Skip to content

Integrity Check

File Information

Property Value
Binary Name integrity-check
Version 9.0.1
File Size 2.7MB
Author Warith Al Maawali
License Proprietary
Category Security & Authentication
Description A system integrity checker for verifying script and configuration files
JSON Data View Raw JSON

SHA256 Checksum

35b64224013539f7008b662aa0fa5e3a0b304dbe3ac9c8bd39826cac701a0410

Key Features

Integrity Verification

Feature Description
Hash Verification SHA256 checksums for all tracked files
Signature Validation Cryptographic signatures prevent forgery
Version Tracking Compares local vs remote package versions
Configuration Auditing Validates config file syntax and security

Why Integrity Check is Essential

Benefit Description
Tamper Detection Immediately identifies modified system files
Malware Prevention Detects unauthorized changes to binaries
Security Auditing Regular verification ensures system integrity
Compliance Maintains audit trail of system modifications

TL;DR - Essential Commands

# Verify integrity of all tracked files
sudo integrity-check check-integrity

# Generate new baseline hashes
sudo integrity-check generate

# Verify cryptographic signatures
integrity-check check-signatures

# Run comprehensive check (integrity + versions + signatures)
sudo integrity-check check-all

# View recent integrity logs
integrity-check view-logs

Understanding System Integrity

How Integrity Checking Works

Integrity Check maintains a database of known-good file hashes and compares them against current files:

# Check integrity of all system files
sudo integrity-check check-integrity

What Gets Checked:

Location Description
System Binaries /usr/bin, /usr/sbin
Dashboard Scripts dashboard/hooks/
Configuration Files /etc/
Kodachi Binaries Kodachi-specific binaries and tools

Generating Baselines

After fresh installation or verified updates:

# Generate new hash database
sudo integrity-check generate

This creates a baseline of all file hashes that future checks compare against.

Signature Verification

Verify cryptographic signatures on signed files:

# Check all file signatures
integrity-check check-signatures

Signatures ensure files haven't been modified since signing by Kodachi developers.

Version Checking

Compare local package versions with remote repositories:

# Check if packages are up-to-date
integrity-check check-version

Identifies outdated packages that may have security vulnerabilities.

Configuration Validation

Verify configuration file integrity and syntax:

# Validate all config files
integrity-check check-config

Ensures configuration files haven't been corrupted or maliciously modified.

Comprehensive Security Audit

Run all checks in sequence:

# Complete system integrity audit
sudo integrity-check check-all

This performs: 1. File integrity verification 2. Signature validation 3. Version checking 4. Configuration auditing

Viewing Audit Logs

# View recent integrity check results
integrity-check view-logs

# View logs with verbose details
integrity-check view-logs --verbose

Interpreting Results

Result Status:

Status Meaning
PASS File matches known-good hash
FAIL File has been modified
WARNING File missing or new file detected
SIGNED Valid cryptographic signature

JSON Output Examples:

# Get results in JSON format for automation
integrity-check check-integrity --json
integrity-check check-signatures --json

# Parse results with jq
sudo integrity-check check-all --json | jq '.failed_files[]'
sudo integrity-check check-all --json | jq '.summary.total_failures'

Common Modifications to Investigate:

Type Description
Binary Files Modified binaries in system directories
Script Changes Script modifications in hooks directory
Config Changes Unexpected configuration changes
New Files New files in sensitive locations

Advanced Commands

For advanced users who need access to all available commands and options, please refer to the auto-generated command reference which includes:

Feature Description
Custom Paths Custom file path specifications
Hash Algorithms Hash algorithm selection
Incremental Checks Incremental checking options
Network Verification Network verification settings
Validation Modes Strict validation modes
JSON Formatting JSON output formatting
CLI Reference All command-line flags and parameters

Security Notes

Important Security Practices:

Practice Description
Post-Update Checks Run integrity checks after system updates
Trusted Baselines Generate new baselines only on trusted systems
Immediate Investigation Investigate all failed integrity checks immediately
Key Updates Keep signature keys updated
Regular Audits Run comprehensive checks regularly
Log Retention Save logs for security audits

Performance

Metric Value
Check Time 10-30 seconds for full scan
Memory Usage ~40MB during scanning
CPU Usage < 20% during checks
Database Size ~10MB for hash storage
Network Usage Minimal (version checks only)

Support

Resource Link
Website digi77.com
Anonymity Verifier kodachi.cloud
Discord Support discord.gg/KEFErEx
GitHub github.com/WMAL