Read this before connecting

This is a proof-of-concept, not a production peer-review platform. It demonstrates the Y.js + WebRTC pattern that a future production review tool would build on. There is no authentication, no persistence, no moderation, no rate-limiting, no cryptographic sign-off. Sign-offs in this POC are self-asserted strings in a CRDT — they have zero audit weight.
External CDN exception: Nexus SecOps is normally a zero-external-dependency static site. This tool is the documented exception (same scope as the Purple Team Arena POC). It loads yjs@13.6.18 and y-webrtc@10.3.0 from cdn.jsdelivr.net. The dynamic imports use Subresource Integrity (SRI) hashes for tamper detection.
SRI hashes are PLACEHOLDERS in this POC The integrity="sha384-ghlZMZ/j8iYg2QKKfDUo2/h7LTtqgqEDJZLR58Aha3XZ9l4K/MTy+y2mTTbKNPa9" attributes below are placeholders. Before deploying this page publicly, regenerate real SHA-384 SRI hashes for the exact pinned version URLs at srihash.org (or via openssl dgst -sha384 -binary file.mjs | openssl base64 -A) and replace the placeholder strings. With placeholders, modern browsers will refuse to execute the modules and the tool will silently fail — that is the intended fail-closed behavior until verification.
Public WebRTC signaling servers: The y-webrtc default signaling endpoints are wss://signaling.yjs.dev, wss://y-webrtc-signaling-eu.herokuapp.com, and wss://y-webrtc-signaling-us.herokuapp.com. Your room name is sent to those servers in plaintext. Anyone who knows your room name can join — there is no access control. Do not paste real detection rules with real IOCs, real internal hostnames, real CVE-correlation patterns, or anything that would expose your environment. All defaults below are clearly synthetic.
What a real review tool needs (and this POC does not provide): self-hosted signaling, OAuth-tied identity, role-based access enforced server-side, persistent storage with version history, cryptographically signed sign-offs (Verifiable Credentials — see the Skill Portfolio tool), audit logging, e-signature for approvals, diff rendering, file attachments, and moderation. See the "what this POC does NOT do" list at the bottom.
Educational use only. Use this to understand how CRDT-backed collaborative review feels in practice — concurrent editing of the artifact, real-time threaded comments, live aggregate sign-off counts. Use it for tabletop demos with synthetic content. Do not use it to approve real detection deployments or to formalize real change-control decisions.

Connection

Disconnected

Artifact under review

Concurrent editing via Y.Text. All connected reviewers can edit; CRDT preserves intent under simultaneous edits. Only Author / Moderator can change the artifact type.

0 lines 0 chars 0 words 0 editor(s) tracked
Synthetic data only. Use RFC 5737 IPs (192.0.2.x / 198.51.100.x / 203.0.113.x), example.com hostnames, dummy CVE IDs, and made-up rule names. Never paste production rules with production IOCs over this peer channel.

Comments thread

Y.Array of comment objects. Severity-tagged, optional line anchor, threaded replies, status (open / resolved / wont-fix).

No comments yet. Connect and add the first review note.

Review summary

Sign-offs here are NOT cryptographically signed. They are self-asserted strings in a CRDT. For a real audit trail, use Verifiable Credentials (see the Skill Portfolio tool, Revolution 5).
0 Approvals
0 Request changes
0 Comments
0 Open blockers

Reviewer sign-offs

Not connected.

      

How it works

What this POC does NOT do

Browser requirements

Chrome / Edge / Firefox / Safari recent versions. Requires: