# ============================================================================= # THREAT SCORING CONFIGURATION - EXAMPLE CONFIG # ============================================================================= # Copy this file to threat-scoring.toml and customize for your environment # All included threat signals are fully implemented and tested [Core] # Enable or disable threat scoring entirely Enabled = true # Enable detailed logging of scoring decisions (for debugging) LogDetailedScores = false [Thresholds] # Score thresholds that determine the action taken for each request # Scores are calculated from 0-100+ based on various threat signals # Requests with scores <= AllowThreshold are allowed through immediately AllowThreshold = 15 # Conservative - allows more legitimate traffic # Requests with scores <= ChallengeThreshold receive a challenge (proof-of-work) ChallengeThreshold = 80 # Much higher - blocking is absolute last resort # Requests with scores > ChallengeThreshold are blocked BlockThreshold = 100 # Truly malicious content (javascript:,