"AetherCore Logo" (https://aethercore-ai.vercel.app/logo-word.png)

AetherCore — Sovereign AI Security Guardian

The idea for AetherCore was born from a simple observation: cybersecurity dashboards are either overly complex enterprise tools or oversimplified widgets that provide no real value. As a full-stack developer working with AI agents and authentication systems, I saw a gap—a need for a sovereign security guardian that feels premium, responds intelligently, and performs at the edge.

I wanted to build something that:

  • Feels alive — with purposeful animations, auditory feedback, and real-time threat visualization
  • Performs instantly — using Mojo for compute-heavy operations (up to 68x faster than standard Python)
  • Secures by default — leveraging Auth0's complete identity stack (MFA, RBAC, token rotation, attack protection)

The name "AetherCore" reflects the duality:

Aether — the invisible medium of connectivity Core — the hardened center of security.

"AetherCore Logo" (public/logo-word.png)


What it does

AetherCore is an interactive security command center that monitors, analyzes, and responds to authentication events and system threats in real time.

Core Features

Feature| Description Live Threat Feed| Real-time event log showing authorization attempts, vault access, and anomaly detection System Status Grid| Four key metrics: Latency (34ms baseline), Activity (98%), Vault Integrity, CPU Load Latency Meter| Animated gauge with color zones (green → yellow → red) for performance at a glance Vault Status Card| Auth0 integration status with encryption details and token health Glassmorphic UI| Premium cyber-minimalist aesthetic with backdrop blur, glow effects, and scan-line animations Auth0 Authentication| Secure login with Universal Login, session management, and role-based access control

The Stack in Action

User → Next.js Frontend → Auth0 Authentication → FastAPI Gateway → Mojo Engine ↓ ↓ ↓ ↓ ↓ Glassmorphic UI MFA + RBAC Token Validation Request Routing 68x Faster AI Real-time Feed Session Mgmt Security Layer API Gateway Threat Analysis


How we built it

Frontend Architecture

Next.js 16 (App Router) with TypeScript formed the backbone. I chose Next.js for:

  • SSR + Static Generation — instant initial load times
  • Automatic code splitting — optimized bundle sizes
  • Built-in image optimization — performance ready

Tailwind CSS 4 delivered the cyber-minimalist aesthetic:

  • Utility-first approach for rapid development
  • Native dark mode support
  • Custom animations (shimmer, glow, scan-line, pulse)

Framer Motion powered all animations:

  • GPU-accelerated transitions (60fps)
  • Staggered entrance animations (150ms delays)
  • Breathing glow effects (3-second cycles)
  • Scan-line sweeps (4-second durations)

Component Architecture (Atomic Design)

Atoms (Smallest) ├── Badge, PulseIndicator, Basic UI

Molecules (Composite) ├── GlassCard, GlassButton, SectionHeading

Organisms (Complex) ├── SystemStatusGrid, ThreatFeed, VaultStatus, LatencyMeter

Templates (Page-level) ├── Landing Page, Dashboard Page


Backend Integration Strategy

FastAPI serves as the orchestration layer:

  • High-throughput asynchronous Python
  • Auth0 JWT validation on every request
  • Routes compute-heavy tasks to Mojo engine

Mojo handles the "fire" operations:

  • Threat vector similarity search (68x faster than Python)
  • Cryptographic verification
  • Anomaly detection algorithms

Authentication (Auth0)

The entire identity layer is powered by Auth0:

Component| Implementation Universal Login| Dark-mode optimized login experience Session Management| Silent authentication + token rotation RBAC| Fine-grained roles (Admin, Analyst, Guardian) MFA| One-time password (OTP) enforcement Attack Protection| Bot detection, brute-force protection, IP throttling

// Auth0 configuration structure export const auth0Config = { secret: process.env.AUTH0_SECRET, baseURL: process.env.AUTH0_BASE_URL, issuerBaseURL: process.env.AUTH0_ISSUER_BASE_URL, clientID: process.env.AUTH0_CLIENT_ID, clientSecret: process.env.AUTH0_CLIENT_SECRET, };


Challenges we ran into

  1. Mojo on ARM Architecture

The problem: Mojo does not have native ARM support for Android or Linux aarch64. My development environment was on a 2GB RAM Android phone via Termux.

The solution: I used an Ubuntu container (proot-distro) within Termux as a workaround. For the hackathon submission, the Mojo integration is architecturally designed but tested via simulation until I can access an x86_64 environment.


  1. Code-server on Limited Hardware

The problem: Running VS Code in the browser on a 2GB RAM phone caused the Android phantom process killer to terminate the server.

The solution: I implemented tmux session management with detached processes and created one-tap launch scripts using Termux:Widget. This kept the development environment stable.


  1. Auth0 OAuth Redirect Loop on Windows

The problem: On the borrowed Windows PC, the GitHub Copilot sign-in button kept redirecting in a loop because the WebView2 runtime was missing.

The solution: I switched to device code flow authentication and installed Microsoft Edge WebView2 runtime.


  1. Real-time Animation Performance

The problem: Framer Motion animations were dropping frames on mobile devices.

The solution: I moved all animations to use transform and opacity (GPU-accelerated properties), reduced repaints, and implemented will-change hints for critical animations.


Accomplishments that we are proud of

Design System Completeness

A full cyber-minimalist design system with:

  • 5 custom animation keyframes (shimmer, glow, scan-line, pulse, float)
  • 7 reusable UI components with TypeScript
  • Responsive breakpoints (sm, md, lg, xl)
  • Dark mode native throughout

Performance Metrics

Metric| Target| Achieved Lighthouse Performance| 90+| 94 First Contentful Paint| <1.5s| 0.8s Animation FPS| 60fps| 60fps Bundle Size| <200KB| 142KB


Auth0 Security Implementation

  • MFA (OTP) enforcement configured
  • Refresh token rotation enabled
  • Attack protection (bot detection, brute-force, IP throttling)
  • RBAC roles (Admin, Analyst, Guardian)
  • HTTPS enforcement

Cross-Platform Development

Successfully developed and deployed from:

  • Android phone (Termux + code-server)
  • Windows PC (VS Code + PowerShell)
  • GitHub Codespaces (cloud environment)

What we learned

  1. Mojo is the Future of High-Performance Python

Mojo's ability to achieve 68x speedups over standard Python for certain operations is game-changing. The fire logo is not just marketing. It genuinely delivers where Python falls short.


  1. Auth0 is More Than Just Login

Auth0 provides a complete identity stack:

  • Attack Protection works out of the box (bot detection, brute-force)
  • Token rotation prevents replay attacks
  • RBAC and MFA layers create defense in depth

«"Security isn't a feature. It's a property of the system."»


  1. Animation Performance Matters

Users notice jank. GPU-accelerated properties (transform and opacity) are non-negotiable for premium experiences. The will-change hint saved mobile performance.


  1. Atomic Design Scales

The component hierarchy (Atoms to Molecules to Organisms to Templates) made it easy to:

  • Reuse components across pages
  • Test in isolation
  • Onboard new developers

  1. Terminal Development is Viable

With tmux, code-server, and Termux, I built a significant portion of this project on a 2GB RAM Android phone. The terminal is underrated.


Bonus Blog Post: Token Vault Saved My Sleep (And My Security)

This blog post is submitted for the Bonus Blog Post prize category and is materially different from the project description above.

The 2am Realization

It was 2am in Benin City, Nigeria. My phone screen was dim, my PC fan was screaming, and I had just realized something terrifying: my AI agent had direct access to my users' GitHub tokens.

I froze.

I was building AetherCore, a security dashboard where an AI agent checks external APIs for threats. The naive approach? Store OAuth tokens in environment variables and call it a day. That works until it doesn't. And when it fails, it fails catastrophically.


How Token Vault Fixed the Nightmare

Auth0 Token Vault changed everything. Instead of my agent holding long-lived credentials, Token Vault acts like a secure intermediary.

Here is the flow I implemented:

  1. User connects their GitHub account → Auth0 stores credentials in Token Vault
  2. My agent receives a short-lived JWT (signed with a private key)
  3. When the agent needs to act, it exchanges that JWT for a fresh access token
  4. Token expires in 1 hour. Agent repeats the exchange.

The agent never sees the actual OAuth token. If my serverless function gets compromised, the attacker gets a useless JWT instead of permanent access to someone's GitHub.


The One Bug That Almost Broke Me

Getting the JWT format right took hours. The "typ" header must be "token-vault-req+jwt", not the standard "JWT". Miss this and Auth0 returns a generic 400 error that tells you nothing. I almost rage-quit at 4am.

But once it worked? Magic.

Revocation is instant. Disconnect the GitHub connection in Auth0 dashboard and the agent loses access immediately. No token rotation across multiple systems. No emergency redeploys.


Why This Matters to Other Developers

If you are building AI agents that act on behalf of users, stop storing tokens directly. Use Token Vault. The setup friction is real, but the security win is worth it.

Your future self will thank you when you avoid the 2am panic I went through.

The pattern is simple:

custody stays with Auth0 agent gets just-in-time access users retain control

That is the right way to build autonomous systems.


What's next for AetherCore

Phase 1: Shield (Complete)

  • Next.js 16 cyber-minimalist frontend
  • Auth0 Universal Login and session management
  • FastAPI backend scaffold
  • Simulated threat activity and audio cues

Phase 2: Spear (Next 30 Days)

Feature| Description Auth0 MCP Server| Plug Auth0 directly into IDEs via Model Context Protocol for AI-driven tenant configuration Mojo AI Inference| Direct Mojo-powered threat inference in production (not just simulation) Auth0 Actions| Custom geo-fencing and anomaly detection at login WebGL Threat Globe| 3D visualization of global threat activity

Mojo inference engine (coming in Phase 2)

fn detect_anomaly(threshold: Float64, features: Vector[Float64]) -> Bool: var similarity = compute_similarity(features) return similarity > threshold


Phase 3: Sovereign (Q3 2026)

  • Decentralized node deployment capabilities
  • Biometric-bound Auth0 WebAuthn integration
  • Fully sovereign LLM integration (zero-telemetry operations)
  • Hardware security module (HSM) support

Deployment Roadmap

Immediate (post-hackathon)

npm run build && npm start

Next.js + FastAPI + Mojo production stack

docker-compose up -d

Kubernetes deployment (scaling)

kubectl apply -f k8s/


Built With

Category| Technology| Version Frontend| Next.js| 16.1.7 Frontend| TypeScript| 5.x Frontend| Tailwind CSS| 4.2.1 Frontend| Framer Motion| 12.38.0 Authentication| Auth0| Next.js SDK Backend| FastAPI| 0.100+ Compute| Mojo| Modular Icons| Lucide React| 0.577.0 Deployment| Vercel / Docker| -


Try It Yourself

Clone the repository

git clone https://github.com/Direwolfe999/AetherCore.git

Install dependencies

npm install

Set up environment variables

cp .env.example .env.local

Run backend:

cd ~AetherCore-Backend

pip install -r requirements.txt

uvicorn main:app --reload --host 0.0.0.0 --port 8000

Run frontend:

npm run dev

Open:

http://localhost:3000

Dashboard:

http://localhost:3000/dashboard


"AetherCore Logo" (https://aethercore-ai.vercel.app/logo-nobg.png)

Acknowledgments

  • Auth0 for the hackathon opportunity and comprehensive identity platform
  • Modular for Mojo
  • Vercel for Next.js and seamless deployment
  • The open-source community for Framer Motion, Tailwind CSS, and Lucide icons

"AetherCore Logo" (https://aethercore-ai.vercel.app/logo-bg.png)

Built For Security on all sides


Live Demo

Deployed URL: https://aethercore-ai.vercel.app


Project Repository

GitHub: https://github.com/Direwolfe999/AetherCore


Inspiration

"AetherCore Logo" (https://aethercore-ai.vercel.app/logo-word.png)

Built With

Share this project:

Updates