PatternsProduction-grade WAF rules, on autopilot.
Automated OWASP Core Rule Set and bad-bot patterns, converted into native configurations for Nginx, Apache, Traefik, and HAProxy — refreshed every day.
Automated OWASP Core Rule Set and bad-bot patterns, converted into native configurations for Nginx, Apache, Traefik, and HAProxy — refreshed every day.
Six guarantees that turn a daily scrape of upstream rules into something your traffic can actually live behind — quietly, predictably, and without operator toil.
Rules for SQL injection, XSS, RCE, LFI, and RFI, derived from the same Core Rule Set behind ModSecurity.
One source, four idiomatic backends — Nginx maps, Apache SecRule, Traefik middleware, HAProxy ACL files.
Curated User-Agent lists from public sources — scrapers, AI crawlers, scanners, with allow-lists for legitimate engines.
A scheduled GitHub Actions workflow re-fetches the latest CRS release and republishes every archive — no maintenance.
Drop-in zips published on every run: nginx_waf.zip, apache_waf.zip, traefik_waf.zip, haproxy_waf.zip.
Each backend is a small Python converter on a single JSON intermediate. Adding a platform is a few hundred lines.
The same OWASP CRS rule set is converted into the native syntax of each platform — so you get equivalent protection regardless of the proxy in front of your stack.
curl -LO https://github.com/fabriziosalmi/patterns/releases/latest/download/nginx_waf.zip
unzip nginx_waf.zip -d /etc/nginx/waf_patternsOr build from source — full toolchain instructions in Getting Started.