Skip to documentation

[ Event Schema ]

Detection payload schema

Event payloads are intentionally minimal and operational. Use the field reference below when wiring dashboards, external analytics, or automation workflows.

Event fields for Badger detections
FieldTypeDescription
event_typestringClassification bucket like honeypot_triggered or agent_detected.
timestampintUnix timestamp recorded at event creation.
agent_idstring|nullInternal agent identifier when fingerprinting succeeds.
agent_namestring|nullHuman-readable name when known in the intelligence registry.
trap_idstring|nullTrap route identifier tied to honeypot path seed.
depthint|nullMaze depth reached before trigger fired.
request_contextarrayHTTP headers, path metadata, and request behavior markers.
time_to_triggerfloat|nullSeconds between session start and trap activation.
js_executedbool|nullWhether JavaScript challenge markers were observed.
session_idstring|nullEphemeral session key for forensic event stitching.

Sample event payload

json
{
  "event_type": "honeypot_triggered",
  "timestamp": 1765236154,
  "agent_id": "agent_2f6d9f",
  "agent_name": "Unknown crawler",
  "trap_id": "trap_91adf",
  "depth": 3,
  "request_context": {
    "path": "/wp-content/uploads/cache/...",
    "user_agent": "Mozilla/5.0 ...",
    "method": "GET"
  },
  "time_to_trigger": 1.82,
  "js_executed": false,
  "session_id": "sess_8ea31"
}

Privacy note: avoid storing secrets, passwords, or session tokens in external sinks. Keep badger_intelligence_anonymize_ips enabled unless legal policy requires otherwise.