Skip to content

Run a security scan on your server and identify common gaps. Get your VPS ready for production.

License

Notifications You must be signed in to change notification settings

healthyhost/audit-vps-script

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

29 Commits
 
 
 
 
 
 
 
 

Repository files navigation

audit-vps-script

Scans your server to find common issues like weak SSH settings, missing firewalls, lack of updates, and more. Perfect for getting your VPS ready for production.

Output

Usage

  1. Download the script
$ curl -O https://raw.githubusercontent.com/healthyhost/audit-vps-script/main/audit.sh
  1. Make it executable:
$ chmod +x audit.sh
  1. Run the security audit:
$ sudo ./audit.sh

Web

Visit https://auditpvps.com to run checks through our web app for free and render the results in your browser.

Requirements

  • Ubuntu/Debian-based distributions
  • jq (temporary dependency, planned for removal)
  • Root or sudo privileges

Security checks

The scripts perform the following checks:

  • Firewall (UFW)
    • Check if UFW is installed
    • Check if UFW is enabled
    • Check if incoming traffic is blocked
  • SSH
    • Check if SSH is enabled
    • Check if key-based authentication is enabled
    • Check if root login is disabled
    • Check if password authentication is disabled
    • Check if SSH is listening on port 22
  • Root
    • Check if non-root sudo user exists
  • System updates
    • Check if automatic system updates are enabled
    • Check if automatic system upgrades are enabled
  • Fail2Ban
    • Check if Fail2ban is installed
    • Check if Fail2ban is enabled
    • Check if Fail2ban is configured correctly
    • Check if Fail2ban SSH is enabled
    • Check if Fail2ban SSH is in aggressive mode

Contributing

We welcome contributions! If you have any suggestions or improvements, please open an issue or submit a pull request.

License

MIT

Roadmap

  • Support for additional Linux distributions:
    • RHEL/CentOS
    • Fedora
    • Alpine Linux
  • Removal of jq dependency
  • Warning states (WARN) for non-critical security recommendations
  • Code refactoring to improve readability

Releases

No releases published

Packages

No packages published

Languages