤖 AutoRed Team Bot
Full attack suite
08
🏢 Enterprise Grade · $0 Cost

Multi-Tenancy + RBAC + LDAP + Federated Learning

Built for teams and enterprises at zero cost. Full multi-tenancy with tenant isolation, RBAC for role-based dashboard access, LDAP integration for enterprise SSO, OAuth 2.0. Federated Learning module shares threat intelligence across WAF nodes. Post-Quantum Cryptography for future-proof TLS. Hardware attestation via TPM. Dynamic SBOM for supply chain monitoring.

multi-tenancyRBACLDAP/SSOfederated learningpost-quantum TLSTPM attestationSBOM
🏢 Enterprise features that competitors charge thousands/month for — free
09
🤖 Next-Gen · No SecRule Needed

NLP Policies + AI Virtual Patching in 30 Seconds

Write security policies in plain English with the NLP policy engine — no SecRule syntax required. The AI Virtual Patching module automatically generates WAF rules from CVEs. Integrates with Burp Suite, nuclei, and ZAP — when a scanner finds a vulnerability, Shibuya blocks it in 30 seconds, without touching a single line of application code. Promote to permanent rule with one click.

NLP policiesAI patchingBurp Suitenuclei/ZAPCVE-to-blockone-click promote
🤖 Scanner finds CVE → WAF blocks in 30 seconds, zero code changes
// performance & market data

Numbers don't lie.

Security data from Verizon DBIR, OWASP, Akamai 2024. Performance from Shibuya load benchmarks.

94%OWASP Top 10
Detection Rate
OWASP Testing Guide 2023
<5msP99 Latency
Overhead
Shibuya Benchmarks
76%Web Attacks
Target APIs
Akamai SOTI 2024
43%Breaches via
Web Apps
Verizon DBIR 2024
WAF Latency Overhead — P99 ms · LOWER IS BETTER
Attack Type Distribution OWASP 2024
Detection Rate by Category SHIBUYA vs INDUSTRY AVG
// competitive analysis

Shibuya vs The World.

Honest. Feature by feature. We're open source, faster, and going where no WAF has gone before.

Feature SHIBUYA YOU ARE HERE Cloudflare WAF AWS WAF ModSecurity
OWASP CRS (615+ rules)✓ Native full◐ Partial
ML Anomaly Detection (ONNX)✓ IsolationForest✓ Black box
ML Explainability (SHAP)✓ Top 5 features
eBPF/XDP Kernel Blocking✓ ~1μs
WASM Plugin System✓ Full sandbox◐ Workers only
Shadow Mode + Replay✓ Built-in◐ Limited
OpenAPI Auto-Rules✓ Auto-generate◐ Manual◐ Manual
GraphQL Native Protection✓ Depth+Complexity
NLP Policy Engine✓ Plain English
AI Virtual Patching✓ CVE → 30s block
Built-in Attack Lab✓ Ashigaru (6 svc)
Multi-Tenancy + RBAC✓ Full✓ Paid✓ Paid
Post-Quantum TLS✓ Included✓ Paid tier
Federated Learning✓ Included
P99 Latency Overhead<5ms~10–20ms~15–30ms~8–15ms
Self-Hosted / Full Control✓ 100%✗ Cloud only✗ Cloud only
Open Source✓ 100% Open✗ Proprietary✗ Proprietary
CostFree / Open Source$200+/mo$5+/mo + trafficFree
// 9-layer pipeline

Built Like
A Weapon.

Every request passes through 9 sequential security layers. From kernel to application, nothing gets through unscathed.

🌐HTTP INTLS · HTTP/1-3
eBPF/XDP~1µs kernel
🚦RATE LIMITToken bucket
🤖BOT DETECTTLS fingerprint
🌍THREAT INTELBloom filter
📜CRS ENGINE615+ rules
🧠ML LAYERONNX <5ms
📐API/GRAPHQLSchema guard
🧩WASMSandboxed
BACKENDProtected
// threat coverage

Every Attack.
Stopped Cold.

OWASP Top 10 and beyond. ML catches what rules miss. eBPF stops what ML can't even see.

💉SQL INJECTION942xxx rules
@detectSQLi
✓ BLOCKED
🔮XSS941xxx rules
@detectXSS
✓ BLOCKED
💀RCE932xxx rules
Command injection
✓ BLOCKED
📂PATH TRAVERSAL930xxx rules
normalizePath
✓ BLOCKED
🤖BOT TRAFFICTLS fingerprint
Behavioral ML
✓ BLOCKED
🔭ZERO-DAYML IsolationForest
Anomaly score
✓ DETECTED
🌊SYN FLOODeBPF/XDP kernel
~1µs drops
✓ MITIGATED
🕸️GRAPHQL ABUSEDepth + complexity
Alias flood
✓ BLOCKED
🔐SSRF / XXEML classifier
Pattern match
✓ BLOCKED
🧬SSTI / NoSQLiML classification
10 attack classes
✓ BLOCKED
// sveltekit dashboard · 36 pages

A War Room
in Your Browser.

36-page SvelteKit dashboard. Real-time ECharts. 2-second polling. Dark glassmorphism. Full WAF control from one UI.

📊
Real-Time Analytics
Live timeseries, attack pie charts, P99 latency heatmaps. Polls every 2 seconds via WebSocket.
📋
Request Inspector
Full drill-down per request: body, headers, ML score, matched rules, IP reputation, anomaly features.
⚙️
Rule Manager
Enable, disable, create, delete rules live. YAML config editor with syntax highlighting and live validation.
🧠
ML Monitor
Neural engine dashboard: threshold slider, pending human reviews, feedback for retraining, drift charts, A/B results.
eBPF Control Panel
Enable/disable kernel filtering at runtime. Monitor XDP drops, eBPF map stats, blocked IP counts.
🏢
Team + Multi-Tenancy
Full tenant isolation, RBAC roles, activity feeds, audit logs with CSV/JSON export, MFA setup pages.
// technology stack

207 Rust Files.
A Craft, Not a Product.

207 core Rust files. 32 CLI modules. 16 API files. 36 dashboard pages. Every line intentional.

Rust
Core engine. Memory-safe, zero-cost abstractions, no GC pauses. 207 source files.
↑ Performance backbone
Pingora
Cloudflare's battle-tested open-source Rust HTTP proxy. Handles TLS, pooling, routing.
↑ Reverse proxy core
eBPF
XDP hooks for <1µs kernel-space packet drops. No userspace overhead at all.
↑ Kernel-space firewall
ONNX
Open Neural Network Exchange for IsolationForest ML inference with StandardScaler.
↑ ML inference <5ms
WASM
Sandboxed WebAssembly plugin execution. Write plugins in any compiled language.
↑ Plugin extensibility
SIMD
x86_64 + ARM Neon vectorized regex pattern matching at hardware speed via aho-corasick.
↑ Vectorized matching
PostgreSQL
Threat intel storage, shadow traffic capture, event history with TTL expiry.
↑ Persistent state
SvelteKit
36-page real-time dashboard with ECharts, dark glassmorphism, shadcn-svelte components.
↑ War room dashboard
$ git clone github.com/theghostshinobi/Shibuya-waf-light-version && ./setup && ./start

Stop Paying.
Start Protecting.

615+ rules. ML detection. eBPF blocking. Shadow mode. 36-page dashboard. Built-in attack lab. Post-quantum TLS. Federated learning. 100% open source lite version.

// contact

Got questions?
Let's talk.

For issues, bugs, custom integrations, enterprise support, or anything else — reach out directly.

germainluperto@gmail.com

Response within 24 hours · No bots · Real human