What It Does
Measures Your System.
Not Your Documentation.
Manual auditors review policies, interview staff, and check documentation. PHY357-Auditor reads your actual system state — file permissions, encryption status, service configurations, hash integrity — and scores it against 8 compliance frameworks in 30 seconds. Deterministic. Same system, same result, every time.
INTEGRITY
Hash Verification
Is the system in its expected state? File permissions checked. Binary hashes matched against packages. No unauthorized UID 0 accounts. No modified system files. If anything changed without authorization, the audit catches it.
CONFIDENTIALITY
Encryption & Secrets
Is sensitive data protected? SSH key entropy measured with Shannon entropy — mathematical measurement, not checklist. Disk encryption verified. No plaintext secrets in config files. No exposed credentials anywhere on the system.
RESILIENCE
Persistence & Recovery
Do security controls survive reboots? SSH hardening persists after restart. Firewall rules survive power cycle. NTP synchronized. Logging active and writing to disk. Controls that disappear after reboot don't exist.
Process
Point It at a System. Get a Score.
No agents to install. No kernel hooks. No modifications to the target system. PHY357-Auditor is read-only — it never writes, never modifies, never deletes. It measures and reports.
1
Target
Point at any Linux system (Windows + Cloud coming)
→
2
Scan
57 checks run read-only in 30 seconds
→
3
Score
Per-framework scores and overall grade
→
4
Report
Findings, evidence, and remediation steps
→
5
Fix
Follow remediations, re-scan, verify
READ-ONLY
Zero Writes
Never writes to the target. Never modifies files, configs, or settings. Never installs agents or drivers. Never hooks into the kernel. Measures only.
DETERMINISTIC
Same Result Every Time
Same system state produces the same score. No subjective interpretation. No auditor bias. Run it Monday, run it Friday — same system, same grade.
EVIDENCE
Every Finding Has Proof
Every check includes the actual evidence — file content, permission bits, entropy value, service status. Not "we checked and it passed." The actual data, recorded.
{
"product": "PHY357-Auditor",
"summary": {
"total_checks": 57,
"passed": 42,
"failed": 11,
"warnings": 4,
"score": 73.7,
"verdict": "NEEDS REMEDIATION"
},
"frameworks": [
{ "name": "NIST", "passed": 45, "total": 55, "score": 81.8 },
{ "name": "SOC2", "passed": 32, "total": 40, "score": 80.0 },
{ "name": "OWASP", "passed": 12, "total": 16, "score": 75.0 }
]
}