block-nuke-telemetry/scripts/debug_nuke_process.sh
Nicholai 6fada7889a Initial public release - Nuke telemetry monitoring toolkit
This toolkit provides comprehensive monitoring, analysis, and blocking capabilities
for network telemetry sent by The Foundry's Nuke compositor on Linux.

Key features:
- Network monitoring scripts with automated alerts
- Multi-tier blocking methods (hosts, firewall, namespace, AppArmor)
- Detailed packet capture analysis and documentation
- EULA legal analysis and privacy assessment
- Sanitized example captures and comprehensive guides

All sensitive data (personal IPs, usernames, packet captures) removed.
Ready for public sharing on Gitea.
2025-11-26 15:28:21 -07:00

52 lines
1.2 KiB
Bash
Executable File

#!/bin/bash
# Debug script to find Nuke's actual process name
echo "=== Finding Nuke Process ==="
echo ""
echo "1. Trying various process name patterns:"
echo ""
echo "pgrep -f Nuke:"
pgrep -f Nuke
echo ""
echo "pgrep -f nuke:"
pgrep -f nuke
echo ""
echo "pgrep -i nuke:"
pgrep -i nuke
echo ""
echo "pgrep Nuke:"
pgrep Nuke
echo ""
echo "2. Searching all processes for 'nuke' (case-insensitive):"
ps aux | grep -i nuke | grep -v grep
echo ""
echo "3. Searching for Foundry-related processes:"
ps aux | grep -i foundry | grep -v grep
echo ""
echo "4. Searching for processes accessing Nuke directories:"
lsof 2>/dev/null | grep -i nuke | head -20
echo ""
echo "5. Checking /proc for Nuke:"
find /proc -maxdepth 2 -name cmdline -exec grep -l -i nuke {} \; 2>/dev/null | while read cmdline; do
PID=$(echo "$cmdline" | cut -d/ -f3)
echo "PID: $PID"
echo "Command: $(cat "$cmdline" | tr '\0' ' ')"
echo ""
done
echo "6. All currently running GUI applications:"
ps aux | awk '{print $11}' | sort -u | grep -E '^[A-Z]' | head -20
echo ""
echo "=== If Nuke is open, please look through the output above ==="
echo "=== and tell me which process name/PID belongs to Nuke ==="