Proof of Concept: Lynx FIM in Action#
This page demonstrates the Lynx FIM agent’s ability to detect and report unauthorized file system changes in real-time. Below is a correlation between the terminal commands and the resulting Discord alerts.
🧪 Laboratory Test Scenario#
In this audit, I used an isolated lab directory to verify the full lifecycle of the agent: initialization, baselining, and real-time detection.
1. Establishing the Source of Truth#
First, I generated the signed cryptographic baseline for the test directory.
Terminal Input:
./lynx baseline -o lab_baseline.jsonTerminal Output:
Successfully created baseline: lab_baseline.json 2. Real-time Monitoring and Alerting#
Next, I started the monitoring agent and triggered several file system events (modifications, deletions, and additions).
Terminal Input:
./lynx start -b lab_baseline.jsonLive Event Log:
[CRITICAL] FILE_MODIFIED: ./test-dir/test2
[CRITICAL] FILE_DELETED: ./test-dir/test2.txt
[WARNING] FILE_CREATED: ./test-dir/testrename.txt
[WARNING] FILE_CREATED: ./test-dir/testadd3. Visual Verification (Discord)#
The following image shows exactly how these events were dispatched and rendered in the Discord security channel. Note the semantic labeling and emojis used to distinguish between warnings and critical breaches.

Observations and Lessons#
- Precision: The agent correctly distinguished between a file modification (CRITICAL) and a new file creation (WARNING).
- Responsiveness: Alerts appeared in the Discord channel within milliseconds of the file being touched in the lab.
- Data Integrity: The use of absolute paths in the final webhook payload ensures that the security analyst knows exactly where the event occurred on the host.
🗺️ Navigation#
- Performance Analysis: Efficiency and scalability research.
- Back to Introduction