An AI-Driven Security Operations Center (SOC) for Enterprise Linux Servers. Powered by Multiple LLMs (Gemini, OpenAI, Claude, Local).
Learn about our Enterprise WAF & Server Hardening Deployments π
Unpatched CMS platforms, open ports, fragile shared-hosting setups, and zero bot-filtering lead to data breaches, resource exhaustion, and catastrophic crashes during traffic spikes.
This script acts as your first line of defense, proactively analyzing chaotic server logs to identify backdoors, malicious scrapers, and automated threat vectors before they compromise your data sovereignty.
The AI Cybersecurity Log Analyst uses your choice of LLM to digest thousands of lines of chaotic Apache, Nginx, Mail, System (journalctl), and Database (MySQL/MariaDB) logs, distilling them into a high-signal intelligence report.
It then generates executable, precise firewall (CSF) and remediation scripts to neutralize the threats instantly.
We believe in absolute data privacy. You can route your log analysis through:
- Google Gemini (Vertex AI)
- OpenAI (GPT-4o)
- Anthropic Claude (3.5 Sonnet)
- xAI (Grok)
- Local / Air-Gapped LLMs (Ollama, LM Studio) - Keep 100% of your logs on your local network!
Before installing, ensure your system meets the following requirements. The script may break or fail silently if these are missing:
jqandcurl: Essential for parsing JSON and making API requests. The script will fail without them. (Install viasudo apt install jq curlorsudo dnf install jq curl).- Mail Transfer Agent (MTA): If you plan to run the script via Cron and receive email reports, your server must have a working MTA providing
/usr/sbin/sendmail(e.g., Postfix, Exim). Without this, Cron reports will fail to send. - For Google Gemini Users: The script authenticates using
gcloud auth print-access-token. You MUST have the Google Cloud CLI (gcloud) installed and authenticated (e.g., viagcloud auth loginor a service account) on your server. If using OpenAI, Claude, or Local LLMs, this is not required.
curl -sL https://raw.githubusercontent.com/PowerHouse-Consulting-Group/cybersecurity-analyst-agent/main/install.sh | sudo bashDownload the latest release from the Releases page:
Ubuntu/Debian: sudo dpkg -i ai-cybersecurity-analyst_*.deb
CentOS/AlmaLinux/RHEL: sudo rpm -i ai-cybersecurity-analyst_*.rpm
After installation, configure your environment variables:
nano /opt/ai-soc/.envSelect your LLM_PROVIDER and enter the corresponding API key.
Run interactively:
sudo /opt/ai-soc/cybersecurity_analyst.sh --interactiveOr schedule via Cron:
0 3 * * 1 /opt/ai-soc/cybersecurity_analyst.sh > /dev/null 2>&1While the Community Version provides essential weekly log analysis, our PRO Version is designed for Enterprise Defense, offering a real-time Terminal UI (TUI) Dashboard, active mitigation, and multi-server fleet management.
PRO Features Include:
- [I] AI Threat Insight & OSINT: Auto-enrich attacker IPs via Shodan & AbuseIPDB for deep context.
- [T] Blast Radius Timeline: Cross-correlate Nginx, Auth, and DB logs 5 mins before/after breaches to build an incident timeline.
- [F] Active Fleet Remediation: 1-click IP blocking across all Master/Node servers using CSF/UFW.
- [M] MITRE ATT&CK Mapping: Generate SOC2/PCI-DSS compliance reports instantly.
Our commercial model guarantees Zero Data Egress. The PRO binary runs entirely on your own infrastructure.
- Purchase a License: Select your node tier (1, 5, or 10 nodes) at PowerHouse Consulting Group.
- Receive Your Key: Upon successful checkout via Stripe, our automated fulfillment system will email you your official
PRO-XXXX-XXXX-XXXXLicense Key. - Upgrade Instantly: From your existing Community installation, simply run:
sudo /opt/ai-soc/cybersecurity_analyst.sh --activate YOUR_LICENSE_KEY*The script will validate your key with our backend, securely download the compiled PRO Go binary directly to your server, and set up the new systemd service automatically.*nt timeline.
- [D] Active Deception & Tarpits: Route attackers to endlessh honeypots instead of just dropping packets.
- [R] MITRE ATT&CK Reporting: Generate 1-click executive PDF/JSON reports for SOC2, PCI-DSS, and ISO27001 audits.
- [S] Global Fleet Defense: Sync firewall blocks across your entire server cluster instantly.
π GET PRO TODAY: PowerHouse Consulting Security
Q: Do my logs get sent to your servers? A: No. The script runs entirely on your infrastructure and communicates directly with the LLM provider you configure (or your local Ollama instance).
Q: Does it automatically block IPs? A: No. It generates a remediation script and prompts you for confirmation before executing any destructive or blocking commands.
Q: How do I report a bug or request a feature? A: Please use the GitHub Issues tab. We have automated workflows to triage and tag your requests.
Setting up IAM roles, tuning noise filters, configuring firewall logic, and integrating this agent into custom, High-Availability VPS architectures requires absolute precision.
Let PowerHouse Consulting deploy this architecture for you. We provide uncompromising infrastructure security, active bot-mitigation suites, and deep-code security audits backed by a 99.99% uptime guarantee.
Β© 2026 PowerHouse Consulting Group Pte Ltd. All Rights Reserved.
This software is the intellectual property of PowerHouse Consulting Group Pte Ltd. It is provided under the terms of the included LICENSE file.
IP License holder and point of contact: PowerHouse Consulting Group Pte Ltd 160 Robinson Road SBF Center Unit #24-09, Singapore 068914 ACRA UEN: 202108925N Contact Email: support(at)powerhouseconsulting.group
This agent is built with Zero Trust Automation principles to ensure it cannot compromise your server's integrity:
- Explicit Permission Mandate: The AI operates as an advisory tool. It proposes remediations as purely executable Bash scripts that require a human System Administrator's explicit confirmation before execution.
- Database Protection: The AI is strictly forbidden from executing raw database queries or modifications (MySQL, MariaDB, PostgreSQL). All DB-related fixes are provided as manual text instructions.
- Core System Integrity: The AI is restricted from proposing modifications to core OS files (e.g.,
/etc/passwd,/etc/sudoers) and blocked from using destructive commands (rm -rf,truncate). - Safe Network Abstraction: The agent relies on safe firewall wrappers (
csf,ufw) and will never execute rawiptables --flushcommands that could sever administrative access.