Web Stack Audit & Enhancement Architect

Замовник: AI | Опубліковано: 25.02.2026
Бюджет: 750 $

Overview: We are seeking an elite systems architect and technical auditor to validate, debug, and harden a high-availability production stack for our enterprise web application, harmonymc.ae. The infrastructure has been recently stabilized (APCu integrated for PHP 8.3 memory caching, dynamic mega menu deployed, 28.1s LCP mitigated via aggressive caching). The primary business risk is no longer uptime—it is conversion truth quality, payload integrity, and edge-to-origin proxy reliability. We require an exhaustive audit of our Nginx reverse proxy routing, Apache/.htaccess directives, and server-side form handling to eliminate "Ghost Leads," eradicate silent exceptions, and enforce a strict backend-only conversion tracking model. Infrastructure & Stack Baseline: Edge/Proxy: Nginx (Ports 80/443, TLS termination). Origin Application: Apache (Internal ports) running PHP 8.3-FPM + APCu. CMS & DOM: Joomla + Gridbox (handling dynamic overlay CTAs and mega menus). Form Processing: ChronoForms8 (Strict server-side PHP event handling). Security Layer: CleanTalk + WAF/ModSecurity. Asset Pipeline: JCH Pro (Aggressive defer/combine) + 1-year immutable static cache policy. Telemetry & Tracking: GTM -> GA4 -> Google Ads + Zoho SalesIQ. Core Engineering Challenges: Payload Integrity & "Ghost Lead" Remediation: We are detecting race conditions or bypasses where ChronoForms8 executes downstream actions (email/CRM) with empty payload fields. You must architect a bulletproof server-side Gatekeeper in the OnSubmit flow. Canonical success semantics dictate that the lead_appointment conversion event and CRM push must only execute upon absolute backend validation. Runtime Stability & Exception Handling: Identify and resolve all silent failures. This includes eradicating PHP 8.3 deprecation warnings/errors in the Joomla core/extensions, and resolving frontend JS console errors—specifically async/defer hydration conflicts between JCH Pro minification and Gridbox DOM elements. Attribution Architecture (Server-Side Truth): Current optimization is degraded by noisy frontend telemetry. You will deprecate frontend primary bidding conversions and design a server-confirmed conversion pipeline. The architecture must persist click identifiers (gclid, wbraid, utm) through the CF8 payload to the CRM, emitting a strictly deduplicated event based on a unique lead_id. Cache Invalidation & Proxy Header Integrity: Audit .htaccess rewrite rules and HMC_NOCACHE environment variables to ensure zero cache poisoning on dynamic routes (editor, POST, CF8 endpoints). Furthermore, validate that Nginx is passing X-Forwarded-For and X-Forwarded-Proto correctly to Apache so that ModSecurity and CleanTalk do not false-flag and drop valid UAE traffic subnets. Scope of Work & Deliverables: Network & Proxy Audit: Deliver an analysis of effective response headers, 301/302 chain maps, and proxy logic. Ensure missing hardening headers (HSTS, CSP, X-Content-Type-Options) are addressed. Error Eradication Logs: Provide before-and-after console logs and network waterfalls proving zero 5xx errors, zero JS execution halts, and a fully functional UI across the mobile/desktop matrix. CF8 Hardening Proof: Deliver exported CF8 action flow logic, rejected payload logs, and timestamped deployment evidence proving the server-side gatekeeper cannot be bypassed via direct endpoint access. Telemetry Cutover Plan: Execute a 20-lead canary test with tokenized IDs proving that the CF8 -> CRM -> GA4 -> Google Ads reconciliation mismatch is <= 5%. Fixed-State Configuration Diffs: Provide ready-to-deploy diffs for .htaccess, Nginx/Apache vhosts, JCH Pro exclusions, and tracking configuration maps. Ideal Candidate Profile: Deep architectural knowledge of Joomla, PHP 8.x-FPM, and ChronoForms8 backend logic. Mastery of Nginx reverse proxy setups, Apache .htaccess rewrite conditions, and edge caching. Advanced experience with Google Ads conversion architecture, server-side tracking, and payload deduplication. Ability to troubleshoot aggressive asset optimization without degrading the DOM or breaking critical execution paths. Application Requirement: To filter out automated bids, please start your proposal by explaining the specific security and operational risks of passing the X-Forwarded-For header from an Nginx edge to an Apache origin running ModSecurity if the origin is not explicitly configured to trust the edge proxy's IP.