ShieldEye Log Analyzer

Manual Log Event Collection, Analysis & Security Monitoring

Version 1.0.0 • Released 2026-04-19 • MIT License

1. Overview

ShieldEye is a structured logging and security analysis platform designed for developers and SOC analysts. It enables consistent log collection, MongoDB storage, and forensic analysis via desktop tooling.

Key Capabilities

  • Structured security event logging
  • MongoDB-based storage (developer-controlled)
  • Real-time (web) + forensic (desktop) analysis
  • SOC workflow support (Detection → Investigation → Analysis)

Architecture

                Application → logEvent() → Logger → MongoDB → ShieldEye Platform → Analysis Engine
                    

Security Design

  • Logs remain in your infrastructure
  • Read-only MongoDB access
  • SQLCipher encrypted local database
  • SHA-256 verified updates

2. Installation

Linux (Debian/Ubuntu)

                sudo apt update
                wget https://github.com/holoolagoke/shield-eye-desktop/releases/download/v1.0.0/shieldeye_1.0.0_amd64.deb
                sudo apt install ./shieldeye_1.0.0_amd64.deb
                    

Windows

                curl -L -o shieldeye_setup.exe "https://github.com/holoolagoke/shield-eye-desktop/releases/latest"
                    

3. Quick Start

  1. Install & launch the app
  2. Integrate logger middleware
  3. Export MongoDB logs
  4. Set alert preferences
  5. Upload & analyze logs

4. Integration Guide

Logger Example (Node.js)

                import { v4 as uuidv4 } from "uuid"

                export async function logEvent(req, res, data) {
                const log = {
                    _id: uuidv4(),
                    timestamp: new Date(),
                    ...data
                }

                await db.collection("event_logs").insertOne(log)
                }
                    

SOC Event Example

                await logEvent(req, res, {
                event_type: "LOGIN_FAILED",
                level: "warn",
                category: "authentication",
                message: "Failed login attempt"
                })
                    

5. Log Schema

Field Type Description
_id UUID Unique identifier
timestamp Date Event time
level String info | warn | error | critical

6. Desktop Application

  • Encrypted local database (SQLCipher)
  • Dashboard with charts and logs
  • Alerts management system
  • JSON log import support

7. SOC Workflow

  1. Detection: Monitor logs
  2. Investigation: Export suspicious data
  3. Forensics: Analyze in desktop app

8. Security Guidelines

Never Log:

  • Passwords
  • JWT tokens
  • API keys
  • PII