| ▲ | Show HN: ChronoGuard–Zero-trust proxy for browser automation with temporal ctrls(github.com) | |
| 2 points by j-raghavan 14 hours ago | ||
Hi HN! I built ChronoGuard, an open-source zero-trust proxy that provides network-enforced authorization for browser automation. ## The Problem If you're running Playwright, Puppeteer, or Selenium agents at scale (CI/CD, K8s, VM fleets), you face two challenges:
Traditional approaches (SDK restrictions, code reviews, monitoring) are bypassable or lack temporal proof. Auditors and compliance teams want cryptographically verifiable, tamper-proof logs.## The Solution ChronoGuard is a mandatory forward proxy that sits between your agents and the internet. Every request flows through:
*Key features:*
- mTLS authentication for agent identity verification
- Domain allowlists/blocklists with time-window restrictions
- Cryptographic hash chains for audit log integrity
- OPA integration for policy-as-code
- Multi-tenant isolation
- 96%+ test coverage## Try It Now Zero setup needed - just click: [](https://codespaces.new/j-raghavan/ChronoGuard?quickstart=1) Or run locally: ```bash git clone https://github.com/j-raghavan/chronoguard cd chronoguard ./scripts/generate_secrets.sh docker compose up -d ```
ArchitectureBuilt with Domain-Driven Design + Clean Architecture: - 6 services: Envoy proxy, OPA policy engine, FastAPI backend, React dashboard, PostgreSQL+TimescaleDB, Redis - Tech stack: Python 3.11+, FastAPI, Envoy, Open Policy Agent, TimescaleDB - Deployment: Docker Compose (MVP), Kubernetes ready (roadmap) Use Cases
What's Next
Contributing
Happy to answer questions about the architecture, design decisions, or roadmap!Best Regards! | ||