Inspiration
The inspiration for ChaosSec came from a simple but critical question: "How do we know our security controls actually work before we need them?"
After learning about Netflix's Chaos Monkey and how chaos engineering transformed reliability testing, I wondered why this approach wasn’t being used for security. Companies spend millions on monitoring, AWS Config rules, and CloudTrail logging—but only find out if these systems work after a breach.
ChaosSec was built to continuously validate security controls through controlled chaos, powered by AI to make intelligent test decisions. It’s an autonomous agent that proves your security works—not just that it exists.
What It Does
ChaosSec is an autonomous AI security testing platform that fuses chaos engineering and AI-driven reasoning to continuously validate AWS infrastructure security.
Core Workflow (8 Steps)
- SIMULATE – Create digital twins of infrastructure using System Initiative
- SCAN – Run Semgrep to find vulnerabilities in code and IaC
- REASON – Use AWS Bedrock (Claude AI) to analyze risk and prioritize tests
- INJECT – Safely inject chaos (e.g., make S3 bucket public)
- MONITOR – Track CloudWatch metrics and logs during chaos events
- VALIDATE – Check if AWS Config, CloudTrail, and Security Hub detect issues
- REPORT – Auto-generate compliance evidence (SOC2, ISO 27001, PCI-DSS, NIST)
- LEARN – Store results in DynamoDB for AI-driven improvement
Key Capabilities
- Discovers 21+ misconfigurations automatically
- AI prioritization with 95% confidence scoring
- Tests detection systems without breaking production
- Generates audit-ready documentation
- Runs continuously and improves over time
How We Built It
Technology Stack:
- Frontend: React 18 + Vite + Tailwind CSS + Framer Motion
- Backend: Python 3.13 with Boto3, HTTPX, and subprocess modules
- Infrastructure: AWS CDK (Infrastructure as Code)
- AI/ML: AWS Bedrock (Claude)
- Security Scanning: Semgrep
- Integrations: System Initiative API, Vanta MCP
Architecture
- Presentation Layer: React dashboard (localhost:5173) visualizing the 8-step workflow
- Application Layer: Python orchestrator coordinating AI, AWS, and integrations
- Integration Layer: Connects AWS Bedrock, System Initiative, Semgrep, Vanta, Config, CloudTrail, CloudWatch, and FIS
- Target Layer: Vulnerable AWS e-commerce app with 21 intentional security flaws
Deployment
- Created a demo app with intentional vulnerabilities (public S3, weak IAM, etc.)
- Deployed via AWS CDK to account
042744890612inus-east-1 - ChaosSec autonomously finds and validates these vulnerabilities
Development Process
- Designed architecture and modules
- Built core modules (config, logger, AWS handler, Semgrep scanner, AI brain, orchestrator)
- Developed React dashboard with 7 custom components
- Created demo app with realistic vulnerabilities
- Integrated Bedrock AI and System Initiative
- Implemented OAuth2 for Vanta
Challenges We Faced
- AWS CDK Permissions – IAM bootstrap issues; required PowerUserAccess
- Bedrock API Key Confusion – Misunderstood credentials (uses AWS creds, not API key)
- RDS Reserved Username – “admin” blocked; switched to “dbadmin”
- System Initiative 404s – Optional integration due to endpoint issues
- Demo Script Input Handling – Replaced input() pauses for non-interactive runs
- Dashboard Animation Timing – Fixed final-step display bug in animation loop
Accomplishments
- ✅ End-to-End System: Fully functional platform with frontend, backend, AI, and AWS
- 🤖 Real AI Integration: AWS Bedrock-driven intelligent prioritization
- 🎨 Professional UI/UX: Stunning React dashboard with glass morphism design
- ☁️ Real AWS Deployment: Validated real vulnerabilities on live infra
📊 4+ Real Findings:
- Public RDS
- Lambda with admin access
- Hardcoded secrets
- Unencrypted data
🔄 Complete Workflow: 8-step autonomous security validation
⚡ Rapid MVP Delivery: From concept to working demo in record time
What We Learned
Technical Insights
- AWS CDK Mastery: Multi-service IaC deployment
- AWS Bedrock: Uses standard AWS credentials
- System Initiative: Digital twins enable safe simulation
- OAuth2: Proper client credentials flow with refresh logic
- Chaos Engineering: Safety modes, audit trails, rollback systems
Security Learnings
- Common AWS misconfigurations are widespread
- Detecting issues is easy; validating detection is hard
- Compliance evidence can be automated
- The gap between having and knowing your security works is vast
Design Patterns
- Modular, testable architecture
- Mock modes for external APIs
- Correlation IDs for complete traceability
.env.exampleconfig for simple setup
UX/UI Takeaways
- Real-time visuals make complex workflows accessible
- Severity color coding improves clarity
- Smooth animations maintain engagement
- Glass morphism creates a premium feel
Process Lessons
- Break big goals into clear phases
- Test each module independently
- Document-driven development clarifies requirements
- Mock + real modes accelerate parallel work
What’s Next for ChaosSec
Immediate (Post-Hackathon)
- Deploy to AWS Lambda + Step Functions
- Fix System Initiative integration
- Enhance Bedrock prompt engineering
- Add more chaos scenarios (EC2, IAM, network)
Short-Term (3 Months)
- Real-time dashboard via WebSockets
- Expand scanning to EC2/ECS/EKS/Terraform
- Add HIPAA/FedRAMP frameworks
- One-click automated remediation
- Multi-account support
Medium-Term (6–12 Months)
- ML-based risk scoring
- Integration marketplace (Splunk, PagerDuty, Jira, Slack)
- Policy-as-Code customization
- Community chaos scenario library
- Multi-step reasoning AI agents
Long-Term (12+ Months)
- Multi-cloud (Azure, GCP) support
- ChaosSec-as-a-Service offering
- Security Copilot for AI-driven advice
- Continuous compliance scoring
- Enterprise features (RBAC, branding, SLA)
Business Growth & Vision
- Beta Program: 10 enterprise customers (Q1 2026)
- GA Launch: Q2 2026
- Series A: Raise $3–5M
- Market Expansion: Target 1000+ account enterprises
- Exit Strategy: Potential acquisition by AWS, Palo Alto Networks, or CrowdStrike
Research & Community
- Publish papers on AI-driven chaos engineering
- Open-source the core chaos testing framework
- Contribute to AWS Well-Architected Framework
- Build community around Security Chaos Engineering
Built With
- api
- bedrock
- boto3
- cdk
- cloudformation
- dynamodb
- javascript
- oauth2
- python
- rds
- react
- s3
- semgrep
- tailwind
- vanta
- vite
Log in or sign up for Devpost to join the conversation.