CustosEye

Your Third Eye

Methodology

This page explains how CustosEye works: what data it collects, how it processes that data, and what assumptions or limitations you should be aware of.

Purpose and Goals

CustosEye is designed to give you visibility into what's happening on your system without requiring cloud services or sending data anywhere. It monitors processes, network activity, and file integrity, then presents this information in a simple web dashboard so you can understand what's running and what's changed.

What Data CustosEye Uses

CustosEye collects three types of data from your system:

All of this data stays on your machine. Nothing is sent to external servers or cloud services.

How Data is Processed

CustosEye processes data in several stages:

1. Collection

Three monitoring agents run continuously in the background, publishing events to an event bus:

2. Trust Scoring (CSC v2)

Each process is evaluated using a trust scoring engine (CSC v2) that considers multiple signals:

These signals are combined into a score, which is then mapped to a categorical verdict: trusted, caution, suspicious, malicious, or unknown. The engine also assigns a class (like "system", "service", "dev_tool", "game", "utility") to help categorize processes. The engine produces confidence scores and human-readable reasons for each verdict.

3. Rules Engine

The rules engine (data/rules.json) applies severity levels (Info, Warning, Critical) and contextual reasons to events. Rules are evaluated in order, the first match wins. Rules can match on:

Rules hot-reload automatically when you edit the file. The engine also deduplicates events within a short window to reduce noise while preserving important state changes.

4. Event Processing and Storage

The dashboard subscribes to the event bus and processes events in a background thread. Events get:

For file integrity events, the dashboard computes diffs when changes are detected. It uses chunk-based hashing to find what changed, extracts text from various file types (text files, Office documents, PDFs), and performs character/word/line-level diffs. Baseline storage optionally stores full file snapshots, auto-pruning to stay under size limits.

5. Presentation

Processed events are displayed in the web dashboard (accessible at http://127.0.0.1:8765/ with authentication required). The dashboard includes:

Architecture Diagram: 100%

Unable to load architecture diagram. Please check that the file exists.

Use mouse wheel to zoom, click and drag to pan. Shows data flow: Collection → Trust Scoring → Rules Engine → Event Processing → Dashboard

Assumptions and Limitations

CustosEye makes several assumptions and has known limitations:

Privacy and Data Handling

All data collected by CustosEye stays on your machine. No information is sent to external servers. The dashboard runs locally on your computer, and all processing happens in memory or in local files. For more details on privacy and data handling, see our Privacy Policy.