Skip to documentation

[ Configuration ]

Configuration reference

Launch defaults are strict for core hardening and conservative for behavior that could affect legitimate traffic. Apply changes in small increments and verify behavior after each change.

Badger option keys and defaults
Option keyDefaultRecommendedPurpose
badger_honeypot_enabledtruetrueMaster toggle for trap page generation and trap instrumentation.
badger_blocked_agents[]Managed listPersistent deny-list for known hostile agents.
badger_block_all_unknownfalsefalse (launch)Blocks unknown signatures; keep off until your baseline is stable.
badger_login_protection_enabledtruetrueAdds auth hardening and lockout policy to wp-login flows.
badger_login_max_attempts55Failed login threshold before temporary lockout is applied.
badger_login_lockout_duration1515-30Lockout duration in minutes for repeated authentication failures.
badger_security_headers_enabledtruetrueEnables secure default response headers for hardening.
badger_disable_xmlrpctruetrueDisables XML-RPC entry points unless explicitly required.
badger_rate_limit_enabledfalsetrue in productionRequest throttling guardrail. Start in monitor mode, then enforce.
badger_rate_limit_max_requests6060-120Maximum requests in configured rate limit window.
badger_rate_limit_window_seconds6060Rate limit bucket size in seconds.
badger_intelligence_anonymize_ipstruetrueReduces privacy risk by anonymizing IP-level telemetry.

Suggested launch hardening profile

bash
wp option update badger_honeypot_enabled true
wp option update badger_security_headers_enabled true
wp option update badger_login_protection_enabled true
wp option update badger_rate_limit_enabled true
wp option update badger_rate_limit_max_requests 60
wp option update badger_rate_limit_window_seconds 60

Privacy recommendation: keep badger_intelligence_anonymize_ipsenabled in production unless your legal requirements require raw source IP retention.