Skip to content

PowerHouse-Consulting-Group/cybersecurity-analyst-agent

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

33 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

Securing the Core: Infrastructure & Threat Mitigation

πŸ›‘οΈ Autonomous AI Cybersecurity Log Analyst

An AI-Driven Security Operations Center (SOC) for Enterprise Linux Servers. Powered by Multiple LLMs (Gemini, OpenAI, Claude, Local).

Learn about our Enterprise WAF & Server Hardening Deployments πŸš€


πŸ›‘ The Vulnerability (The Pain)

Unpatched CMS platforms, open ports, fragile shared-hosting setups, and zero bot-filtering lead to data breaches, resource exhaustion, and catastrophic crashes during traffic spikes.

This script acts as your first line of defense, proactively analyzing chaotic server logs to identify backdoors, malicious scrapers, and automated threat vectors before they compromise your data sovereignty.

🏰 The Fortress Architecture (The Solution)

The AI Cybersecurity Log Analyst uses your choice of LLM to digest thousands of lines of chaotic Apache, Nginx, Mail, System (journalctl), and Database (MySQL/MariaDB) logs, distilling them into a high-signal intelligence report.

It then generates executable, precise firewall (CSF) and remediation scripts to neutralize the threats instantly.

Multi-LLM & Local Privacy Support

We believe in absolute data privacy. You can route your log analysis through:

  • Google Gemini (Vertex AI)
  • OpenAI (GPT-4o)
  • Anthropic Claude (3.5 Sonnet)
  • xAI (Grok)
  • Local / Air-Gapped LLMs (Ollama, LM Studio) - Keep 100% of your logs on your local network!

πŸš€ Installation & Configuration

Prerequisites & Potential Failure Scenarios

Before installing, ensure your system meets the following requirements. The script may break or fail silently if these are missing:

  • jq and curl: Essential for parsing JSON and making API requests. The script will fail without them. (Install via sudo apt install jq curl or sudo dnf install jq curl).
  • Mail Transfer Agent (MTA): If you plan to run the script via Cron and receive email reports, your server must have a working MTA providing /usr/sbin/sendmail (e.g., Postfix, Exim). Without this, Cron reports will fail to send.
  • For Google Gemini Users: The script authenticates using gcloud auth print-access-token. You MUST have the Google Cloud CLI (gcloud) installed and authenticated (e.g., via gcloud auth login or a service account) on your server. If using OpenAI, Claude, or Local LLMs, this is not required.

Option A: Universal Installer (Recommended)

curl -sL https://raw.githubusercontent.com/PowerHouse-Consulting-Group/cybersecurity-analyst-agent/main/install.sh | sudo bash

Option B: Package Managers (.deb / .rpm)

Download the latest release from the Releases page: Ubuntu/Debian: sudo dpkg -i ai-cybersecurity-analyst_*.deb CentOS/AlmaLinux/RHEL: sudo rpm -i ai-cybersecurity-analyst_*.rpm

Configuration

After installation, configure your environment variables:

nano /opt/ai-soc/.env

Select your LLM_PROVIDER and enter the corresponding API key.

Running the Agent

Run interactively:

sudo /opt/ai-soc/cybersecurity_analyst.sh --interactive

Or schedule via Cron:

0 3 * * 1 /opt/ai-soc/cybersecurity_analyst.sh > /dev/null 2>&1

πŸ’Ž Upgrade to CyberSecurity Analyst PRO

While the Community Version provides essential weekly log analysis, our PRO Version is designed for Enterprise Defense, offering a real-time Terminal UI (TUI) Dashboard, active mitigation, and multi-server fleet management.

PRO Features Include:

  • [I] AI Threat Insight & OSINT: Auto-enrich attacker IPs via Shodan & AbuseIPDB for deep context.
  • [T] Blast Radius Timeline: Cross-correlate Nginx, Auth, and DB logs 5 mins before/after breaches to build an incident timeline.
  • [F] Active Fleet Remediation: 1-click IP blocking across all Master/Node servers using CSF/UFW.
  • [M] MITRE ATT&CK Mapping: Generate SOC2/PCI-DSS compliance reports instantly.

