Share this page with your security team. Architecture, command whitelist, audit schema, and a customer-run lockdown script — everything needed for enterprise procurement.
The proxy runs on your server. It calls out to TuneVault. TuneVault never calls in. No inbound firewall rules, no VPN, no SSH from our side.
tunevault system user with /sbin/nologin, restricted to /opt/tunevault only.These are the only EBS operational commands TuneVault can issue. The list is seeded in the database at deployment time and validated server-side on every request — user input never flows into command construction.
| Slug | Label | Category | Command Preview | Risk | Dry-run |
|---|---|---|---|---|---|
|
Loading live whitelist from database...
|
|||||
audit_log rejection row — before any Oracle command is even considered. The slug validation happens against the database, not a client-supplied list. If a slug isn't in ebs_control_commands, it cannot be executed, ever.
The audit_log table captures every EBS control preview attempt — allowed and rejected — as append-only rows. No row is ever updated or deleted.
CREATE TABLE audit_log ( id BIGSERIAL PRIMARY KEY, user_id INTEGER NOT NULL REFERENCES users(id), action TEXT NOT NULL, -- e.g. 'ebs_control.preview' slug TEXT NOT NULL, -- command slug attempted allowed BOOLEAN NOT NULL, -- true = whitelisted, false = rejected rejection_reason TEXT, -- null when allowed=true metadata JSONB DEFAULT '{}', -- ip, user_agent, risk_level created_at TIMESTAMPTZ NOT NULL DEFAULT NOW() ); -- No UPDATE/DELETE permissions granted on this table. -- Application role has INSERT + SELECT only.
allowed=false and a rejection_reason — before returning HTTP 403.TuneVault reads performance and configuration metadata from Oracle system views. We never read table data, application schemas, or anything that could contain customer PII.
Your security team runs these scripts on your servers — not us. The bundle contains a hardening script, README with compliance framework mappings, and a command hash whitelist for integrity verification.
tunevault-lockdown.sh — hardening script (root-only, idempotent)README.md — plain-English explanation + SOC2/ISO 27001/NIST framework mappingwhitelist.json — machine-readable command catalog with SHA-256 hashestunevault system user with /sbin/nologin — no interactive shell, no home directory, system account only./opt/tunevault with mode 750. Log directory is 700. No other users can read proxy files./opt/tunevault and /tmp only. Oracle binary and scripts remain protected.*.tunevault.app and *.cloudflare.com for the proxy user.admanagedsrvctl.sh status commands as oracle. No start/stop/restart./var/log/tunevault-audit.log — every action logged with timestamp and syslog tag.Everything above is the live state of the system — not a marketing document. The command whitelist is fetched from the database in real time.