Apertre-3.0 Featured Project
π Documentation β’ π Technical Report β’ π§ͺ Research Lab β’ π Changelog β’ π¬ Community Guidelines
π Report Bug β’ β¨ Request Feature β’ π¬ Join WhatsApp Group
π A huge thank you to all the talented developers who have contributed to AstraGuard AI
Want to see your avatar here? Make your first contribution today!
π View All Contributors | π Metrics Dashboard | ποΈ Recognition Program | π Badge System
AstraGuard AI is an open-source, mission-critical security system designed specifically for CubeSat and satellite operations. It seamlessly combines AI-assisted threat detection with practical offensive security tooling to create a comprehensive defense platform for space systems.
At its core, AstraGuard AI is:
- π‘οΈ A Security Platform: Built to test applications against simulated threats in controlled environments
- π§ An AI Learning System: Uses local LLMs (Llama 3/Mistral) to analyze attack surfaces and generate smart payloads
- π A Monitoring Dashboard: Provides real-time visualization of security posture and system health
- π A Training Ground: Designed to help learners bridge the gap between theoretical knowledge and real-world security workflows
Traditional security tools often fall into two categories:
- Theoretical frameworks that are great for learning but disconnected from reality
- Production tools that are powerful but have steep learning curves
AstraGuard AI bridges this gap by providing:
β
Real-World Context: Security operations modeled after actual CubeSat mission phases
β
Hands-On Learning: Practical tools with educational guidance built-in
β
Privacy-First AI: 100% local processingβno data leaves your machine
β
Production-Ready Code: Clean, well-documented codebase suitable for real deployments
β
Adaptive Intelligence: Context-aware decisions based on mission phase and historical patterns
AstraGuard AI is designed for:
| Audience | What They'll Learn | How They'll Benefit |
|---|---|---|
| π Students | Security workflows, API design, ML integration | Hands-on experience with real security tools |
| π¨βπ» Developers | Offensive security, payload generation, threat modeling | Understanding of attack surfaces and defense strategies |
| π‘οΈ Security Practitioners | Automated threat detection, incident response | Practical tools for vulnerability assessment |
| π Space Enthusiasts | CubeSat operations, telemetry analysis | Understanding of satellite security challenges |
AstraGuard AI implements a sophisticated, event-driven architecture for real-time satellite telemetry monitoring and autonomous anomaly recovery. The system leverages vector embeddings, adaptive memory, and AI-powered reasoning to provide intelligent, self-healing capabilities.
graph TB
subgraph Input["π°οΈ Data Ingestion Layer"]
A[Telemetry Stream<br/>Pathway Real-time Processing]
end
subgraph Processing["βοΈ Processing Layer"]
B[Embedding Encoder<br/>Vector Transformation]
C[Adaptive Memory Store<br/>Context-Aware Storage]
end
subgraph Intelligence["π§ Intelligence Layer"]
D[Anomaly Reasoning Agent<br/>AI-Powered Analysis]
end
subgraph Action["β‘ Action Layer"]
E[Response Orchestrator<br/>Action Coordinator]
F[System Recovery<br/>Self-Healing Mechanisms]
end
subgraph Monitoring["π Observability"]
G[Dashboard<br/>Real-time Visualization]
end
A -->|Live Data Feed| B
B -->|Vector Embeddings| C
C -->|Historical Context| D
B -->|Current Event Data| D
D -->|Recovery Decision| E
E -->|Automated Actions| F
F -->|Performance Feedback| C
D -.->|Reasoning Trace| G
C -.->|Memory State| G
E -.->|Action Status| G
style A fill:#10b981,stroke:#059669,stroke-width:4px,color:#fff
style B fill:#3b82f6,stroke:#2563eb,stroke-width:3px,color:#fff
style C fill:#8b5cf6,stroke:#7c3aed,stroke-width:3px,color:#fff
style D fill:#f59e0b,stroke:#d97706,stroke-width:4px,color:#fff
style E fill:#ef4444,stroke:#dc2626,stroke-width:3px,color:#fff
style F fill:#06b6d4,stroke:#0891b2,stroke-width:3px,color:#fff
style G fill:#ec4899,stroke:#db2777,stroke-width:3px,color:#fff
Purpose: Real-time data ingestion and stream processing
Key Features:
- Continuous satellite telemetry monitoring
- High-throughput data streaming (1000+ events/sec)
- Protocol support: MQTT, WebSocket, gRPC
- Fault-tolerant message queuing
Technologies:
- Pathway for real-time streaming
- Apache Kafka for message brokering
- Protocol Buffers for serialization
# Example: Telemetry ingestion
stream = pathway.io.kafka.read(
topic="satellite-telemetry",
schema=TelemetrySchema,
autocommit_duration_ms=1000
)Purpose: Transform raw telemetry into semantic vector representations
Key Features:
- Multi-modal embedding (numerical, categorical, temporal)
- Dimensionality: 768-dimensional vectors
- Context-aware encoding with attention mechanisms
- Real-time transformation (<10ms latency)
Technologies:
- Sentence Transformers
- Custom trained embeddings on satellite data
- FAISS for vector indexing
# Vector transformation
embeddings = encoder.encode(
telemetry_data,
normalize=True,
batch_size=32
)
# Index for similarity search
index.add(embeddings)Technology: Python 3.9+
Purpose: Executes concrete security operations
Capabilities:
- Packet Manipulation: Uses Scapy for deep packet inspection and crafting
- Network Scanning: Integrates with Nmap for port scanning and service detection
- Payload Delivery: Automated injection and testing of security payloads
- Traffic Interception: Proxy integration with Burp Suite for man-in-the-middle analysis
- Protocol Analysis: Deep inspection of network protocols and data streams
Design Philosophy:
- Stateless and robust
- Fail-safe by default
- Does exactly what it's toldβno surprises
- Comprehensive logging for audit trails
Technology: Python (LangChain/Ollama) + Node.js
Purpose: Analyzes context and makes intelligent decisions
Capabilities:
A. Attack Surface Analysis
- Reads scan data from the Security Engine
- Identifies "interesting" targets based on service versions, port configurations, and legacy protocols
- Prioritizes targets by exploitability
B. Smart Payload Generation
- Crafts payloads specific to the target technology stack
- Adapts to application framework (Django, Flask, Express, etc.)
- Considers defense mechanisms detected during reconnaissance
C. Risk Assessment
- Scores vulnerabilities based on real-world exploitability
- Considers attack complexity, available exploits, and mission objectives
D. Contextual Decision Making
- Uses historical anomaly patterns from Adaptive Memory Store
- Adjusts responses based on mission phase
- Learns from previous incidents to improve detection
Privacy Guarantee:
- 100% Local Processing: All AI models run via Ollama on your machine
- No Cloud Calls: Sensitive scan data never leaves your infrastructure
- Offline Capable: Works without internet connection
- Audit Trail: All AI decisions are logged with reasoning traces
- Telemetry Ingestion: Satellite telemetry streams into the system via Pathway
- Encoding: Data is embedded into vector representations for semantic analysis
- Memory Storage: Historical context is stored in the Adaptive Memory Store
- Anomaly Detection: AI agent analyzes current data against historical patterns
- Policy Evaluation: Mission phase policies determine appropriate response
- Action Orchestration: Response orchestrator executes recovery actions
- Feedback Loop: Action results feed back into memory for continuous learning
- Dashboard Update: Real-time updates pushed to monitoring interface
| Feature | Description | Technology |
|---|---|---|
| π€ AI Threat Assistant | Local LLM-powered vulnerability analysis using Llama 3 or Mistral models | LangChain + Ollama |
| π‘οΈ Offensive Tooling Suite | Comprehensive payload generation, injection testing, and security scanning | Python + Scapy + Nmap |
| π Smart Dashboard | Real-time visualization of threats, system health, and security metrics | Streamlit + React |
| π¬ Research Lab | Integrated environment for testing security hypotheses and verifying findings | Python + Jupyter |
| β‘ Real-Time Streaming | High-performance telemetry processing with sub-second latency | Pathway |
| π§ Adaptive Memory | Context-aware decision making based on historical anomaly patterns | Vector embeddings |
| π― Smart Prioritization | Intelligent target selection based on exploitability and mission impact | AI reasoning |
| π Explainable Anomaly Insights | Per-anomaly explanations including feature importances, SHAP values, and confidence scores | React + visualization |
| π Health Monitoring | Component-level degradation tracking with automated failover | Centralized error handling |
AstraGuard AI understands that CubeSat operations have different constraints at different stages. The same anomaly might trigger different responses depending on the current mission phase.
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β MISSION PHASES β
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ€
β β
β LAUNCH β
β ββ Duration: T-0 to orbit insertion β
β ββ Priority: System survival β
β ββ Constraint: Minimal actions to avoid destabilization β
β ββ Response: LOG_ONLY (no active interventions) β
β β
β DEPLOYMENT β
β ββ Duration: Orbit insertion to systems checkout β
β ββ Priority: Safe deployment of components β
β ββ Constraint: Limited responses, avoid disruption β
β ββ Response: STABILIZE (conservative recovery) β
β β
β NOMINAL_OPS β
β ββ Duration: Normal operational phase β
β ββ Priority: Performance optimization β
β ββ Constraint: None (full autonomy) β
β ββ Response: FULL_RECOVERY (all actions available) β
β β
β PAYLOAD_OPS β
β ββ Duration: Active science/mission operations β
β ββ Priority: Science data collection β
β ββ Constraint: Careful with power/attitude changes β
β ββ Response: PAYLOAD_SAFE (mission-aware recovery) β
β β
β SAFE_MODE β
β ββ Duration: Critical failure or emergency β
β ββ Priority: System survival only β
β ββ Constraint: Minimal subsystem activation β
β ββ Response: SURVIVAL_ONLY (log + essential recovery) β
β β
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
AstraGuard AI is designed to never crash. The system includes a comprehensive error handling layer that ensures resilience under all failure conditions.
- Fail Gracefully: Component failures trigger fallback behavior instead of system crashes
- Centralized Handling: All errors flow through a single error handling pipeline
- Structured Logging: Errors include full context (component, phase, telemetry state)
- Health Tracking: Real-time component health exposed to monitoring dashboard
- Smart Fallbacks: Each component has a defined degraded operating mode
AstraGuard AI provides a production-ready FastAPI server for programmatic access and integration with external systems.
β
Input Validation: Pydantic models with comprehensive data validation
β
OpenAPI Documentation: Interactive Swagger UI at /docs
β
CORS Support: Ready for web frontend integration
β
Batch Processing: Submit 1-1000 telemetry points in a single request
β
Rate Limiting: Configurable limits to prevent abuse
β
Authentication: API key support for production deployments
β
Versioning: /api/v1/ prefix for future compatibility
β
100% Test Coverage: 23/23 tests passing
As part of Elite Coders Winter of Code 2026, AstraGuard AI has clear deliverables and learning objectives:
- β Stable AI Security Module: Build a production-ready AI assistant for intelligent vulnerability detection
- β Contributor-Friendly Issues: Create 20+ well-scoped issues with learning notes
- β Comprehensive Documentation: Improve onboarding and technical docs
- β Automated Testing: Implement CI/CD pipelines
- β Production-Ready MVP: Ship a fully working system
| Technology | Version | Purpose |
|---|---|---|
| React | 18.2+ | UI framework |
| TailwindCSS | 3.4+ | Styling |
| Vite | 5.0+ | Build tool |
| Recharts | 2.10+ | Data visualization |
| Technology | Version | Purpose |
|---|---|---|
| Node.js | 16+ | JavaScript runtime |
| FastAPI | 0.104+ | Python API framework |
| MongoDB | 6.0+ | Database |
| Pathway | 0.7+ | Stream processing |
| Technology | Version | Purpose |
|---|---|---|
| Python | 3.9+ | Core language |
| Scapy | 2.5+ | Packet manipulation |
| Nmap | 7.94+ | Network scanning |
AstraGuard-AI/
βββ src/ # Core application source code
β βββ security_engine/# Threat detection & payload generation
β βββ ai_agent/ # LLM integration & reasoning
β βββ api/ # FastAPI backend services
β βββ core/ # System policies & error handling
β βββ research/ # Labs & Jupyter experiments
βββ ui/ # Unified user interface components
β βββ dashboard/ # Streamlit/React dynamic dashboard
β βββ frontend/ # Documentation & landing pages
β βββ assets/ # Unified static media (logos, images)
βββ infra/ # Orchestration & Deployment
β βββ docker/ # Container definitions
β βββ k8s/ # Kubernetes manifests
β βββ monitoring/ # Prometheus/Grafana configs
βββ docs/ # Technical documentation & guides
βββ scripts/ # Automation & Maintenance
βββ tests/ # Validation suites
| Software | Minimum Version | Purpose |
|---|---|---|
| Python | 3.9 | Core runtime |
| Node.js | 16.0 | Frontend & tooling |
| Git | 2.30 | Version control |
| Docker | 20.0 (optional) | Containerization |
git clone https://github.com/sr-857/AstraGuard-AI.git
cd AstraGuard-AI# Create virtual environment
python -m venv venv
# Activate virtual environment
source venv/bin/activate # Linux/macOS
venv\Scripts\activate # Windows
# Install dependencies
pip install -r requirements.txtcd dashboard
npm install
cd ..cp .env.example .env
# Edit .env with your configuration# Start API server
python cli.py api
# Start dashboard (in another terminal)
python cli.py dashboardimport requests
BASE_URL = "http://localhost:8000/api/v1"
# Submit telemetry
response = requests.post(f"{BASE_URL}/telemetry", json={
"timestamp": "2026-01-04T12:00:00Z",
"voltage": 7.2,
"temperature": 35.5,
"gyro": 0.08,
"mission_phase": "NOMINAL_OPS"
})
result = response.json()
print(result)We welcome contributions from developers of all skill levels! π
Start with a Good First Issue - perfect for newcomers!
What are Good First Issues?
- β Well-defined with clear acceptance criteria
- β Beginner-friendly requiring minimal context
- β Completable in 2-4 hours
- β Include guidance and resources
- Contributing Guide - Full guidelines and workflow
- Good First Issue Criteria - How issues are selected
- Code of Conduct - Community standards
- Find an issue you want to work on
- Comment on the issue to claim it
- Fork the repository
- Create a branch:
git checkout -b feature/issue-699-description - Make your changes
- Test thoroughly
- Submit a pull request
Questions? Don't hesitate to ask in the issue comments or join our WhatsApp group!
- Getting Started - Setup and installation guide
- Technical Documentation - Architecture and design
- API Reference - API endpoints and usage
- Architecture - System architecture overview
- Dependency Conflict Resolver - Detect and resolve dependency conflicts
- Contributing Guide - How to contribute to the project
- Good First Issue Criteria - Guidelines for newcomers
- WhatsApp: Join Group
- GitHub Discussions: discussions
- Issues: Report bugs
This project is licensed under the MIT License - see the LICENSE file for details.