Inspiration

Cybersecurity threats are increasing rapidly, especially phishing emails, malicious URLs, fake SMS messages, and shell-based attacks. Many individuals and small companies don’t have a dedicated SOC (Security Operations Center) or trained analysts. We wanted to build an AI assistant that behaves like a cybersecurity analyst — capable of analyzing suspicious content, detecting threats, extracting IOCs, triggering alerts, and even automating responses just like SOAR (Security Orchestration Automation & Response) systems.

What it does

Accepts multiple types of suspicious inputs: Emails (with headers) URLs / SMS messages Shell commands / logs File metadata (hash, filename) Extracted screenshot text

AI analyzes and returns (in seconds):

Risk level (Safe / Suspicious / High Risk) Confidence score IOC extraction (IPs, URLs, domains, hashes, file types…) Recommended action

Supports full SOC features:

Threat dashboard with risk score Threat hunting across historical data Automation rules & visual SOAR playbook builder External threat feed integration (VirusTotal, AbuseIPDB, MISP) