Skip to content

health-control

Health control system for Kodachi that includes network connectivity checks and system health monitoring

Version: 9.0.1 | Size: 8.0MB | Author: Warith Al Maawali

License: Proprietary | Website: https://www.digi77.com


File Information

Property Value
Binary Name health-control
Version 9.0.1
Build Date 2025-10-24T16:44:06.522810764Z
Rust Version 1.82.0
File Size 8.0MB
JSON Data View Raw JSON

SHA256 Checksum

9a9eb88b052d88498b30670ea3e4babfc8097d2a83ae91ee8ceeac671b96d2da

Features

Feature Description
Feature Network connectivity monitoring
Feature Internet traffic control
Feature Security hardening
Feature System integrity checking
Feature Offline system management

Security Features

Feature Description
Authentication Secure authentication with certificate pinning
Encryption TLS 1.3 for all network communications
Inputvalidation All inputs are validated and sanitized
Ratelimiting Built-in rate limiting for network operations

System Requirements

Requirement Value
OS Linux (Debian-based)
Privileges root/sudo for system operations
Dependencies OpenSSL, libcurl

Global Options

Flag Description
-h, --help Print help information
-v, --version Print version information
-n, --info Display detailed information
-e, --examples Show usage examples
--json Output in JSON format
--json-pretty Pretty-print JSON output with indentation
--json-human Enhanced JSON output with improved formatting (like jq)
--verbose Enable verbose output
--quiet Suppress non-essential output
--no-color Disable colored output
--config <FILE> Use custom configuration file
--timeout <SECS> Set timeout (default: 30)
--retry <COUNT> Retry attempts (default: 3)

Commands

Data Destruction

wipe-file

Securely wipe a file with multiple passes

Usage:

health-control wipe-file [OPTIONS]

Examples:

health-control wipe-file --file /path/to/file.txt
health-control wipe-file --file /path/to/file.txt --passes 7 --json

wipe-directory

Securely wipe an entire directory and its contents

Usage:

health-control wipe-directory [OPTIONS]

Examples:

health-control wipe-directory --path /tmp/sensitive_dir
health-control wipe-directory --path /path/to/directory --passes 7 --json

wipe-logs

Securely wipe system logs (journal, syslog, auth.log, kern.log), user history (bash, zsh, python), and application cache logs

Usage:

health-control wipe-logs [OPTIONS]

Examples:

health-control wipe-logs                    # Wipe all logs (system + user)
health-control wipe-logs --type system     # Wipe only system logs (/var/log/*, journal)
health-control wipe-logs --type user       # Wipe only user logs (history, cache)
health-control wipe-logs --type all --json # Show detailed JSON output

wipe-batch

Batch wipe multiple files

Usage:

health-control wipe-batch [OPTIONS]

Examples:

# Multiple file paths as arguments:
health-control wipe-batch file1.png file2.png --passes 7
health-control wipe-batch /tmp/sensitive.doc /home/user/data.txt

# Alternative comma-separated format:
health-control wipe-batch --paths "file1.png,file2.png" --passes 7
health-control wipe-batch --paths "/tmp/file1,/tmp/file2" --json

     Security Note: Using actual paths may expose system directory structure

wipe-browser-data

Wipe browser data and history

Usage:

health-control wipe-browser-data [OPTIONS]

Examples:

health-control wipe-browser-data
health-control wipe-browser-data --browser firefox
health-control wipe-browser-data --browser all --json

wipe-free-space

Securely wipe free space on a mounted filesystem (use mount points like '/', '/home' or device paths)

Usage:

health-control wipe-free-space [OPTIONS]

Examples:

health-control wipe-free-space --device /
health-control wipe-free-space --device /home
health-control wipe-free-space --device /dev/sda1 --json
health-control wipe-free-space --device /tmp

wipe-pattern

Wipe files matching pattern (use --pattern flag or positional argument)

Usage:

health-control wipe-pattern [OPTIONS]

Examples:

health-control wipe-pattern --pattern '*.tmp'
health-control wipe-pattern '*.tmp'
health-control wipe-pattern --pattern '*.log' --directory /var/log
health-control wipe-pattern '*.log' --directory /var/log
health-control wipe-pattern --pattern 'backup*' --json
health-control wipe-pattern 'backup*' --json
health-control wipe-pattern --pattern '*.cache' --directory ~/.cache
health-control wipe-pattern '*.cache' --directory ~/.cache

wipe-schedule

Schedule automatic data wiping

Usage:

health-control wipe-schedule [OPTIONS]

Examples:

health-control wipe-schedule temp --frequency daily
health-control wipe-schedule logs --frequency weekly
health-control wipe-schedule browser --json

wipe-verify

Verify that a file was wiped properly

Usage:

health-control wipe-verify [OPTIONS]

Examples:

health-control wipe-verify --path /tmp/sensitive.txt
health-control wipe-verify --path /home/user/data.bin --json

Emergency Operations

kill-switch-arm

Arm the emergency kill switch - sets system to high-alert state for manual activation. NOTE: This prepares the system for rapid response but does NOT actively monitor for threats. It's a preparedness state that allows quick manual activation via kill-switch-activate command.

Usage:

health-control kill-switch-arm [OPTIONS]

Examples:

health-control kill-switch-arm
health-control kill-switch-arm --json

kill-switch-disarm

Disarm the emergency kill switch

Usage:

health-control kill-switch-disarm [OPTIONS]

Examples:

health-control kill-switch-disarm
health-control kill-switch-disarm --json

kill-switch-status

Check if kill switch monitoring is armed/disarmed. Shows armed time, trigger count, and monitoring state. Does NOT activate anything - just displays current status.

Usage:

health-control kill-switch-status [OPTIONS]

Examples:

health-control kill-switch-status
health-control kill-switch-status --json

kill-switch-activate

IMMEDIATELY activate emergency procedures. Unlike 'arm' which monitors, this executes panic mode NOW. Choose level: soft (network+lock), medium (default: +kill processes), hard (+RAM wipe+shutdown)

Usage:

health-control kill-switch-activate [OPTIONS]

Examples:

health-control kill-switch-activate
health-control kill-switch-activate --level hard --force
health-control kill-switch-activate --level soft --json

panic-soft

IMMEDIATE soft panic mode. Actions: Kill all network connections, clear clipboard, lock screen. NO CONFIRMATION. Reversible by restarting network. Use for quick privacy protection.

Usage:

health-control panic-soft [OPTIONS]

Examples:

health-control panic-soft
health-control panic-soft --json

panic-hard

IMMEDIATE hard panic mode with CONFIRMATION. CRITICAL: Kill network, clear clipboard, terminate ALL processes, clear memory, unmount devices, wipe RAM, IMMEDIATE SHUTDOWN. IRREVERSIBLE - system will shutdown!

Usage:

health-control panic-hard [OPTIONS]

Examples:

health-control panic-hard
health-control panic-hard --json

panic-medium

IMMEDIATE medium panic mode with CONFIRMATION. Actions: Kill network, clear clipboard, terminate non-essential processes, clear memory, unmount devices, lock screen. Requires manual system restart to fully restore.

Usage:

health-control panic-medium [OPTIONS]

Examples:

health-control panic-medium
health-control panic-medium --json

panic-profile

Configure automated emergency response profile that defines system actions during panic mode activation

Usage:

health-control panic-profile [OPTIONS]

Examples:

# Configure light security response (recommended for public wifi):
health-control panic-profile --profile stealth

# Configure maximum security lockdown (for high-risk situations):
health-control panic-profile --profile paranoid

# Configure recovery mode (to restore system to safe state):
health-control panic-profile --profile recovery

# Get JSON output with profile configuration details:
health-control panic-profile --profile paranoid --json

panic-recover

Activate panic recovery mode

Usage:

health-control panic-recover [OPTIONS]

Examples:

health-control panic-recover
health-control panic-recover --json

create-recovery-point

Create system recovery checkpoint

Usage:

health-control create-recovery-point [OPTIONS]

Examples:

health-control create-recovery-point
health-control create-recovery-point --name pre-update
health-control create-recovery-point --json

Hardware Security

hardware-rng-verify

Verify hardware random number generator status

Usage:

health-control hardware-rng-verify [OPTIONS]

Examples:

health-control hardware-rng-verify
health-control hardware-rng-verify --json

entropy-status

Check system entropy pool status and quality

Usage:

health-control entropy-status [OPTIONS]

Examples:

health-control entropy-status
health-control entropy-status --json

coldboot-defense-enable

Enable cold boot defense mechanisms

Usage:

health-control coldboot-defense-enable [OPTIONS]

Examples:

health-control coldboot-defense-enable
health-control coldboot-defense-enable --json

coldboot-defense-disable

Disable cold boot defense mechanisms

Usage:

health-control coldboot-defense-disable [OPTIONS]

Examples:

health-control coldboot-defense-disable
health-control coldboot-defense-disable --json
health-control coldboot-defense-disable --json-human

boot-integrity-check

Check boot chain integrity and security status

Usage:

health-control boot-integrity-check [OPTIONS]

Examples:

health-control boot-integrity-check
health-control boot-integrity-check --json

Hostname Management

set-default-hostname

Set the default hostname

Usage:

health-control set-default-hostname [OPTIONS]

Examples:

health-control set-default-hostname
health-control set-default-hostname --json

set-random-hostname

Set a random hostname

Usage:

health-control set-random-hostname [OPTIONS]

Examples:

health-control set-random-hostname
health-control set-random-hostname --json

set-custom-hostname

Set a custom hostname

Usage:

health-control set-custom-hostname [OPTIONS]

Examples:

health-control set-custom-hostname --name MyHost
health-control set-custom-hostname --name secure-host --json

Internet Traffic Control

block-internet

Block all internet traffic

Usage:

health-control block-internet [OPTIONS]

Examples:

health-control block-internet
health-control block-internet --method firewall
health-control block-internet --method ufw
health-control block-internet --method iptables
health-control block-internet --method nftables
health-control block-internet --method interfaces
health-control block-internet --method all
health-control block-internet --allow-local
health-control block-internet --method iptables --allow-local
health-control block-internet --method all --allow-local
health-control block-internet --json

unblock-internet

Unblock internet traffic

Usage:

health-control unblock-internet [OPTIONS]

Examples:

health-control unblock-internet
health-control unblock-internet --method firewall
health-control unblock-internet --method ufw
health-control unblock-internet --method iptables
health-control unblock-internet --method nftables
health-control unblock-internet --method interfaces
health-control unblock-internet --method all
health-control unblock-internet --json

internet-status

Check internet blocking status

Usage:

health-control internet-status [OPTIONS]

Examples:

health-control internet-status
health-control internet-status --json

recover-internet

Recover internet connectivity

Usage:

health-control recover-internet [OPTIONS]

Examples:

health-control recover-internet
health-control recover-internet --check-dns
health-control recover-internet --force
health-control recover-internet --check-dns --force
health-control recover-internet --json

kill-network

Emergency network kill switch

Usage:

health-control kill-network [OPTIONS]

Examples:

health-control kill-network
health-control kill-network --json

kill-network-interface

Kill specific network interface

Usage:

health-control kill-network-interface [OPTIONS]

Examples:

health-control kill-network-interface --interface wlan0
health-control kill-network-interface --interface eth0 --json

kill-process

Kill specific process by name or PID

Usage:

health-control kill-process [OPTIONS]

Examples:

health-control kill-process --process firefox
health-control kill-process --process 1234 --json

enable

Enable a watch-guard to monitor system changes and block internet on triggers

Usage:

health-control enable [OPTIONS]

Examples:

health-control enable --type watch-guard --watch ip --method nftables
health-control enable --type watch-guard --watch timezone --method iptables
health-control enable --type watch-guard --watch timezone --method iptables --daemon
health-control enable --type watch-guard --watch interfaces --method firewall
health-control enable --type watch-guard --watch process --target tor --method all
health-control enable --type watch-guard --watch process --target firefox --method auto

disable

Disable an active watch-guard and optionally unblock internet

Usage:

health-control disable --type watch-guard <IDENTIFIER>

Options: - --type: Type of command to disable - --no-unblock: Do not unblock internet after disabling watch-guard

Examples:

health-control disable --type watch-guard ip
health-control disable --type watch-guard timezone
health-control disable --type watch-guard interfaces
health-control disable --type watch-guard tor
health-control disable --type watch-guard all
health-control disable --type watch-guard all --no-unblock

watch-guard

Show status of active watch-guards

Usage:

health-control watch-guard status

Examples:

health-control watch-guard status
health-control watch-guard status --json

daemon

Run watch-guard monitoring as a persistent daemon process

Usage:

health-control daemon --config-id <ID>

Options: - --config-id: Configuration ID to monitor

Examples:

health-control daemon --config-id timezone_iptables

MAC Address Management

mac-change-all

Change all MAC addresses

Usage:

health-control mac-change-all [OPTIONS]

Examples:

health-control mac-change-all
health-control mac-change-all --json

mac-force-change

Force change all MAC addresses (disable interfaces first)

Usage:

health-control mac-force-change [OPTIONS]

Examples:

health-control mac-force-change
health-control mac-force-change --json

mac-change-specific

Change specific interface MAC address

Usage:

health-control mac-change-specific [OPTIONS]

Examples:

health-control mac-change-specific --interface eth0
health-control mac-change-specific --interface wlan0 --json

mac-show-interfaces

Show available network interfaces

Usage:

health-control mac-show-interfaces [OPTIONS]

Examples:

health-control mac-show-interfaces
health-control mac-show-interfaces --json

mac-show-macs

Show current MAC addresses

Usage:

health-control mac-show-macs [OPTIONS]

Examples:

health-control mac-show-macs
health-control mac-show-macs --json

mac-reset-all

Reset all MAC addresses to default

Usage:

health-control mac-reset-all [OPTIONS]

Examples:

health-control mac-reset-all
health-control mac-reset-all --json

mac-active-interface

Show active network interface

Usage:

health-control mac-active-interface [OPTIONS]

Examples:

health-control mac-active-interface
health-control mac-active-interface --json

Memory Management

memory-clean

Clean memory caches and buffers

Usage:

health-control memory-clean [OPTIONS]

Examples:

sudo health-control memory-clean
sudo health-control memory-clean --json

memory-force-clean

Force clean memory by killing top process

Usage:

health-control memory-force-clean [OPTIONS]

Examples:

sudo health-control memory-force-clean
sudo health-control memory-force-clean --json

memory-wipe

Secure RAM wipe (sdmem)

Usage:

health-control memory-wipe [OPTIONS]

Examples:

sudo health-control memory-wipe
sudo health-control memory-wipe --json

memory-wipe-process

Wipe memory of specific process

Usage:

health-control memory-wipe-process [OPTIONS]

Examples:

health-control memory-wipe-process --value firefox
health-control memory-wipe-process --value 1234 --json

memory-limits

Manage process memory limits

Usage:

health-control memory-limits [OPTIONS]

Examples:

sudo health-control memory-limits
sudo health-control memory-limits --value firefox --limit 1024
sudo health-control memory-limits --value chrome --limit 2048
sudo health-control memory-limits --value brave --limit 1536
sudo health-control memory-limits --json

memory-stats

Display memory statistics and history

Usage:

health-control memory-stats [OPTIONS]

Examples:

health-control memory-stats
health-control memory-stats --history --json

swap-configure

Configure swap settings

Usage:

health-control swap-configure [OPTIONS]

Examples:

health-control swap-configure --swappiness 10 --cache-pressure 50
health-control swap-configure --swappiness 0 --json

disable-swap

Disable swap memory

Usage:

health-control disable-swap [OPTIONS]

Examples:

sudo health-control disable-swap
sudo health-control disable-swap --json

enable-swap

Enable swap memory

Usage:

health-control enable-swap [OPTIONS]

Examples:

sudo health-control enable-swap
sudo health-control enable-swap --size 2048
sudo health-control enable-swap --size 4096
sudo health-control enable-swap --json

Network Connectivity

net-check

Check network connectivity (IP and DNS only)

Usage:

health-control net-check [--timeout <SECONDS>] [--http] [--ip-only] [--domain-only]

Options: - --timeout <SECONDS>: Timeout in seconds for each connectivity check - --http: Include HTTP connectivity check - --ip-only: Check IP connectivity only, skip DNS checks - --domain-only: Check domain connectivity only, skip IP ping

Examples:

health-control net-check
health-control net-check --json
health-control net-check --timeout 15
health-control net-check --http --json
health-control net-check --ip-only
health-control net-check --domain-only

net-check-http

Check network connectivity including HTTP

Usage:

health-control net-check-http [OPTIONS]

Examples:

health-control net-check-http
health-control net-check-http --timeout 15
health-control net-check-http --json

list-ips

List IPs used for connectivity testing

Usage:

health-control list-ips [OPTIONS]

Examples:

health-control list-ips
health-control list-ips --json

list-domains

List domains used for connectivity testing

Usage:

health-control list-domains [OPTIONS]

Examples:

health-control list-domains
health-control list-domains --json

Offline Actions

offline-postgresql

Manage PostgreSQL database service

Usage:

health-control offline-postgresql [OPTIONS]

Examples:

health-control offline-postgresql --action disable
health-control offline-postgresql --action enable
health-control offline-postgresql --action check --json

Password Generation

genpass

Generate secure passwords using multiple methods (pass, pwgen, xkcdpass)

Usage:

health-control genpass [OPTIONS]

Examples:

health-control genpass
health-control genpass --method pwgen
health-control genpass --count 10
health-control genpass --method pwgen --count 50
health-control genpass --method xkcdpass --count 20 --json
health-control genpass --length 32 --symbols "@-_!#$"

Security

security-status

Show comprehensive security status

Usage:

health-control security-status [OPTIONS]

Examples:

health-control security-status
health-control security-status --category network
health-control security-status --category all --json
health-control security-status all
health-control security-status network --json

Security Assessment

security-score

Calculate security score and get recommendations

Usage:

health-control security-score [OPTIONS]

Examples:

health-control security-score
health-control security-score --json

security-report

Generate comprehensive security report

Usage:

health-control security-report [OPTIONS]

Examples:

health-control security-report
health-control security-report --format detailed
health-control security-report --format compliance --json

security-profile

Set security profile and thresholds

Usage:

health-control security-profile [OPTIONS]

security-history

View security configuration history

Usage:

health-control security-history [OPTIONS]

Examples:

health-control security-history
health-control security-history --days 30
health-control security-history --json

security-remediate

Auto-remediate security issues

Usage:

health-control security-remediate [OPTIONS]

Examples:

health-control security-remediate
health-control security-remediate --bool true
health-control security-remediate --bool false --json

security-schedule

Schedule security scans (hourly, daily, weekly, monthly, disable)

Usage:

health-control security-schedule [OPTIONS]

Examples:

health-control security-schedule --value daily
health-control security-schedule --value weekly
health-control security-schedule --value disable --json

rootkit-scan-enhanced

Enhanced rootkit scanning with multiple tools

Usage:

health-control rootkit-scan-enhanced [OPTIONS]

Examples:

health-control rootkit-scan-enhanced
health-control rootkit-scan-enhanced --deep
health-control rootkit-scan-enhanced --json

lynis-audit

Run Lynis security audit

Usage:

health-control lynis-audit [OPTIONS]

Examples:

health-control lynis-audit
health-control lynis-audit --value quick
health-control lynis-audit --value pentest --json

lynis-status

Check Lynis installation status

Usage:

health-control lynis-status [OPTIONS]

Examples:

health-control lynis-status
health-control lynis-status --json

clamav-scan

Scan system with ClamAV antivirus

Usage:

health-control clamav-scan [OPTIONS]

Examples:

health-control clamav-scan
health-control clamav-scan --path /home --recursive
health-control clamav-scan --quarantine --json

system-audit

Perform comprehensive system security audit

Usage:

health-control system-audit [OPTIONS]

Examples:

health-control system-audit
health-control system-audit --level comprehensive
health-control system-audit --modules network,filesystem --json

Security Hardening

security-harden

Apply comprehensive security hardening

Usage:

health-control security-harden [OPTIONS]

Examples:

health-control security-harden
health-control security-harden --profile paranoid
health-control security-harden --modules kernel,network --json

security-verify

Verify if security hardening is properly applied (checks all 7 modules and reports their status)

Usage:

health-control security-verify [OPTIONS]

Examples:

health-control security-verify
  # Check status of all 7 security modules:
  # - kernel: sysctl hardening (kptr_restrict, dmesg_restrict, etc.)
  # - process: isolation settings (hidepid, namespaces)
  # - filesystem: secure mount options (nosuid, nodev)
  # - network: firewall settings (tcp_syncookies, ip_forward)
  # - memory: protection (ASLR, protected symlinks/hardlinks)
  # - monitoring: auditd and syslog status
  # - sandboxing: AppArmor and seccomp availability
  # Shows: ENABLED/DISABLED and if properly configured

health-control security-verify --profile paranoid
  # Verify against paranoid profile expectations

health-control security-verify --json
  # Get detailed JSON output with all verification data

security-recover

Temporarily revert security hardening (keeps framework enabled for quick re-hardening)

Usage:

health-control security-recover [OPTIONS]

Examples:

# Temporarily revert security hardening (keeps framework ready for re-hardening)
sudo health-control security-recover

# After recovery, modules show 'ENABLED (needs configuration)'
# This means: Framework is ready but no restrictions are enforced
# Use this when: Troubleshooting issues, planning to re-harden later

# Recover only specific modules
sudo health-control security-recover --modules network,kernel

# To re-apply hardening after recovery:
sudo health-control security-harden

security-reset

Completely disable all security modules and framework (permanent removal)

Usage:

health-control security-reset [OPTIONS]

Examples:

# Completely disable all security modules and framework
sudo health-control security-reset

# After reset, modules show 'DISABLED'
# This means: All security framework is completely turned off
# Use this when: You want to permanently remove security hardening

# Skip confirmation prompt
sudo health-control security-reset --force

# Warning: After reset, security-harden will need to rebuild framework

monitoring-enable

Enable system monitoring features

Usage:

health-control monitoring-enable [OPTIONS]

Examples:

health-control monitoring-enable
health-control monitoring-enable --modules auditd,lkrg,file-integrity
health-control monitoring-enable --json

monitoring-disable

Disable system monitoring features

Usage:

health-control monitoring-disable [OPTIONS]

Examples:

health-control monitoring-disable
health-control monitoring-disable --modules auditd,lkrg
health-control monitoring-disable --json

monitoring-status

Check system security monitoring status

Usage:

health-control monitoring-status [OPTIONS]

Examples:

health-control monitoring-status
health-control monitoring-status --json

ipv6-disable

Disable IPv6 system-wide

Usage:

health-control ipv6-disable [OPTIONS]

Examples:

health-control ipv6-disable
health-control ipv6-disable --json

ipv6-enable

Enable IPv6 system-wide

Usage:

health-control ipv6-enable [OPTIONS]

Examples:

health-control ipv6-enable
health-control ipv6-enable --json

tirdad-enable

Enable Tirdad TCP ISN randomization

Usage:

health-control tirdad-enable [OPTIONS]

Examples:

health-control tirdad-enable
health-control tirdad-enable --json

tirdad-disable

Disable Tirdad TCP ISN randomization

Usage:

health-control tirdad-disable [OPTIONS]

Examples:

health-control tirdad-disable
health-control tirdad-disable --json

tirdad-status

Check Tirdad TCP ISN randomization status

Usage:

health-control tirdad-status [OPTIONS]

Examples:

health-control tirdad-status
health-control tirdad-status --json

ipv6-status

Check IPv6 status

Usage:

health-control ipv6-status [OPTIONS]

Examples:

health-control ipv6-status
health-control ipv6-status --json

ram-wipe

Enable secure RAM wiping on shutdown

Usage:

health-control ram-wipe [OPTIONS]

Examples:

health-control ram-wipe
health-control ram-wipe --json

wipe-ram-install

Install RAM wipe system (hooks + configuration) - Run this first if not already installed

Usage:

health-control wipe-ram-install [OPTIONS]

Examples:

sudo health-control wipe-ram-install
sudo health-control wipe-ram-install --policy kodachi-wiper
sudo health-control wipe-ram-install --policy sdmem --passes 3
sudo health-control wipe-ram-install --time 120
sudo health-control wipe-ram-install --policy sdmem --passes 5
sudo health-control wipe-ram-install --policy both --time 120 --passes 3
sudo health-control wipe-ram-install --force
sudo health-control wipe-ram-install --json

ram-wipe-status

Show RAM wipe system status - Check this first before installing or configuring

Usage:

health-control ram-wipe-status [OPTIONS]

Examples:

sudo health-control ram-wipe-status
sudo health-control ram-wipe-status --json

wipe-ram-config

Update RAM wipe configuration - Use this to modify settings after installation

Usage:

health-control wipe-ram-config [OPTIONS]

Options: - --policy <MODE>: Set policy: kodachi-wiper (fast native wiper)|sdmem (secure multi-pass)|both (balanced hybrid)|auto (intelligent auto-detection: prefers kodachi-wiper, falls back to sdmem if unavailable) - --time <SECS>: Set time budget for shutdown RAM wiping. Recommended: 60-90s desktops, 120-300s servers - --passes <NUM>: Set number of sdmem passes (1-9). More = secure but slower. Recommended: 3 balanced, 7+ high-security - --split <PCT>: Set time split for 'both' mode (10-90). Example: 70 = 70% kodachi-wiper, 30% sdmem. Higher = faster but less secure

Examples:

sudo health-control wipe-ram-config --policy auto
sudo health-control wipe-ram-config --policy kodachi-wiper
sudo health-control wipe-ram-config --time 120
sudo health-control wipe-ram-config --passes 5
sudo health-control wipe-ram-config --split 70
sudo health-control wipe-ram-config --policy both --time 120
sudo health-control wipe-ram-config --policy both --time 90 --passes 3 --split 60
sudo health-control wipe-ram-config --json

ram-wipe-enable

Enable automatic RAM wiping on shutdown

Usage:

health-control ram-wipe-enable [OPTIONS]

Examples:

sudo health-control ram-wipe-enable
sudo health-control ram-wipe-enable --schedule immediate
sudo health-control ram-wipe-enable --schedule delay
sudo health-control ram-wipe-enable --passes 5
sudo health-control ram-wipe-enable --schedule shutdown --passes 3
sudo health-control ram-wipe-enable --json

ram-wipe-disable

Disable automatic RAM wiping

Usage:

health-control ram-wipe-disable [OPTIONS]

Examples:

sudo health-control ram-wipe-disable
sudo health-control ram-wipe-disable --preserve-config
sudo health-control ram-wipe-disable --json

wipe-ram-test

Test RAM wipe operation (dry-run with short time budget) - Run this to verify installation before relying on automatic wipes

Usage:

health-control wipe-ram-test [OPTIONS]

Options: - --policy <MODE>: Test specific wipe policy: kodachi-wiper (fast)|sdmem (secure DoD-standard)|both (hybrid)|auto (intelligent auto-selection) - --time <SECS>: Test time budget in seconds (default: 10). Quick test only - actual shutdown wipe uses configured time budget from wipe-ram-config

Examples:

sudo health-control wipe-ram-test
sudo health-control wipe-ram-test --policy kodachi-wiper
sudo health-control wipe-ram-test --policy sdmem
sudo health-control wipe-ram-test --policy both --time 60
sudo health-control wipe-ram-test --time 30
sudo health-control wipe-ram-test --policy kodachi-wiper --time 20
sudo health-control wipe-ram-test --json

wipe-ram

Execute RAM wipe operation (primarily used by systemd/init shutdown hooks, but can be run manually for testing)

Usage:

health-control wipe-ram [OPTIONS]

Options: - --shutdown-mode: INTERNAL USE - Shutdown-optimized mode for systemd/init hooks. Users should use 'wipe-ram' without this flag - --no-console: Disable console output for silent operation (useful in scripts and background tasks) - --policy <MODE>: Override wipe policy: kodachi-wiper (fast native wiper for quick shutdowns)|sdmem (secure DoD-standard multi-pass for maximum security)|both (hybrid approach: fast+secure)|auto (intelligent auto-selection based on system capabilities) - --time <SECS>: Override time budget in seconds (how long to spend wiping RAM). Higher values = more memory wiped but longer shutdown time

Examples:

sudo health-control wipe-ram
sudo health-control wipe-ram --policy kodachi-wiper
sudo health-control wipe-ram --policy sdmem
sudo health-control wipe-ram --policy both --time 120
sudo health-control wipe-ram --time 120
sudo health-control wipe-ram --no-console
sudo health-control wipe-ram --json
sudo health-control wipe-ram --shutdown-mode

ram-wipe-detect-kicksecure

Detect Kicksecure/Whonix RAM wipe installation

Usage:

health-control ram-wipe-detect-kicksecure

Examples:

sudo health-control ram-wipe-detect-kicksecure
sudo health-control ram-wipe-detect-kicksecure --json
sudo health-control ram-wipe-detect-kicksecure --json-human

ram-wipe-update

Update RAM wipe configuration (alias for wipe-ram-config)

Usage:

health-control ram-wipe-update [OPTIONS]

Options: - --policy <MODE>: Set policy: kodachi-wiper (fast native wiper)|sdmem (secure multi-pass)|both (balanced hybrid)|auto (intelligent auto-detection: prefers kodachi-wiper, falls back to sdmem if unavailable) - --time <SECS>: Set time budget in seconds - --passes <NUM>: Set sdmem passes (1-9) - --split <PCT>: Set custom/sdmem split for 'both' mode (10-90)

Examples:

sudo health-control ram-wipe-update --policy auto
sudo health-control ram-wipe-update --policy both --time 150
sudo health-control ram-wipe-update --policy kodachi-wiper
sudo health-control ram-wipe-update --time 120
sudo health-control ram-wipe-update --passes 5
sudo health-control ram-wipe-update --json

disk-encryption-status

Check disk encryption status and security

Usage:

health-control disk-encryption-status [OPTIONS]

Examples:

health-control disk-encryption-status
health-control disk-encryption-status --json

swap-enable

Enable swap partition/file

Usage:

health-control swap-enable [OPTIONS]

Examples:

health-control swap-enable
health-control swap-enable --json

swap-disable

Disable swap partition/file

Usage:

health-control swap-disable [OPTIONS]

Examples:

health-control swap-disable
health-control swap-disable --json

swap-encrypt

Encrypt swap partition/file

Usage:

health-control swap-encrypt [OPTIONS]

Examples:

health-control swap-encrypt
health-control swap-encrypt --json

swap-status

Check swap status and configuration

Usage:

health-control swap-status [OPTIONS]

Examples:

health-control swap-status
health-control swap-status --json

swap-decrypt

Decrypt encrypted swap partition/file

Usage:

health-control swap-decrypt [OPTIONS]

Examples:

health-control swap-decrypt
health-control swap-decrypt --device /dev/sda3
health-control swap-decrypt --json

swap-encrypt-status

Check swap encryption status

Usage:

health-control swap-encrypt-status [OPTIONS]

Examples:

health-control swap-encrypt-status
health-control swap-encrypt-status --json

usb-list

List all USB devices

Usage:

health-control usb-list [OPTIONS]

Examples:

health-control usb-list
health-control usb-list --json

luks-nuke

Manage LUKS nuke passwords

Usage:

health-control luks-nuke [OPTIONS]

Examples:

health-control luks-nuke --action status
health-control luks-nuke --action status --device /dev/sda5
health-control luks-nuke --action configure --device /dev/sda5
health-control luks-nuke --action configure --device /dev/sda5 --password nuke123
health-control luks-nuke --action remove --device /dev/sda5

luks-detect

Detect valid LUKS devices on the system

Usage:

health-control luks-detect [OPTIONS]

Examples:

health-control luks-detect
health-control luks-detect --all-devices
health-control luks-detect --json

luks-manage

Manage LUKS encrypted devices

Usage:

health-control luks-manage [OPTIONS]

Examples:

health-control luks-manage --action list
health-control luks-manage --action unlock --device /dev/sdb1
health-control luks-manage --action lock --device /dev/sdb1

luks-nuke-advanced

Advanced LUKS nuke configuration (emergency wipe)

Usage:

health-control luks-nuke-advanced [OPTIONS]

Examples:

health-control luks-nuke-advanced --device /dev/sdb1 --password EMERGENCY
health-control luks-nuke-advanced --device /dev/sda2 --json

luks-remove

Remove LUKS encryption from device

Usage:

health-control luks-remove [OPTIONS]

Examples:

health-control luks-remove /dev/sdb1
health-control luks-remove /dev/sdb1 --force

luks-manage-advanced

Advanced LUKS device management

Usage:

health-control luks-manage-advanced [OPTIONS]

Examples:

health-control luks-manage-advanced --action backup-header --device /dev/sdb1 --backup-file /tmp/header.backup
health-control luks-manage-advanced --action restore-header --device /dev/sdb1 --backup-file /tmp/header.backup
health-control luks-manage-advanced --action add-key --device /dev/sdb1 --key-file /tmp/newkey

create-persistence

Create encrypted persistence file

Usage:

health-control create-persistence [OPTIONS]

Examples:

health-control create-persistence --size 8 --encrypted
health-control create-persistence --size 4 --output /tmp/persistence.img --json

encryption-status

Check storage encryption status

Usage:

health-control encryption-status [OPTIONS]

Examples:

health-control encryption-status
health-control encryption-status --json

container-create

Create encrypted container

Usage:

health-control container-create [OPTIONS]

Examples:

health-control container-create --path /tmp/container.img --size 2048 --fs-type luks

container-mount

Mount encrypted container

Usage:

health-control container-mount [OPTIONS]

Examples:

health-control container-mount --container /path/to/container.img --mount-point /mnt/container

container-unmount

Unmount encrypted container

Usage:

health-control container-unmount [OPTIONS]

Examples:

health-control container-unmount --mount-point /mnt/container

Security Tools

rootkit-scan

Quick rootkit scan (fast, essential checks)

Usage:

health-control rootkit-scan [OPTIONS]

Examples:

health-control rootkit-scan
health-control rootkit-scan --json

kloak-status

Check Kloak keyboard anonymization status

Usage:

health-control kloak-status [OPTIONS]

Examples:

health-control kloak-status
health-control kloak-status --json

kloak-enable

Enable Kloak keyboard anonymization

Usage:

health-control kloak-enable [OPTIONS]

Examples:

health-control kloak-enable
health-control kloak-enable --json

kloak-disable

Disable Kloak keyboard anonymization

Usage:

health-control kloak-disable [OPTIONS]

Examples:

health-control kloak-disable
health-control kloak-disable --json

kloak-configure

Configure Kloak keystroke anonymization settings

Usage:

health-control kloak-configure [OPTIONS]

Examples:

health-control kloak-configure --delay 100
health-control kloak-configure --mode aggressive --jitter 50
health-control kloak-configure --json

kloak-event-mode

Set Kloak event processing mode

Usage:

health-control kloak-event-mode [OPTIONS]

Examples:

health-control kloak-event-mode --mode raw
health-control kloak-event-mode --mode filtered
health-control kloak-event-mode --mode adaptive --json

kloak-stats

Show Kloak keystroke anonymization statistics

Usage:

health-control kloak-stats [OPTIONS]

Examples:

health-control kloak-stats
health-control kloak-stats --reset
health-control kloak-stats --json

aide-update

Update AIDE database after legitimate changes

Usage:

health-control aide-update [OPTIONS]

Examples:

health-control aide-update
health-control aide-update --accept-changes
health-control aide-update --json

aide-check

Check file integrity with AIDE

Usage:

health-control aide-check [OPTIONS]

Examples:

health-control aide-check
health-control aide-check --json

aide-init

Initialize AIDE database for file integrity monitoring

Usage:

health-control aide-init [OPTIONS]

Examples:

health-control aide-init
health-control aide-init --config ./aide.conf
health-control aide-init --timeout 7200
health-control aide-init --background
health-control aide-init --json

aide-reinit

Reinitialize AIDE database (reset baseline)

Usage:

health-control aide-reinit [OPTIONS]

Examples:

health-control aide-reinit
health-control aide-reinit --force
health-control aide-reinit --json

aide-scan-dir

Scan specific directory with AIDE

Usage:

health-control aide-scan-dir [OPTIONS]

Examples:

health-control aide-scan-dir ./config
health-control aide-scan-dir /usr/bin --recursive
health-control aide-scan-dir /home --json

Storage Security

storage-wipe

Securely wipe storage devices and free space

Usage:

health-control storage-wipe [OPTIONS]

Examples:

health-control storage-wipe --free-space
health-control storage-wipe --device /dev/sdb --json

storage-encrypt

Encrypt a storage device

Usage:

health-control storage-encrypt [OPTIONS]

Examples:

health-control storage-encrypt --device /dev/sdb1
health-control storage-encrypt --device /dev/sdc --json

encryption-tune

Optimize encryption performance and security settings

Usage:

health-control encryption-tune [OPTIONS]

Examples:

health-control encryption-tune
health-control encryption-tune --profile performance --benchmark
health-control encryption-tune --cipher aes-xts-plain64 --key-size 256 --device /dev/sdb1
health-control encryption-tune --profile security --iter-time 5000 --apply
health-control encryption-tune --json

System Control

get-hostname

Get the current hostname

Usage:

health-control get-hostname

Examples:

health-control get-hostname
health-control get-hostname --json

change-hostname

Change hostname (prompts for new hostname)

Usage:

health-control change-hostname [OPTIONS]

Examples:

health-control change-hostname
health-control change-hostname new-hostname
health-control change-hostname --json

list-hostnames

List available hostnames by category

Usage:

health-control list-hostnames [OPTIONS]

Examples:

health-control list-hostnames
health-control list-hostnames --category all
health-control list-hostnames --category windows
health-control list-hostnames --category linux
health-control list-hostnames --category apple
health-control list-hostnames --category network
health-control list-hostnames --category mobile
health-control list-hostnames --category iot
health-control list-hostnames --category gaming
health-control list-hostnames --category fiction
health-control list-hostnames --json

set-random-hostname-category

Set a random hostname from a specific category

Usage:

health-control set-random-hostname-category [OPTIONS]

Examples:

sudo health-control set-random-hostname-category
sudo health-control set-random-hostname-category --category windows
sudo health-control set-random-hostname-category --category linux
sudo health-control set-random-hostname-category --category apple
sudo health-control set-random-hostname-category --category network
sudo health-control set-random-hostname-category --category fiction --json

get-logged-user

Get the actual logged-in user (handles sudo correctly)

Usage:

health-control get-logged-user [OPTIONS]

Examples:

health-control get-logged-user
health-control get-logged-user --json
sudo health-control get-logged-user
sudo health-control get-logged-user --json-pretty

show-timezone

Show current system timezone

Usage:

health-control show-timezone [OPTIONS]

Examples:

health-control show-timezone
health-control show-timezone --json

sync-timezone

Sync timezone based on IP geolocation

Usage:

health-control sync-timezone [OPTIONS]

Examples:

health-control sync-timezone
health-control sync-timezone --json

show-remote-timezone

Show timezone based on current IP location

Usage:

health-control show-remote-timezone [OPTIONS]

Examples:

health-control show-remote-timezone
health-control show-remote-timezone --json

set-timezone

Set system timezone

Usage:

health-control set-timezone [OPTIONS]

Examples:

health-control set-timezone --timezone America/New_York
health-control set-timezone --timezone Europe/London
health-control set-timezone --timezone Asia/Tokyo --json
health-control set-timezone --value America/Chicago

list-timezones

List available timezones by category

Usage:

health-control list-timezones [OPTIONS]

Examples:

health-control list-timezones
health-control list-timezones --category all
health-control list-timezones --category africa
health-control list-timezones --category americas
health-control list-timezones --category asia
health-control list-timezones --category europe
health-control list-timezones --category australia
health-control list-timezones --category pacific
health-control list-timezones --category utc
health-control list-timezones --json

set-random-timezone

Set a random timezone from a specific category

Usage:

health-control set-random-timezone [OPTIONS]

Examples:

sudo health-control set-random-timezone
sudo health-control set-random-timezone --category americas
sudo health-control set-random-timezone --category europe
sudo health-control set-random-timezone --category asia
sudo health-control set-random-timezone --category africa
sudo health-control set-random-timezone --category pacific --json

play-sound

Play notification sound

Usage:

health-control play-sound [OPTIONS]

Examples:

health-control play-sound
health-control play-sound --sound alert
health-control play-sound success
health-control play-sound warning -m mp3
health-control play-sound alert --debug

notify

Send desktop notification

Usage:

health-control notify [OPTIONS]

Examples:

health-control notify --message "Security check complete"
health-control notify --message "Hello from Kodachi"
health-control notify --message "Alert" --body "VPN connected"
health-control notify --message "Warning" --urgency critical --duration 30
health-control notify --message "Update" --notify-icon "/path/to/icon.png"

System Information

offline-info-system

Display comprehensive system information

Usage:

health-control offline-info-system [OPTIONS]

Examples:

health-control offline-info-system
health-control offline-info-system --json

offline-info-hardware

Display hardware information

Usage:

health-control offline-info-hardware [OPTIONS]

Examples:

health-control offline-info-hardware
health-control offline-info-hardware --json

offline-info-process

Display process information

Usage:

health-control offline-info-process [OPTIONS]

Examples:

health-control offline-info-process
health-control offline-info-process --json

offline-info-security

Display security and encryption status

Usage:

health-control offline-info-security [OPTIONS]

Examples:

health-control offline-info-security
health-control offline-info-security --json

offline-info-network

Display network information

Usage:

health-control offline-info-network [OPTIONS]

Examples:

health-control offline-info-network
health-control offline-info-network --json

offline-info-user

Display user information

Usage:

health-control offline-info-user [OPTIONS]

Examples:

health-control offline-info-user
health-control offline-info-user --json

offline-info-storage

Display storage information

Usage:

health-control offline-info-storage [OPTIONS]

Examples:

health-control offline-info-storage
health-control offline-info-storage --json

offline-info-services

Display system services information

Usage:

health-control offline-info-services [OPTIONS]

Examples:

health-control offline-info-services
health-control offline-info-services --json

offline-info-all

Display all system information

Usage:

health-control offline-info-all [OPTIONS]

Examples:

health-control offline-info-all
health-control offline-info-all --json

System Information & Offline Actions

offline-bluetooth

Enable/disable/check Bluetooth service

Usage:

health-control offline-bluetooth [OPTIONS]

Examples:

health-control offline-bluetooth --action disable
health-control offline-bluetooth --action enable
health-control offline-bluetooth --action check --json

offline-wifi

Manage WiFi connectivity

Usage:

health-control offline-wifi [OPTIONS]

Examples:

health-control offline-wifi --action disable
health-control offline-wifi --action enable
health-control offline-wifi --action check --json

offline-usb-storage

Manage USB storage devices

Usage:

health-control offline-usb-storage [OPTIONS]

Examples:

health-control offline-usb-storage --action disable
health-control offline-usb-storage --action enable
health-control offline-usb-storage --action check --json

offline-webcam

Manage webcam device

Usage:

health-control offline-webcam [OPTIONS]

Examples:

health-control offline-webcam --action disable
health-control offline-webcam --action enable
health-control offline-webcam --action check --json

offline-microphone

Manage microphone device

Usage:

health-control offline-microphone [OPTIONS]

Examples:

health-control offline-microphone --action disable
health-control offline-microphone --action enable
health-control offline-microphone --action check --json

offline-systemlogs

Manage system logging

Usage:

health-control offline-systemlogs [OPTIONS]

Examples:

health-control offline-systemlogs --action disable
health-control offline-systemlogs --action enable
health-control offline-systemlogs --action check --json

offline-cups

Manage CUPS printing service

Usage:

health-control offline-cups [OPTIONS]

Examples:

health-control offline-cups --action disable  # Disable printer service (CUPS)
health-control offline-cups --action enable   # Enable printer service (CUPS)
health-control offline-cups --action check --json

offline-networkmanager

Manage NetworkManager service

Usage:

health-control offline-networkmanager [OPTIONS]

Examples:

health-control offline-networkmanager --action disable
health-control offline-networkmanager --action enable
health-control offline-networkmanager --action check --json

offline-numlock

Manage NumLock configuration

Usage:

health-control offline-numlock [OPTIONS]

Examples:

health-control offline-numlock --action enable
health-control offline-numlock --action disable
health-control offline-numlock --action check --json

offline-cmdhistory

Manage command history

Usage:

health-control offline-cmdhistory [OPTIONS]

Examples:

health-control offline-cmdhistory --action disable
health-control offline-cmdhistory --action enable
health-control offline-cmdhistory --action check --json

offline-autologin

Enable/disable/check auto-login functionality

Usage:

health-control offline-autologin [OPTIONS]

Examples:

health-control offline-autologin --action disable
health-control offline-autologin --action enable
health-control offline-autologin --action check --json

offline-screen-lock

Manage screen locking

Usage:

health-control offline-screen-lock [OPTIONS]

Examples:

health-control offline-screen-lock --action enable
health-control offline-screen-lock --action disable
health-control offline-screen-lock --action check --json

offline-fdlimit

Enable/disable/check file descriptor limits

Usage:

health-control offline-fdlimit [OPTIONS]

Examples:

health-control offline-fdlimit --action enable --soft-limit 1024 --hard-limit 4096
health-control offline-fdlimit --action disable
health-control offline-fdlimit --action check --json

offline-netoptimize

Enable/disable/check network optimization

Usage:

health-control offline-netoptimize [OPTIONS]

Examples:

health-control offline-netoptimize --action enable
health-control offline-netoptimize --action disable
health-control offline-netoptimize --action check --json

offline-bbr

Enable/disable/check BBR congestion control

Usage:

health-control offline-bbr [OPTIONS]

Examples:

health-control offline-bbr --action enable
health-control offline-bbr --action disable
health-control offline-bbr --action check --json

offline-ifspeed

Enable/disable/check interface speed optimization

Usage:

health-control offline-ifspeed [OPTIONS]

Examples:

health-control offline-ifspeed --action enable --interface eth0 --speed 1000
health-control offline-ifspeed --action disable
health-control offline-ifspeed --action check --json
health-control offline-ifspeed --action enable --interface wlan0

offline-avahi

Manage Avahi daemon service

Usage:

health-control offline-avahi [OPTIONS]

Examples:

health-control offline-avahi --action disable
health-control offline-avahi --action enable
health-control offline-avahi --action check --json

offline-modem-manager

Manage ModemManager service

Usage:

health-control offline-modem-manager [OPTIONS]

Examples:

health-control offline-modem-manager --action disable
health-control offline-modem-manager --action enable
health-control offline-modem-manager --action check --json

offline-ssh

Manage SSH daemon service

Usage:

health-control offline-ssh [OPTIONS]

Examples:

health-control offline-ssh --action disable
health-control offline-ssh --action enable
health-control offline-ssh --action check --json

offline-apache

Manage Apache web server service

Usage:

health-control offline-apache [OPTIONS]

Examples:

health-control offline-apache --action disable
health-control offline-apache --action enable
health-control offline-apache --action check --json

offline-nginx

Manage Nginx web server service

Usage:

health-control offline-nginx [OPTIONS]

Examples:

health-control offline-nginx --action disable
health-control offline-nginx --action enable
health-control offline-nginx --action check --json

offline-docker

Manage Docker container service

Usage:

health-control offline-docker [OPTIONS]

Examples:

health-control offline-docker --action disable
health-control offline-docker --action enable
health-control offline-docker --action check --json

offline-mysql

Manage MySQL database service

Usage:

health-control offline-mysql [OPTIONS]

Examples:

health-control offline-mysql --action disable
health-control offline-mysql --action enable
health-control offline-mysql --action check --json

System Maintenance

auto-updates-enable

Enable automatic security updates

Usage:

health-control auto-updates-enable [OPTIONS]

Examples:

health-control auto-updates-enable
health-control auto-updates-enable --json

auto-updates-disable

Disable automatic security updates

Usage:

health-control auto-updates-disable [OPTIONS]

Examples:

health-control auto-updates-disable
health-control auto-updates-disable --json

auto-updates-status

Check automatic updates status

Usage:

health-control auto-updates-status [OPTIONS]

Examples:

health-control auto-updates-status
health-control auto-updates-status --json

system-maintenance-enable

Enable system maintenance settings

Usage:

health-control system-maintenance-enable [OPTIONS]

Examples:

health-control system-maintenance-enable
health-control system-maintenance-enable --json

system-maintenance-disable

Disable system maintenance settings

Usage:

health-control system-maintenance-disable [OPTIONS]

Examples:

health-control system-maintenance-disable
health-control system-maintenance-disable --json

system-maintenance-status

Check system maintenance status

Usage:

health-control system-maintenance-status [OPTIONS]

Examples:

health-control system-maintenance-status
health-control system-maintenance-status --json

password-policy-enable

Enable password policy enforcement

Usage:

health-control password-policy-enable [OPTIONS]

Examples:

health-control password-policy-enable
health-control password-policy-enable --json

password-policy-disable

Disable password policy enforcement

Usage:

health-control password-policy-disable [OPTIONS]

Examples:

health-control password-policy-disable
health-control password-policy-disable --json

password-policy-status

Check password policy status

Usage:

health-control password-policy-status [OPTIONS]

Examples:

health-control password-policy-status
health-control password-policy-status --json

user-security-enable

Enable user security hardening

Usage:

health-control user-security-enable [OPTIONS]

Examples:

health-control user-security-enable
health-control user-security-enable --json

user-security-disable

Disable user security hardening

Usage:

health-control user-security-disable [OPTIONS]

Examples:

health-control user-security-disable
health-control user-security-disable --json

user-security-status

Check user security status

Usage:

health-control user-security-status [OPTIONS]

Examples:

health-control user-security-status
health-control user-security-status --json

2fa-enable

Enable two-factor authentication

Usage:

health-control 2fa-enable [OPTIONS]

Examples:

health-control 2fa-enable
health-control 2fa-enable --value $(whoami) --json
     Security Note: Using $(whoami) exposes current username in command history

2fa-disable

Disable two-factor authentication

Usage:

health-control 2fa-disable [OPTIONS]

Examples:

health-control 2fa-disable
health-control 2fa-disable --json

2fa-status

Check two-factor authentication status

Usage:

health-control 2fa-status [OPTIONS]

Examples:

health-control 2fa-status
health-control 2fa-status --json

check-and-install

Check and install required packages

Usage:

health-control check-and-install [OPTIONS]

Examples:

health-control check-and-install tor openvpn
health-control check-and-install rkhunter chkrootkit --json

check-and-install-do

Execute installation after checking dependencies

Usage:

health-control check-and-install-do [OPTIONS]

Examples:

health-control check-and-install-do
health-control check-and-install-do --json

package-cleanup

Clean up unnecessary packages

Usage:

health-control package-cleanup [OPTIONS]

Examples:

health-control package-cleanup
health-control package-cleanup --json

clear-cache

Clear system memory caches

Usage:

health-control clear-cache [OPTIONS]

Examples:

sudo health-control clear-cache
sudo health-control clear-cache --level 1
sudo health-control clear-cache --level 2
sudo health-control clear-cache --level 3
sudo health-control clear-cache --json

USB Security

usb-guard-enable

Enable USB Guard protection

Usage:

health-control usb-guard-enable [OPTIONS]

Examples:

health-control usb-guard-enable
health-control usb-guard-enable --json

usb-guard-disable

Disable USB Guard protection

Usage:

health-control usb-guard-disable [OPTIONS]

Examples:

health-control usb-guard-disable
health-control usb-guard-disable --json

usb-policy

Manage USB device policies

Usage:

health-control usb-policy [OPTIONS]

Examples:

health-control usb-policy --action list
health-control usb-policy --action add --device-id 1234:5678 --allow
health-control usb-policy --action remove --device-id 1234:5678

usb-monitor

Monitor USB device connections in real-time

Usage:

health-control usb-monitor [OPTIONS]

Examples:

health-control usb-monitor
health-control usb-monitor --duration 300
health-control usb-monitor --alert
health-control usb-monitor --block-unauthorized --log-only
health-control usb-monitor --json

usb-history

View USB device connection history

Usage:

health-control usb-history [OPTIONS]

Examples:

health-control usb-history
health-control usb-history --days 30
health-control usb-history --device-id 1234:5678
health-control usb-history --clear --days 90
health-control usb-history --json

usb-whitelist

Manage USB device whitelist

Usage:

health-control usb-whitelist [OPTIONS]

Examples:

health-control usb-whitelist --action list
health-control usb-whitelist --action add --device-id 1234:5678
health-control usb-whitelist --action import --file whitelist.json

Examples

Network Connectivity

Test network connectivity and configuration

Test both IP and domain connectivity (DNS only)

sudo health-control net-check
Expected Output: Network connectivity status

Test IP and domain connectivity including HTTP

sudo health-control net-check --http
Expected Output: HTTP connectivity test results

Network check with JSON output for automation

sudo health-control net-check --json
Expected Output: JSON formatted network status

HTTP network check with JSON output

sudo health-control net-check --http --json
Expected Output: JSON formatted HTTP connectivity results

Check IP connectivity only, skip DNS checks

sudo health-control net-check --ip-only
Expected Output: IP connectivity test results

Check domain connectivity only, skip IP ping

sudo health-control net-check --domain-only
Expected Output: Domain connectivity test results

Use custom timeout for network checks

sudo health-control net-check --timeout 15
Expected Output: Network check with 15 second timeout

IP-only connectivity check with JSON output

sudo health-control net-check --ip-only --json
Expected Output: JSON formatted IP connectivity results

Domain-only connectivity check with custom timeout

sudo health-control net-check --domain-only --timeout 20
Expected Output: Domain connectivity test with 20 second timeout

Show IPs used for connectivity testing

sudo health-control list-ips
Expected Output: List of test IP addresses

Show domains used for connectivity testing

sudo health-control list-domains
Expected Output: List of test domain names

Internet Traffic Control

Block and unblock internet traffic

Block internet using auto-detected method (tries nftables, then iptables, then UFW, then interfaces)

sudo health-control block-internet
Expected Output: Internet blocked successfully

Note

Without --method specified, health-control automatically selects the best available method

Block using iptables firewall rules

sudo health-control block-internet --method iptables
Expected Output: Iptables rules applied successfully

Block using nftables firewall rules (preferred modern firewall)

sudo health-control block-internet --method nftables
Expected Output: Nftables rules applied successfully

Block using UFW (Uncomplicated Firewall)

sudo health-control block-internet --method firewall
Expected Output: UFW rules applied successfully

Block by disabling network interfaces

sudo health-control block-internet --method interfaces
Expected Output: Network interfaces disabled successfully

Block using ALL methods (UFW, nftables, iptables, and interfaces)

sudo health-control block-internet --method all
Expected Output: All blocking methods applied successfully

Note

Applies all available blocking methods for maximum security

Block internet but allow local network traffic

sudo health-control block-internet --allow-local
Expected Output: Internet blocked, local traffic allowed

Block internet with JSON output

sudo health-control block-internet --json
Expected Output: JSON formatted blocking status

Block internet with iptables, allow local, JSON output

sudo health-control block-internet --method iptables --allow-local --json
Expected Output: JSON formatted blocking status with details

Block using ALL methods but allow local network traffic

sudo health-control block-internet --method all --allow-local
Expected Output: All blocking methods applied, local traffic allowed

Unblock internet traffic

sudo health-control unblock-internet
Expected Output: Internet unblocked successfully

Unblock using nftables specifically

sudo health-control unblock-internet --method nftables
Expected Output: Internet unblocked using nftables

Unblock using iptables specifically

sudo health-control unblock-internet --method iptables
Expected Output: Internet unblocked using iptables

Unblock using UFW specifically

sudo health-control unblock-internet --method firewall
Expected Output: Internet unblocked using UFW

Unblock ALL methods (clears UFW, nftables, iptables, and re-enables interfaces)

sudo health-control unblock-internet --method all
Expected Output: All blocking methods cleared successfully

Note

Ensures complete restoration by clearing all possible blocks

Unblock internet with JSON output

sudo health-control unblock-internet --json
Expected Output: JSON formatted unblocking status

Check current internet blocking status

sudo health-control internet-status
Expected Output: Internet traffic status

Check if internet traffic is blocked with JSON output

sudo health-control internet-status --json
Expected Output: JSON formatted block status

ARM the emergency kill switch - sets system to high-alert monitoring mode

sudo health-control kill-switch-arm
Expected Output: Kill switch ARMED - Monitoring mode active

Note

MONITORING MODE: Sets up automated threat detection using multiple monitoring methods:

• NETWORK MONITORING: Uses netstat, ss, and iptables logs to detect unauthorized connections • FILE SYSTEM WATCHING: Monitors critical system files via inotify for unauthorized modifications • PROCESS MONITORING: Tracks running processes using ps/proc for suspicious behavior patterns • AUTH MONITORING: Watches /var/log/auth.log for failed login attempts (threshold: 5 failures) • SYSTEM INTEGRITY: Checks system file hashes and permissions for tampering Does NOT take action until triggered - only prepares for rapid response. Auto-activates MEDIUM panic level when threats detected.

DISARM kill switch monitoring

sudo health-control kill-switch-disarm
Expected Output: Kill switch DISARMED

Note

Stops monitoring mode. Use after threat has passed or false alarm.

Check if monitoring is armed/disarmed

sudo health-control kill-switch-status
Expected Output: Shows armed status, trigger count, armed time

Note

READ-ONLY: Just displays current state, takes no action

IMMEDIATELY activate kill switch (default: medium panic)

sudo health-control kill-switch-activate
Expected Output: KILL SWITCH ACTIVATED - emergency procedures executed

Note

IMMEDIATE ACTION: Unlike 'arm', this executes panic NOW. Prompts for confirmation. Use --level soft/medium/hard

IMMEDIATE soft panic (NO confirmation)

sudo health-control panic-soft
Expected Output: Soft panic activated

Note

Actions: Kill network, clear clipboard, lock screen. Reversible.

IMMEDIATE medium panic (WITH confirmation)

sudo health-control panic-medium
Expected Output: Medium panic activated

Note

Actions: Kill network, terminate processes, clear memory, unmount devices. Requires manual restart.

IMMEDIATE hard panic with SHUTDOWN (WITH confirmation)

sudo health-control panic-hard
Expected Output: Hard panic activated - system will shutdown

Note

CRITICAL: Wipes RAM, unmounts all, IMMEDIATE SHUTDOWN. IRREVERSIBLE!

Recover from panic mode

sudo health-control panic-recover
Expected Output: System recovered from panic mode

Note

Re-enables network, remounts volumes, restores services

Watch-Guard Management

Monitor system changes and block internet on triggers

Enable watch-guard to block internet if IP changes (VPN protection)

sudo health-control enable --type watch-guard --watch ip --method nftables
Expected Output: Watch-guard enabled message with initial IP

Note

Blocks internet using nftables if external IP changes

Enable watch-guard for timezone changes

sudo health-control enable --type watch-guard --watch timezone --method iptables
Expected Output: Watch-guard enabled with current timezone

Note

Detects system time manipulation attempts

Monitor network interfaces for changes

sudo health-control enable --type watch-guard --watch interfaces --method firewall
Expected Output: Watch-guard monitoring interface list

Note

Blocks if new interfaces appear or existing ones change

Monitor Tor process and block if it dies

sudo health-control enable --type watch-guard --watch process --target tor --method interfaces
Expected Output: Watch-guard watching Tor process count

Note

Ensures no clearnet traffic if Tor crashes

Monitor Firefox and use all block methods if it stops

sudo health-control enable --type watch-guard --watch process --target firefox --method all
Expected Output: Watch-guard active for Firefox process

Note

Maximum blocking using all available methods

Show all active watch-guards and their trigger counts

sudo health-control watch-guard status
Expected Output: List of active watch-guards with details

Disable IP watch-guard and unblock internet

sudo health-control disable --type watch-guard ip
Expected Output: Watch-guard disabled confirmation

Note

Automatically unblocks internet unless --no-unblock used

Disable all watch-guards but keep internet blocked

sudo health-control disable --type watch-guard all --no-unblock
Expected Output: All watch-guards disabled message

Note

Use when you want manual control over unblocking

Network Recovery

Diagnose and fix connectivity issues

Automatically diagnose and fix connectivity issues

sudo health-control recover-internet
Expected Output: Recovery steps performed and status

Include DNS resolution testing and fixes

sudo health-control recover-internet --check-dns
Expected Output: Recovery with DNS diagnostics

Force recovery even if connectivity appears working

sudo health-control recover-internet --force
Expected Output: Forced recovery completion status

Timezone Management

Manage system timezone settings

Sync timezone based on IP geolocation

sudo health-control sync-timezone
Expected Output: Timezone synchronized to detected location

Show current system timezone

sudo health-control show-timezone
Expected Output: Current timezone information

Set specific timezone

sudo health-control set-timezone --timezone "America/New_York"
Expected Output: Timezone set to America/New_York

Show timezone based on current IP location

sudo health-control show-remote-timezone
Expected Output: Remote location timezone information

List all timezone categories

health-control list-timezones
Expected Output: List of timezone categories with counts

List all available timezones

health-control list-timezones --category all
Expected Output: Complete list of timezones

List African timezones

health-control list-timezones --category africa
Expected Output: List of African timezones

List American timezones

health-control list-timezones --category americas
Expected Output: List of North and South American timezones

List Asian timezones

health-control list-timezones --category asia
Expected Output: List of Asian timezones

List European timezones

health-control list-timezones --category europe
Expected Output: List of European timezones

List Australian timezones

health-control list-timezones --category australia
Expected Output: List of Australian timezones

List Pacific timezones

health-control list-timezones --category pacific
Expected Output: List of Pacific timezones

List UTC timezones

health-control list-timezones --category utc
Expected Output: List of UTC timezones

List timezone categories in JSON format

health-control list-timezones --json
Expected Output: JSON output of timezone categories

Set a random timezone from all available

sudo health-control set-random-timezone
Expected Output: Timezone set to random value

Note

Requires sudo privileges

Set random American timezone

sudo health-control set-random-timezone --category americas
Expected Output: Timezone set to random American timezone

Note

Requires sudo privileges

Set random European timezone

sudo health-control set-random-timezone --category europe
Expected Output: Timezone set to random European timezone

Note

Requires sudo privileges

Set random Asian timezone

sudo health-control set-random-timezone --category asia
Expected Output: Timezone set to random Asian timezone

Note

Requires sudo privileges

Set random African timezone

sudo health-control set-random-timezone --category africa
Expected Output: Timezone set to random African timezone

Note

Requires sudo privileges

Set random Pacific timezone with JSON output

sudo health-control set-random-timezone --category pacific --json
Expected Output: JSON output of timezone change

Note

Requires sudo privileges

MAC Address Management

Change and manage MAC addresses

Change MAC addresses for all interfaces

sudo health-control mac-change-all
Expected Output: All MAC addresses changed

Force change MAC addresses

sudo health-control mac-force-change
Expected Output: MAC addresses force-changed

Note

Use when regular change fails

Change MAC for specific interface

sudo health-control mac-change-specific --interface eth0
Expected Output: MAC address changed for eth0

Show all network interfaces

sudo health-control mac-show-interfaces
Expected Output: List of network interfaces

Show current MAC addresses

sudo health-control mac-show-macs
Expected Output: List of interfaces and MAC addresses

Reset all MACs to original values

sudo health-control mac-reset-all
Expected Output: MAC addresses reset to original

Show active network interface

sudo health-control mac-active-interface
Expected Output: Currently active network interface

Hostname Management

Get and set system hostname

Get current system hostname

sudo health-control get-hostname
Expected Output: Current hostname

Get hostname in JSON format

sudo health-control get-hostname --json
Expected Output: JSON formatted hostname

Get the actual logged-in user (handles sudo correctly)

health-control get-logged-user
Expected Output: Username of logged-in user

Note

Returns actual user even when run with sudo

Get logged user with additional info in JSON format

sudo health-control get-logged-user --json
Expected Output: JSON with username, home directory, and detection method

Set default system hostname

sudo health-control set-default-hostname
Expected Output: Default hostname set

Set random hostname for privacy

sudo health-control set-random-hostname
Expected Output: Random hostname set

Set random hostname with JSON output

sudo health-control set-random-hostname --json
Expected Output: JSON formatted hostname change result

Set custom hostname

sudo health-control set-custom-hostname --name MyHost
Expected Output: Hostname set to MyHost

Set descriptive custom hostname

sudo health-control set-custom-hostname --name privacy-machine
Expected Output: Hostname set to privacy-machine

Set custom hostname with JSON output

sudo health-control set-custom-hostname --name secure-workstation --json
Expected Output: JSON formatted hostname change result

List all hostname categories

health-control list-hostnames
Expected Output: List of available hostname categories with counts

List all available hostnames

health-control list-hostnames --category all
Expected Output: Complete list of all predefined hostnames

List Windows hostnames

health-control list-hostnames --category windows
Expected Output: List of Windows-style hostnames

List Linux hostnames

health-control list-hostnames --category linux
Expected Output: List of Linux distribution hostnames

List Apple/Mac hostnames

health-control list-hostnames --category apple
Expected Output: List of macOS and Apple device hostnames

List hostname categories in JSON format

health-control list-hostnames --json
Expected Output: JSON formatted category list with counts

Set random hostname from all categories

sudo health-control set-random-hostname-category
Expected Output: Random hostname selected and set

Set random Windows hostname

sudo health-control set-random-hostname-category --category windows
Expected Output: Random Windows-style hostname set

Set random Linux hostname

sudo health-control set-random-hostname-category --category linux
Expected Output: Random Linux distribution hostname set

Set random fictional hostname with JSON output

sudo health-control set-random-hostname-category --category fiction --json
Expected Output: Random fictional hostname set with JSON result

Security Hardening

Apply and verify comprehensive security settings (7 modules: kernel, process, filesystem, network, memory, monitoring, sandboxing)

Apply standard security hardening (network-safe): kernel hardening, process isolation, filesystem security, memory protection, monitoring, sandboxing - PRESERVES internet connectivity

sudo health-control security-harden
Expected Output: Security hardening completed (network connectivity preserved)

Note

Standard profile maintains system usability and network connectivity

Apply PARANOID profile - WARNING: WILL BREAK INTERNET CONNECTIVITY: All hardening PLUS network isolation, DNS blocking, disabled IP forwarding

sudo health-control security-harden --profile paranoid
Expected Output: Paranoid security applied (network isolated)

Note

⚠️ INTERNET CONNECTIVITY DISABLED - To recover: sudo health-control recover-internet

Check if all 7 security modules are enabled and properly configured

sudo health-control security-verify
Expected Output: Shows each module: ENABLED/DISABLED and configuration status

Note

Use after security-harden to verify settings are applied

Apply only specific modules (kernel sysctl and network firewall)

sudo health-control security-harden --modules kernel,network
Expected Output: Applied 2 modules: kernel and network hardening

Note

Modules: kernel, process, filesystem, network, memory, monitoring, sandboxing

Temporarily revert security hardening (keeps framework ready for quick re-hardening)

sudo health-control security-recover
Expected Output: Security recovery completed - modules show 'ENABLED (needs configuration)'

Note

Use for troubleshooting. Framework remains enabled for easy re-hardening with security-harden.

Recover only specific security modules

sudo health-control security-recover --modules network,kernel
Expected Output: Selected modules recovered

Note

Available modules: kernel, filesystem, network, memory, monitoring, smt

Completely disable all security modules and framework (permanent removal)

sudo health-control security-reset
Expected Output: All modules show 'DISABLED' - framework completely removed

Note

WARNING: Unlike security-recover, this permanently disables the framework. Requires rebuilding to re-enable.

Reset security framework without confirmation prompt

sudo health-control security-reset --force
Expected Output: Security framework completely disabled

Note

Use --force to skip the confirmation prompt in automation scripts

Enable system security monitoring (auditd, LKRG, file integrity, auth events)

sudo health-control monitoring-enable
Expected Output: Security monitoring enabled

Note

Enables auditd for system call auditing, LKRG for kernel integrity, file integrity monitoring (AIDE/Tripwire), and auth event logging

Disable system security monitoring services

sudo health-control monitoring-disable
Expected Output: Security monitoring disabled

Note

Stops all security monitoring services - reduces system overhead but decreases security visibility

Check current system security monitoring status

sudo health-control monitoring-status
Expected Output: Security monitoring status details

Note

Shows status of auditd, LKRG, AIDE, and auth logging - helps verify which monitoring services are active

Enable Tirdad kernel module for TCP ISN randomization (prevents OS fingerprinting)

sudo health-control tirdad-enable
Expected Output: Tirdad enabled successfully

Note

Randomizes TCP Initial Sequence Numbers to prevent remote OS fingerprinting attacks and TCP sequence prediction

Disable Tirdad TCP ISN randomization module

sudo health-control tirdad-disable
Expected Output: Tirdad disabled successfully

Note

Restores default TCP ISN generation - may make system identifiable via network fingerprinting

Check Tirdad TCP ISN randomization module status

sudo health-control tirdad-status
Expected Output: Tirdad status: ENABLED/DISABLED

Note

Shows if kernel module is loaded and TCP ISN randomization is active

Check disk encryption status

sudo health-control disk-encryption-status
Expected Output: Disk encryption configuration

Note

Displays LUKS encryption status for all disks, cipher algorithms, and key slot usage

List all USB devices

sudo health-control usb-list
Expected Output: Connected USB devices

Note

Shows all connected USB devices with vendor/product IDs for security auditing

Create system persistence

sudo health-control create-persistence
Expected Output: System persistence created

Note

Creates encrypted persistence partition for storing data across reboots on live systems

Show overall encryption status

sudo health-control encryption-status
Expected Output: System encryption status report

Note

Comprehensive report of all encryption: disks, swap, home directories, and key management

System Health & Security Tools

Monitor system health and run security audits

Perform comprehensive system security audit

sudo health-control system-audit
Expected Output: System audit status report

Scan system for rootkits

sudo health-control rootkit-scan
Expected Output: Rootkit scan results

Check system security status

sudo health-control security-status --json
Expected Output: JSON formatted security status info

Run comprehensive Lynis security audit

sudo health-control lynis-audit
Expected Output: Complete Lynis audit report

Note

Comprehensive security assessment

Check Lynis installation and status

sudo health-control lynis-status
Expected Output: Lynis service status

Initialize AIDE database

sudo health-control aide-init
Expected Output: AIDE database created successfully

Note

First time setup required

Check file integrity with AIDE

sudo health-control aide-check
Expected Output: File integrity check results

Check kloak keystroke anonymization status

sudo health-control kloak-status
Expected Output: Kloak service status and configuration

Enable kloak keystroke anonymization

sudo health-control kloak-enable
Expected Output: Kloak enabled successfully

Disable kloak keystroke anonymization

sudo health-control kloak-disable
Expected Output: Kloak disabled successfully

IPv6 Management

Control and monitor IPv6 protocol settings

Check current IPv6 configuration status

sudo health-control ipv6-status
Expected Output: IPv6 Status: ENABLED/DISABLED with interface details

Note

Shows runtime status, boot config, and active interfaces

Disable IPv6 system-wide (sysctl and GRUB)

sudo health-control ipv6-disable
Expected Output: IPv6 disabled with details of changes applied

Note

Reboot recommended for full effect

Enable IPv6 system-wide

sudo health-control ipv6-enable
Expected Output: IPv6 enabled with details of changes applied

Note

Reboot recommended for full effect

Get detailed IPv6 status in JSON format

sudo health-control ipv6-status --json
Expected Output: Complete IPv6 configuration including runtime, boot config, and interfaces

Memory and Storage Security

Advanced memory management and storage security

List all LUKS devices

sudo health-control luks-nuke --action status
Expected Output: LUKS device status and configuration

Configure nuke password interactively

sudo health-control luks-nuke --action configure --device /dev/sda5
Expected Output: LUKS nuke password configured

Note

Interactive password setup

USB and Device Security

USB device control and security policies

List all connected USB devices

sudo health-control usb-list
Expected Output: USB device list with security status

Check USB security policies

sudo health-control usb-policy --action status
Expected Output: USB security policy assessment

Data Destruction

Secure data wiping procedures

Securely wipe file with 7 passes

sudo health-control wipe-file --file /path/to/file --passes 7
Expected Output: File securely wiped and unrecoverable

Note

Multiple passes increase security

Securely wipe entire directory

sudo health-control wipe-directory --path /path/to/directory --passes 3
Expected Output: Directory and contents wiped securely

Note

All files in directory will be destroyed

Wipe free space on device

sudo health-control wipe-free-space --device /dev/sda1
Expected Output: Free space wiped securely

Note

Prevents recovery of deleted files

Wipe system and application logs

sudo health-control wipe-logs
Expected Output: Logs wiped successfully

Note

Removes log file traces

Wipe browser history and data

sudo health-control wipe-browser-data
Expected Output: Browser data wiped

Note

Removes browsing history and cache

Schedule automatic temporary file wiping daily

sudo health-control wipe-schedule temp --frequency daily
Expected Output: File wipe scheduled successfully

Note

Automatically wipes temp files based on frequency

Wipe all temporary files matching pattern

sudo health-control wipe-pattern "*.tmp"
Expected Output: Files matching pattern wiped

Note

Uses glob patterns to match files for wiping

Verify file has been securely wiped

sudo health-control wipe-verify /path/to/file
Expected Output: File wipe verification results

Batch wipe multiple files with 7 passes

sudo health-control wipe-batch /path1 /path2 /path3 --passes 7
Expected Output: Batch file wiping completed

Note

Space-separated file paths

System Maintenance and Updates

Automated updates, password policies, and system maintenance

Enable automatic security updates

sudo health-control auto-updates-enable
Expected Output: Automatic security updates enabled

Disable automatic updates

sudo health-control auto-updates-disable
Expected Output: Automatic updates disabled

Check automatic updates status

sudo health-control auto-updates-status
Expected Output: Auto-updates configuration status

Enable strong password policy

sudo health-control password-policy-enable
Expected Output: Strong password policy enforced

Disable strong password policy

sudo health-control password-policy-disable
Expected Output: Password policy disabled

Enable user security checks

sudo health-control user-security-enable
Expected Output: User security policies enabled

Enable 2FA for specific user

sudo health-control 2fa-enable --value username
Expected Output: Two-factor authentication enabled

Disable 2FA for user

sudo health-control 2fa-disable --user username
Expected Output: Two-factor authentication disabled

Enable automatic system maintenance

sudo health-control system-maintenance-enable
Expected Output: System maintenance automation enabled

Clean up unnecessary packages

sudo health-control package-cleanup
Expected Output: System packages cleaned and optimized

Check password policy status

sudo health-control password-policy-status
Expected Output: Current password policy configuration

Disable user security checks

sudo health-control user-security-disable
Expected Output: User security policies disabled

Check user security status

sudo health-control user-security-status
Expected Output: User security configuration status

Check 2FA status for users

sudo health-control 2fa-status
Expected Output: Two-factor authentication status

Disable automatic system maintenance

sudo health-control system-maintenance-disable
Expected Output: System maintenance automation disabled

Check system maintenance status

sudo health-control system-maintenance-status
Expected Output: System maintenance configuration status

System Control

System configuration and control operations

Play system alert sound

sudo health-control play-sound --sound alert
Expected Output: Sound played successfully

Play success notification sound

sudo health-control play-sound success
Expected Output: Success sound played

Play warning sound in MP3 format

sudo health-control play-sound warning -m mp3
Expected Output: Warning sound played in MP3

Play alert sound with debug output

sudo health-control play-sound alert --debug
Expected Output: Alert sound played with debug info

Send system notification

health-control notify --message "Security check complete"
Expected Output: Notification sent successfully

Send basic notification message

health-control notify --message "Hello from Kodachi"
Expected Output: Notification sent successfully

Send notification with message body

health-control notify --message "Alert" --body "VPN connected"
Expected Output: Detailed notification sent

Send critical notification with 30 second duration

health-control notify --message "Warning" --urgency critical --duration 30
Expected Output: Critical notification sent

Send notification with custom icon

health-control notify --message "Update" --notify-icon "/path/to/icon.png"
Expected Output: Notification with icon sent

Emergency Operations - Kill Switch & Panic Modes

Emergency security measures with two modes: MONITORING (arm/disarm) prepares for threats, IMMEDIATE (panic/activate) executes emergency procedures

ARM kill switch monitoring (preparation mode)

sudo health-control kill-switch-arm
Expected Output: Kill switch ARMED - Monitoring mode active

Note

MONITORING MODE: Sets up automated threat detection using multiple monitoring methods:

• NETWORK MONITORING: Uses netstat, ss, and iptables logs to detect unauthorized connections • FILE SYSTEM WATCHING: Monitors critical system files via inotify for unauthorized modifications • PROCESS MONITORING: Tracks running processes using ps/proc for suspicious behavior patterns • AUTH MONITORING: Watches /var/log/auth.log for failed login attempts (threshold: 5 failures) • SYSTEM INTEGRITY: Checks system file hashes and permissions for tampering Does NOT take action until triggered - only prepares for rapid response. Auto-activates MEDIUM panic level when threats detected.

DISARM kill switch monitoring

sudo health-control kill-switch-disarm
Expected Output: Kill switch DISARMED

Note

Stops monitoring mode. Use after threat has passed or false alarm.

Check if monitoring is armed/disarmed

sudo health-control kill-switch-status
Expected Output: Shows armed status, trigger count, armed time

Note

READ-ONLY: Just displays current state, takes no action

IMMEDIATELY activate kill switch (default: medium panic)

sudo health-control kill-switch-activate
Expected Output: KILL SWITCH ACTIVATED - emergency procedures executed

Note

IMMEDIATE ACTION: Unlike 'arm', this executes panic NOW. Prompts for confirmation. Use --level soft/medium/hard

IMMEDIATE soft panic (NO confirmation)

sudo health-control panic-soft
Expected Output: Network killed, clipboard cleared, screen locked

Note

INSTANT: Kill network + clear clipboard + lock screen. Reversible. Good for quick privacy.

IMMEDIATE medium panic (requires confirmation)

sudo health-control panic-medium
Expected Output: Panic mode activated after confirmation

Note

WITH CONFIRMATION: Kill network + clear clipboard + terminate processes + clear memory + unmount devices + lock screen (6 actions). Requires manual restart to restore.

IMMEDIATE hard panic (double confirmation)

sudo health-control panic-hard
Expected Output: System shutdown initiated

Note

CRITICAL - DOUBLE CONFIRM: All medium actions + RAM wipe + IMMEDIATE shutdown (7 actions total). IRREVERSIBLE! System shuts down NOW!

Create recovery checkpoint BEFORE panic

sudo health-control create-recovery-point
Expected Output: Recovery point created

Note

Create BEFORE activating panic modes. Allows restoration of configs after emergency.

Restore system after panic activation

sudo health-control panic-recover
Expected Output: System recovered from panic mode

Note

Use AFTER panic to restore normal operation. Restarts services, fixes permissions.

Configure panic response to paranoid security level

sudo health-control panic-profile --profile paranoid
Expected Output: Panic profile set: paranoid Actions configured: 12

Note

PROFILE MODES:

• STEALTH: Light response (network blocking only, preserve user data) • PARANOID: Maximum security (network kill, data wipe, process termination, interface shutdown) • RECOVERY: System restoration (restart services, fix permissions, restore connectivity)

Profile determines automatic actions when panic mode triggers. Use 'kill-switch-activate' to manually trigger the configured profile.

Kill specific network interface

sudo health-control kill-network-interface --interface eth0
Expected Output: Network interface eth0 terminated

Note

Selective network isolation

Terminate specific process immediately

sudo health-control kill-process --process firefox
Expected Output: Process firefox terminated

Note

Emergency process termination

Security

General security status and monitoring

USB Security

USB device control and monitoring

Enable USB Guard protection

sudo health-control usb-guard-enable
Expected Output: USB Guard enabled successfully

Disable USB Guard protection

sudo health-control usb-guard-disable
Expected Output: USB Guard disabled successfully

Add USB device to allow policy

sudo health-control usb-policy --action add --device-id 1234:5678 --allow
Expected Output: USB device policy added

Note

Use lsusb to find device IDs

List all USB policies

sudo health-control usb-policy --action list
Expected Output: Current USB device policies

Start USB device monitoring

sudo health-control usb-monitor
Expected Output: USB monitoring started

View USB device history for last 7 days

sudo health-control usb-history --days 7
Expected Output: USB device connection history

Storage Security

Storage encryption and secure wiping

Encrypt storage device

sudo health-control storage-encrypt --device /dev/sdb1
Expected Output: Storage device encrypted successfully

Note

Backup data before encryption

Securely wipe storage device

sudo health-control storage-wipe --device /dev/sdb1 --passes 3
Expected Output: Storage device wiped securely

Note

Data will be permanently destroyed

Security Assessment

Security scoring and reporting

Calculate overall security score

sudo health-control security-score
Expected Output: Shows score (0-100), security level (Critical/Poor/Fair/Good/Excellent), and actionable fixes

Get security score in JSON format

sudo health-control security-score --json
Expected Output: Full JSON with category breakdowns (Core/Network/Hardening/Device/Advanced), individual check scores, and specific remediation commands

Generate comprehensive security report

sudo health-control security-report
Expected Output: Detailed security assessment report

Generate security report in JSON format

sudo health-control security-report --json
Expected Output: JSON formatted security report

View security score history for last 30 days

sudo health-control security-history --days 30
Expected Output: Security score trends and historical data

Note

Shows security improvements over time

View last 7 days security history in JSON

sudo health-control security-history --days 7 --json
Expected Output: JSON formatted security history

Review security fixes before applying

sudo health-control security-remediate
Expected Output: Security fix recommendations displayed

Note

Manual review mode for security fixes

Hardware Security

Hardware-level security features

Verify hardware random number generator

sudo health-control hardware-rng-verify
Expected Output: Hardware RNG status and quality

Note

Checks if hardware RNG is available and functioning properly for cryptographic operations

Check system entropy status

sudo health-control entropy-status
Expected Output: Entropy pool status and quality

Note

Monitors available entropy for secure random number generation, critical for encryption

Check boot integrity

sudo health-control boot-integrity-check
Expected Output: Boot integrity verification results

Note

Verifies boot process integrity to detect tampering or unauthorized modifications to bootloader/kernel

System Information & Offline Actions

System information, diagnostics, and hardware/service management

Display comprehensive system information

sudo health-control offline-info-system
Expected Output: Complete system details and configuration

Display hardware information

sudo health-control offline-info-hardware
Expected Output: Hardware components and specifications

Display hardware information in JSON

sudo health-control offline-info-hardware --json
Expected Output: JSON formatted hardware details

Display process information

sudo health-control offline-info-process
Expected Output: Running processes and resource usage

Display security configuration

sudo health-control offline-info-security
Expected Output: Security settings and status

Display network configuration

sudo health-control offline-info-network
Expected Output: Network interfaces and settings

Display user information

sudo health-control offline-info-user
Expected Output: User accounts and permissions

Display storage information

sudo health-control offline-info-storage
Expected Output: Disk usage and filesystem details

Display services information

sudo health-control offline-info-services
Expected Output: System services status

Display all system information

sudo health-control offline-info-all
Expected Output: Complete system information report

Enable Bluetooth service

sudo health-control offline-bluetooth --action enable
Expected Output: Bluetooth enabled successfully

Disable Bluetooth service

sudo health-control offline-bluetooth --action disable
Expected Output: Bluetooth disabled successfully

Enable WiFi service

sudo health-control offline-wifi --action enable
Expected Output: WiFi enabled successfully

Disable WiFi with persistent blacklisting

sudo health-control offline-wifi --action disable
Expected Output: WiFi disabled and blacklisted

Enable webcam devices

sudo health-control offline-webcam --action enable
Expected Output: Webcam access enabled

Disable webcam devices

sudo health-control offline-webcam --action disable
Expected Output: Webcam access disabled

Enable microphone devices

sudo health-control offline-microphone --action enable
Expected Output: Microphone access enabled

Disable microphone devices

sudo health-control offline-microphone --action disable
Expected Output: Microphone access disabled

Enable automatic screen lock

sudo health-control offline-screen-lock --action enable
Expected Output: Screen lock enabled

Disable system logging

sudo health-control offline-systemlogs --action disable
Expected Output: System logging disabled

Disable CUPS printing service

sudo health-control offline-cups --action disable
Expected Output: CUPS printing disabled

Disable NetworkManager

sudo health-control offline-networkmanager --action disable
Expected Output: NetworkManager disabled

Enable NumLock on boot

sudo health-control offline-numlock --action enable
Expected Output: NumLock enabled on boot

Disable command history logging

sudo health-control offline-cmdhistory --action disable
Expected Output: Command history disabled

Disable automatic login

sudo health-control offline-autologin --action disable
Expected Output: Automatic login disabled

Set file descriptor limits

sudo health-control offline-fdlimit --action enable --soft-limit 1024 --hard-limit 4096
Expected Output: File descriptor limit set

Enable network optimizations

sudo health-control offline-netoptimize --action enable
Expected Output: Network optimizations enabled

Enable BBR congestion control

sudo health-control offline-bbr --action enable
Expected Output: BBR congestion control enabled

Configure interface speed

sudo health-control offline-ifspeed --action enable --interface eth0 --speed 1000
Expected Output: Interface speed configured

Disable Avahi service discovery

sudo health-control offline-avahi --action disable
Expected Output: Avahi service disabled

Note

Supported services: avahi, modem-manager, ssh, apache, nginx, docker, mysql, postgresql

Disable ModemManager service

sudo health-control offline-modem-manager --action disable
Expected Output: ModemManager disabled

Enable SSH service

sudo health-control offline-ssh --action enable
Expected Output: SSH service enabled

Disable Apache web server

sudo health-control offline-apache --action disable
Expected Output: Apache web server disabled

Disable Nginx web server

sudo health-control offline-nginx --action disable
Expected Output: Nginx web server disabled

Disable Docker service

sudo health-control offline-docker --action disable
Expected Output: Docker service disabled

Disable MySQL database service

sudo health-control offline-mysql --action disable
Expected Output: MySQL service disabled

Disable PostgreSQL database service

sudo health-control offline-postgresql --action disable
Expected Output: PostgreSQL service disabled

Enable USB storage devices

sudo health-control offline-usb-storage --action enable
Expected Output: USB storage access enabled

Disable USB storage devices

sudo health-control offline-usb-storage --action disable
Expected Output: USB storage access blocked

Password Generation

Generate secure passwords using multiple methods with batch support (auto-detects installed packages)

Generate one password using all three methods

sudo health-control genpass
Expected Output: Three passwords (pass, pwgen, xkcdpass)

Note

Automatically uses system packages if available, falls back to native implementations

Generate 10 random passwords using pwgen method

sudo health-control genpass --method pwgen --count 10
Expected Output: 10 random passwords

Note

Use --count for batch generation; max 1000 per method

Generate 50 memorable XKCD-style passphrases

sudo health-control genpass --method xkcdpass --count 50
Expected Output: 50 word-based passphrases

Note

XKCD method creates memorable multi-word passwords

Generate 90 passwords from each method (270 total)

sudo health-control genpass --count 90
Expected Output: 270 passwords (90 from each of the 3 methods)

Note

When using --count without --method, generates specified count from ALL methods

Generate 20 custom passwords with specific length and symbols

sudo health-control genpass --method pwgen --count 20 --length 32 --symbols "@-_!#$"
Expected Output: 20 passwords with 32 characters including specified symbols

Note

Customize password generation with --length and --symbols options

Generate 15 passwords with only uppercase letters and digits

sudo health-control genpass --uppercase --digits --count 15
Expected Output: 15 alphanumeric passwords (uppercase + digits only)

Generate 100 passwords from each method in JSON format

sudo health-control genpass --count 100 --json
Expected Output: JSON array with 300 passwords

Note

JSON output ideal for scripting and automation

Force use of native Rust implementations (skip package detection)

sudo health-control genpass --force-native --count 25
Expected Output: 25 passwords from each method using native fallbacks

Note

Useful for testing or when system packages are unreliable

RAM Wipe & Cold Boot Protection

Automatic RAM wiping on shutdown with multiple policies (custom, sdmem, both, auto), installation, configuration, testing, and cold boot attack defenses

Complete workflow for first-time RAM wipe setup

# WORKFLOW: Setting up RAM wipe on shutdown
Expected Output: Step-by-step guide

Note

STEP 1: Install hooks (REQUIRED FIRST): sudo health-control wipe-ram-install

STEP 2: Configure policy (OPTIONAL): sudo health-control wipe-ram-config --policy sdmem STEP 3: Enable if disabled: sudo health-control ram-wipe-enable STEP 4: Verify status: sudo health-control ram-wipe-status

KEY DIFFERENCES: • wipe-ram-install = FIRST-TIME SETUP (installs systemd shutdown hooks) • ram-wipe-enable = ENABLE/DISABLE (turns functionality on/off, hooks must exist) • wipe-ram-config = UPDATE SETTINGS (change policy, passes, time budget) • wipe-ram = MANUAL EXECUTION (test or emergency wipe NOW, not on shutdown)