How to Activate PRO (Zero Data Egress / On-Premise)

Our commercial model guarantees Zero Data Egress. The PRO binary runs entirely on your own infrastructure.

  1. Purchase a License: Select your node tier (1, 5, or 10 nodes) at PowerHouse Consulting Group.
  2. Receive Your Key: Upon successful checkout via Stripe, our automated fulfillment system will email you your official PRO-XXXX-XXXX-XXXX License Key.
  3. Upgrade Instantly: From your existing Community installation, simply run:
sudo /opt/ai-soc/cybersecurity_analyst.sh --activate YOUR_LICENSE_KEY

*The script will validate your key with our backend, securely download the compiled PRO Go binary directly to your server, and set up the new systemd service automatically.*nt timeline.

  • [D] Active Deception & Tarpits: Route attackers to endlessh honeypots instead of just dropping packets.
  • [R] MITRE ATT&CK Reporting: Generate 1-click executive PDF/JSON reports for SOC2, PCI-DSS, and ISO27001 audits.
  • [S] Global Fleet Defense: Sync firewall blocks across your entire server cluster instantly.

πŸ‘‰ GET PRO TODAY: PowerHouse Consulting Security


❓ FAQ

Q: Do my logs get sent to your servers? A: No. The script runs entirely on your infrastructure and communicates directly with the LLM provider you configure (or your local Ollama instance).

Q: Does it automatically block IPs? A: No. It generates a remediation script and prompts you for confirmation before executing any destructive or blocking commands.

Q: How do I report a bug or request a feature? A: Please use the GitHub Issues tab. We have automated workflows to triage and tag your requests.


🏒 Enterprise Deployments & Managed Security

Setting up IAM roles, tuning noise filters, configuring firewall logic, and integrating this agent into custom, High-Availability VPS architectures requires absolute precision.

Let PowerHouse Consulting deploy this architecture for you. We provide uncompromising infrastructure security, active bot-mitigation suites, and deep-code security audits backed by a 99.99% uptime guarantee.

πŸ‘‰ Schedule a Deep-Code Diagnostic & Custom Deployment


βš–οΈ Legal & Copyright

Β© 2026 PowerHouse Consulting Group Pte Ltd. All Rights Reserved.

This software is the intellectual property of PowerHouse Consulting Group Pte Ltd. It is provided under the terms of the included LICENSE file.

IP License holder and point of contact: PowerHouse Consulting Group Pte Ltd 160 Robinson Road SBF Center Unit #24-09, Singapore 068914 ACRA UEN: 202108925N Contact Email: support(at)powerhouseconsulting.group

πŸ›‘οΈ Security Safeguards & Zero Trust Automation

This agent is built with Zero Trust Automation principles to ensure it cannot compromise your server's integrity:

  • Explicit Permission Mandate: The AI operates as an advisory tool. It proposes remediations as purely executable Bash scripts that require a human System Administrator's explicit confirmation before execution.
  • Database Protection: The AI is strictly forbidden from executing raw database queries or modifications (MySQL, MariaDB, PostgreSQL). All DB-related fixes are provided as manual text instructions.
  • Core System Integrity: The AI is restricted from proposing modifications to core OS files (e.g., /etc/passwd, /etc/sudoers) and blocked from using destructive commands (rm -rf, truncate).
  • Safe Network Abstraction: The agent relies on safe firewall wrappers (csf, ufw) and will never execute raw iptables --flush commands that could sever administrative access.

About

πŸ›‘οΈ Autonomous AI Cybersecurity Log Analyst. An LLM-Agnostic SOC agent (Gemini, OpenAI, Claude, Local/Ollama) for Enterprise Linux Servers. Parses Apache, Nginx, MariaDB, and Journalctl logs. Features zero data egress, PII scrubbing, and auto-generated WAF (CSF) remediation with strict allowlisting.

Topics

Resources

License

Stars

Watchers

Forks

Packages

 
 
 

Contributors

Languages