Because I just deployed a new version of iocaine, I figured I'll look into how the cookie monster guard is working out.
Filtering out my own requests, there were a total of 617 requests made towards my forge that the monster did not eat (out of about 78k my passive identification didn't route into the maze).
Those 617 requests came from 194 unique ips, and 28 unique user agents, and hit 164 unique URIs, most of which are CSS, JS, and various images.
I do see.... a number of suspicious URIs hit, though! Stuff like /archive/HumpY/pulls?assignee=1&labels=389,388&milestone=0&poster=0&project=0&q=&sort=&state=open&type=all. That is very likely not a human.
Looks like we have a JS-capable bot! Lets dig in.
Occult Enby that's making local-first software with peer to peer protocols, mesh networks, and the web.
Exploring what a local-first cyberspace might look like in my spare time.