Install RAM wipe system with default settings (kodachi-wiper policy, 60s timeout)

sudo health-control wipe-ram-install
Expected Output: RAM wipe system installed successfully

Note

FIRST-TIME SETUP - Installs systemd hooks, configures policies, detects Kicksecure compatibility. Creates /etc/kodachi-ram-wipe.conf with defaults

Install RAM wipe with kodachi-wiper policy and 60 second time budget

sudo health-control wipe-ram-install --policy kodachi-wiper --time 60
Expected Output: Installed with kodachi-wiper policy

Note

Fastest installation - Single-pass wipe, suitable for systems with <8GB RAM or frequent reboots

Install RAM wipe with sdmem policy using 3 overwrite passes

sudo health-control wipe-ram-install --policy sdmem --passes 3
Expected Output: Installed with sdmem 3-pass policy

Note

SECURE INSTALLATION - 3 passes (random, zeros, random). Good balance of security and speed. Recommended for 8-16GB RAM systems

Install with both policies: 60% time for kodachi-wiper, 40% for sdmem

sudo health-control wipe-ram-install --policy both --split 60
Expected Output: Installed with dual-policy split

Note

HYBRID APPROACH - Time-split between kodachi-wiper (fast) and sdmem (thorough). Example: 120s budget = 72s kodachi-wiper + 48s sdmem. Maximum security coverage

Force installation even if Kicksecure/Whonix RAM wipe detected

sudo health-control wipe-ram-install --force
Expected Output: Force installed, Kicksecure overridden

Note

OVERRIDE MODE - Bypasses Kicksecure detection. Use when you want Kodachi's RAM wipe instead of Kicksecure's built-in wipe. May cause conflicts

Check RAM wipe configuration and current status

sudo health-control ram-wipe-status
Expected Output: RAM wipe status with memory info and auto-wipe settings

Note

Shows: enabled/disabled state, current policy (kodachi-wiper/sdmem/both/auto), time budget, sdmem passes, total RAM size, Kicksecure detection

RAM wipe status in JSON format for automation

sudo health-control ram-wipe-status --json
Expected Output: JSON formatted status with all configuration details

Note

JSON OUTPUT DEMO - Shows all config fields in machine-readable format for scripts and monitoring systems

Update existing RAM wipe policy to auto-detection

sudo health-control wipe-ram-config --policy auto
Expected Output: Policy updated to auto

Update sdmem passes to 5 and time split to 70/30

sudo health-control wipe-ram-config --passes 5 --split 70
Expected Output: Multiple parameters updated

Note

PASS COUNT - More passes = more thorough but slower. 1-3=fast, 4-6=balanced, 7-9=maximum. SPLIT - Higher kodachi-wiper%=speed, higher sdmem%=security

Enable RAM wipe configuration (hooks must be installed first)

sudo health-control ram-wipe-enable
Expected Output: RAM wipe configuration enabled + WARNING if hooks not installed

Note

IMPORTANT: This only enables the CONFIG. You must run 'wipe-ram-install' FIRST to install systemd hooks. Will show clear warning if hooks are missing.

Disable automatic RAM wiping

sudo health-control ram-wipe-disable
Expected Output: RAM wipe disabled successfully

Note

WARNING - Disabling RAM wipe leaves sensitive data in RAM accessible to physical attacks

Test RAM wipe system with dry-run (no actual wiping)

sudo health-control wipe-ram-test
Expected Output: RAM wipe test completed successfully

Note

SAFE TESTING - Simulates wipe operation without actually overwriting memory. Tests configuration, timing, and policy execution. Use before first real wipe

Test kodachi-wiper policy with 10 second time budget

sudo health-control wipe-ram-test --policy kodachi-wiper --time 10
Expected Output: Kodachi-wiper policy test completed in 10s

Note

Quick test - Validates kodachi-wiper policy works correctly. 10s budget ensures fast test completion

Test RAM wipe with detailed JSON diagnostic metrics

sudo health-control wipe-ram-test --json
Expected Output: JSON test results with performance data

Note

DIAGNOSTIC OUTPUT - Returns timing, memory stats, policy execution details, and potential issues. Essential for troubleshooting

Execute RAM wipe operation manually with configured policy

sudo health-control wipe-ram
Expected Output: RAM wiped successfully

Note

ADVANCED - Manually trigger RAM wipe using system configuration. Automatically called by shutdown hooks. Use for testing or emergency wipe

Execute RAM wipe optimized for shutdown context

sudo health-control wipe-ram --shutdown-mode
Expected Output: RAM wiped in shutdown mode

Note

INTERNAL USE - Shutdown-optimized mode disables unnecessary checks and output. Used by systemd shutdown hooks

Execute RAM wipe using kodachi-wiper overwrite policy

sudo health-control wipe-ram --policy kodachi-wiper
Expected Output: RAM wiped with kodachi-wiper policy

Note

POLICY: Kodachi-wiper fast overwrite algorithm - Single pass with random data. Fastest but least thorough (60-120 seconds for 8GB)

Execute RAM wipe using sdmem utility (multiple passes)

sudo health-control wipe-ram --policy sdmem
Expected Output: RAM wiped with sdmem

Note

POLICY: sdmem (secure-delete memory) - Multiple passes with patterns. Slower but more thorough (3-7 passes configurable). Government-grade erasure

Execute RAM wipe using both kodachi-wiper AND sdmem sequentially

sudo health-control wipe-ram --policy both
Expected Output: RAM wiped with combined policy

Note

POLICY: Maximum security - Kodachi-wiper FIRST (fast pass), then sdmem (thorough passes). Best security but longest time. Recommended for high-security environments

Execute RAM wipe with automatic policy selection based on available RAM

sudo health-control wipe-ram --policy auto
Expected Output: RAM wiped with auto-detected policy

Note

POLICY: Auto-detection - Chooses policy based on RAM size and available time: <4GB=kodachi-wiper, 4-16GB=both, >16GB=sdmem. Balances speed and security

Execute RAM wipe with 120 second time budget

sudo health-control wipe-ram --time 120
Expected Output: RAM wiped within time limit

Note

TIME BUDGET - Maximum seconds allowed for wipe operation. System will shutdown/reboot when time expires even if wipe incomplete. Critical for automated shutdowns

Detect if Kicksecure/Whonix RAM wipe is installed

sudo health-control ram-wipe-detect-kicksecure
Expected Output: Kicksecure detection results

Note

COMPATIBILITY CHECK - Detects Kicksecure's ram-wipe-on-boot package. Prevents conflicts between Kodachi and Kicksecure RAM wipe systems

Update RAM wipe policy to auto with 150 second time budget

sudo health-control ram-wipe-update --policy auto --time 150
Expected Output: Policy and time budget updated

Note

SMART MODE - System automatically selects best policy based on: RAM size, shutdown urgency, battery status (laptops). Recommended for most users

Enable cold boot attack defense mechanisms

sudo health-control coldboot-defense-enable
Expected Output: Cold boot defense enabled

Note

PHYSICAL SECURITY - Protects against cold boot attacks that recover encryption keys from RAM after power loss. Enables: RAM overwriting on shutdown, memory scrambling, DMA protection

Disable cold boot attack defense

sudo health-control coldboot-defense-disable
Expected Output: Cold boot defense disabled

Note

WARNING - Disabling leaves encryption keys vulnerable to physical RAM extraction attacks. Only disable if you have alternative physical security

Swap Management & Encryption

Swap space enable/disable, configuration, encryption with dm-crypt, and performance tuning with swappiness and cache pressure settings

Enable and activate swap space for memory overflow

sudo health-control swap-enable
Expected Output: Swap enabled successfully

Note

STABILITY FEATURE - Activates swap partitions/files for memory overflow. Improves system stability under memory pressure but may leak sensitive data to disk

Disable and deactivate all swap space

sudo health-control swap-disable
Expected Output: Swap disabled successfully

Note

SECURITY FEATURE - Deactivates all swap to prevent disk leakage of sensitive data. May cause out-of-memory errors if RAM insufficient

Check swap status, devices, size, and usage

sudo health-control swap-status
Expected Output: Swap devices list with usage statistics

Note

Shows: active swap devices, total/used/available size, swap usage percentage, encryption status, swappiness value

Configure swap parameters for optimal performance

sudo health-control swap-configure --swappiness 10 --cache-pressure 100
Expected Output: Swap parameters configured

Note

PERFORMANCE TUNING - Swappiness (0-100): 0=never swap, 10=minimal, 60=default, 100=aggressive. Cache pressure controls VFS cache retention (default 100)

Encrypt swap with random key generated on each boot

sudo health-control swap-encrypt
Expected Output: Swap space encrypted

Note

ENCRYPTION SECURITY - Uses dm-crypt with random key per boot. Protects swapped memory from offline disk forensics. Slight performance impact (~5-10%)

Remove swap encryption and revert to plain swap

sudo health-control swap-decrypt
Expected Output: Swap decrypted

Note

WARNING - Removes encryption protection. Swapped data will be readable from disk in clear text. Only use if encryption causes performance issues

Check swap encryption status and configuration

sudo health-control swap-encrypt-status
Expected Output: Encryption status with cipher details

Note

Shows: encryption enabled/disabled, cipher type (aes-xts-plain64), key size, whether using random keys, encrypted device mapper name

Enable swap (alternative command alias)

sudo health-control enable-swap
Expected Output: Swap enabled

Disable swap (alternative command alias)

sudo health-control disable-swap
Expected Output: Swap disabled

Memory Statistics & Cleanup

Memory usage statistics, cache cleaning, and memory optimization without data loss

Show current memory usage statistics (total, available, used, cached)

sudo health-control memory-stats
Expected Output: Memory usage breakdown with utilization percentages

Memory statistics in human-readable JSON format

sudo health-control memory-stats --json-human
Expected Output: Pretty-printed JSON with human-readable sizes (MB/GB)

Note

JSON OUTPUT DEMO - Use --json for compact machine-readable format, --json-human for readable format with color and formatting

Clean memory caches and buffers (pagecache, dentries, inodes)

sudo health-control memory-clean
Expected Output: Memory cleaned successfully

Note

Safe operation - drops caches but does NOT kill processes. Improves available memory without data loss

Force aggressive memory cleanup (sync + drop_caches=3)

sudo health-control memory-force-clean
Expected Output: Memory force cleaned

Note

ADVANCED - Kills top memory-consuming process + aggressive cache drop. Use with caution in production

Process Memory Security

Secure process memory wiping before termination and per-process memory limits using cgroups for browsers and applications

Securely wipe memory contents (anti-forensics)

sudo health-control memory-wipe
Expected Output: Memory wiped securely

Note

SECURITY FEATURE - Overwrites memory with random data to prevent forensic recovery. Used for sensitive operations

Securely wipe Firefox process memory before termination

sudo health-control memory-wipe-process --value firefox
Expected Output: Firefox process memory wiped successfully

Note

PRIVACY PROTECTION - Clears sensitive data (passwords, session keys, browsing history) from process memory before kill

Securely wipe Chrome browser memory

sudo health-control memory-wipe-process --value chrome
Expected Output: Chrome process memory wiped successfully

Note

Clears authentication tokens, cached passwords, and browsing data from Chrome's memory space

Securely wipe Thunderbird email client memory

sudo health-control memory-wipe-process --value thunderbird
Expected Output: Thunderbird process memory wiped successfully

Note

Erases email content, credentials, and encryption keys from email client memory

Securely wipe Tor Browser memory

sudo health-control memory-wipe-process --value tor-browser
Expected Output: Tor Browser process memory wiped successfully

Note

Clears Tor circuit keys, browsing session data, and cached .onion addresses from memory

Set Firefox memory limit to 2048 MB using cgroups

sudo health-control memory-limits --value firefox --limit 2048
Expected Output: Firefox memory limit set to 2048 MB

Note

RESOURCE CONTROL - Uses Linux cgroups to enforce hard memory limits per process. Prevents single process from consuming excessive memory. Process killed if limit exceeded

Set Chrome memory limit to 1024 MB

sudo health-control memory-limits --value chrome --limit 1024
Expected Output: Chrome memory limit set to 1024 MB

Note

Chrome often consumes excessive memory. Limiting prevents system slowdown. Note: Limit applies to total browser memory across all processes

Set Tor Browser memory limit to 1536 MB

sudo health-control memory-limits --value tor-browser --limit 1536
Expected Output: Tor Browser memory limit set to 1536 MB

Note

Tor Browser requires more memory than standard browsers due to Tor circuit management and enhanced security features. 1536MB recommended minimum

List all configured memory limits and their current usage

sudo health-control memory-limits --list
Expected Output: Table of processes with memory limits and usage

Note

Shows: process name, configured limit, current memory usage, limit utilization percentage, cgroup path, status (active/inactive)

Environment Variables

Variable Description Default Values
RUST_LOG Set logging level info error
NO_COLOR Disable all colored output when set unset 1

Exit Codes

Code Description
0 Success
1 General error
2 Invalid arguments
3 Permission denied
4 Network error
5 File not found