I built a tool called *Kekkai* for file integrity monitoring in production environments.
It records file hashes during deployment and later verifies them to detect unauthorized modifications (e.g. from OS command injection or tampering).
Why it matters:
* Many web apps (PHP, Ruby, Python, etc.) on AWS EC2 need a lightweight way to confirm their code hasn’t been changed.
* Traditional approaches that rely on metadata often create false positives.
* Kekkai checks only file content, so it reliably detects real changes.
* I’ve deployed it to an EC2 PHP application in production, and it’s working smoothly so far.
Key points:
* *Content-only hashing* (ignores timestamps/metadata)
* *Symlink protection* (detects swaps/changes)
* *Secure S3 storage* (deploy servers write-only, app servers read-only)
* *Single Go binary* with minimal dependencies
Would love feedback from others running apps on EC2 or managing file integrity in production.
You're assuming that an attacker already has access to your system, and you want to detect any changes they make to certain files.
If you are dealing with a relatively unsophisticated attacker, surely it would be easier to just mount the data that shouldn't be changed on a read-only filesystem, or set the immutable bit?
And if the attacker is sophisticated, surely they could just disable the verifier? Or replace it with a no-op that doesn't actually check hashes?
> Many web apps (PHP, Ruby, Python, etc.) on AWS EC2 need a lightweight way to confirm their code hasn’t been changed.
I don't think this is true, any more than the square-root function needs a way to confirm that its argument hasn't been tampered with. You're solving the problem in the wrong place. It seems like security theater.