Show HN: Protection Against Zero-Day Cyber Attacks
gaurav1086 Thursday, February 26, 2026Most security approaches I see in production environments focus on:
Scanning for CVEs Hardening configurations Aggregating logs
All useful — but they don’t actually stop exploitation once it starts.
In reality:
Not every CVE gets patched immediately Legacy systems stick around Zero-days happen
When exploitation succeeds, the real damage usually comes from runtime behavior:
A process spawning a shell Unexpected outbound connections Secret access Container escape attempts
I’ve been experimenting with a lightweight runtime enforcement layer for Linux that focuses purely on detecting and stopping high-risk behavior in real time — regardless of whether the underlying CVE is known or patched.
Would love input from folks running Linux/Kubernetes at scale:
Is runtime prevention something you rely on?
Where do existing tools fall short?
What would make this genuinely useful vs just more noise?
Live Demo: https://sentrilite.com/Sentrilite_Active_Response_Demo.mp4 Github: https://github.com/sentrilite/sentrilite-agent