This toolkit provides comprehensive monitoring, analysis, and blocking capabilities for network telemetry sent by The Foundry's Nuke compositor on Linux. Key features: - Network monitoring scripts with automated alerts - Multi-tier blocking methods (hosts, firewall, namespace, AppArmor) - Detailed packet capture analysis and documentation - EULA legal analysis and privacy assessment - Sanitized example captures and comprehensive guides All sensitive data (personal IPs, usernames, packet captures) removed. Ready for public sharing on Gitea.
Dump Directory
This directory contains captured network traffic, logs, and analysis artifacts from Nuke telemetry monitoring.
Purpose
The dump/ directory is used to store:
- Packet captures (
.pcapfiles) from tcpdump monitoring - Network logs from nethogs, ss, and other monitoring tools
- Test results from gap-tests and validation scripts
- Analysis artifacts generated during investigation
Privacy Notice
⚠️ The files in this repository are sanitized examples only.
Actual packet captures and logs contain sensitive information:
- Local IP addresses and network topology
- Process IDs and system usernames
- Timing information that could fingerprint your usage patterns
- Potentially encrypted but metadata-rich telemetry data
Never commit real packet captures or logs to public repositories.
Directory Structure
dump/
├── README.md # This file
├── 02/ # Investigation phase 2 artifacts
│ └── logs.md # Log documentation
├── gap-tests/ # Gap testing results
│ ├── databases_found.txt # Sanitized database listing
│ ├── sensitive_patterns.txt # Search patterns used
│ ├── sqlite_schema.txt # Database schema dumps
│ └── sqlite_tables.txt # Table structure listings
└── example_capture.pcap.txt # Example capture file (text placeholder)
Generating Your Own Dumps
To capture your own telemetry data, use the monitoring scripts:
# Basic packet capture
sudo tcpdump -i any -w dump/nuke_capture.pcap 'host sentry.foundry.com or host learn.foundry.com'
# Process monitoring
sudo nethogs | tee dump/nethogs_output.log
# Automated monitoring
bash scripts/monitor_nuke_network.sh --continuous
See the main README.md and monitoring scripts for detailed capture instructions.
Analysis
The artifacts in this directory were used to identify:
- Unencrypted HTTP traffic to
learn.foundry.com - Encrypted HTTPS telemetry to
api.honeycomb.io - Crash reporting to
sentry.foundry.com - Local Nuke SQLite databases containing sync metadata
See nuke_foundry_analysis.md in the root directory for detailed findings.