Server transparency system by Open Source Security Inc.
Glass Box proves a VPN server has nothing to hide. Anyone connected to the WireGuard tunnel can SSH into a read-only transparency shell and inspect everything: configs, firewall rules, DNS settings, running services, and more.
No trust required. Verify it yourself.
ssh -i glassbox-reviewer verify@10.13.37.1Break out of the Glass Box verify shell and read any of the three protected files. If you can access them through the transparency shell, you win.
Protected targets: WireGuard private config, customer database, SSH private key. All sessions are logged and the server owner is alerted on connect.
To try the verify shell or participate in the bounty challenge, request a WireGuard peer config:
Email: glassbox@opensourcesecurity.net
Subject: "Glass Box reviewer access"
Full reports: lynis · rkhunter · aide · server snapshot
The full Glass Box stack is open source: github.com/ossecurity/glassbox