--- title: "[bojemoi] feat(uzi): route exploit traffic via ProtonVPN gateway" date: 2026-03-30T21:37:22+02:00 draft: false tags: ["commit", "bojemoi", "main"] categories: ["Git Activity"] summary: "Commit ea02190 par Betty dans bojemoi" author: "Betty" --- ## Commit `ea02190` | | | |---|---| | **Repository** | bojemoi | | **Branch** | `main` | | **Author** | Betty | | **Hash** | `ea02190a0546a0295e329eb710256cc0f3030ddb` | ### Description Add VPN routing to uzi-service (same pattern as ak47/bm12): - Dockerfile.borodino-msf: add iproute2 + route-setup.sh - uzi-service: add scan_net network, NET_ADMIN cap, SCAN_GATEWAY_HOST - command: route-setup.sh wrapper before start_uzi.sh Exploit delivery traffic now exits via ProtonVPN (149.102.244.100), masking worker node IPs. C2 sessions (inbound to msf-teamserver) are unaffected (RFC1918 routes preserved via overlay gateway). Co-Authored-By: Claude Sonnet 4.6 ### Files Changed ``` M borodino/Dockerfile.borodino-msf M stack/40-service-borodino.yml ``` ### Diff Summary ``` borodino/Dockerfile.borodino-msf | 3 ++- stack/40-service-borodino.yml | 9 ++++++++- 2 files changed, 10 insertions(+), 2 deletions(-) ```