ShieldEye Log Analyzer
Manual Log Event Collection, Analysis & Security Monitoring
Version 1.0.0 • Released 2026-04-19 • MIT License
1. Overview
ShieldEye is a structured logging and security analysis platform designed for developers and SOC analysts. It enables consistent log collection, MongoDB storage, and forensic analysis via desktop tooling.
Key Capabilities
- Structured security event logging
- MongoDB-based storage (developer-controlled)
- Real-time (web) + forensic (desktop) analysis
- SOC workflow support (Detection → Investigation → Analysis)
Architecture
Application → logEvent() → Logger → MongoDB → ShieldEye Platform → Analysis Engine
Security Design
- Logs remain in your infrastructure
- Read-only MongoDB access
- SQLCipher encrypted local database
- SHA-256 verified updates
2. Installation
Linux (Debian/Ubuntu)
sudo apt update
wget https://github.com/holoolagoke/shield-eye-desktop/releases/download/v1.0.0/shieldeye_1.0.0_amd64.deb
sudo apt install ./shieldeye_1.0.0_amd64.deb
Windows
curl -L -o shieldeye_setup.exe "https://github.com/holoolagoke/shield-eye-desktop/releases/latest"
3. Quick Start
- Install & launch the app
- Integrate logger middleware
- Export MongoDB logs
- Set alert preferences
- Upload & analyze logs
4. Integration Guide
Logger Example (Node.js)
import { v4 as uuidv4 } from "uuid"
export async function logEvent(req, res, data) {
const log = {
_id: uuidv4(),
timestamp: new Date(),
...data
}
await db.collection("event_logs").insertOne(log)
}
SOC Event Example
await logEvent(req, res, {
event_type: "LOGIN_FAILED",
level: "warn",
category: "authentication",
message: "Failed login attempt"
})
5. Log Schema
| Field | Type | Description |
|---|---|---|
| _id | UUID | Unique identifier |
| timestamp | Date | Event time |
| level | String | info | warn | error | critical |
6. Desktop Application
- Encrypted local database (SQLCipher)
- Dashboard with charts and logs
- Alerts management system
- JSON log import support
7. SOC Workflow
- Detection: Monitor logs
- Investigation: Export suspicious data
- Forensics: Analyze in desktop app
8. Security Guidelines
Never Log:
- Passwords
- JWT tokens
- API keys
- PII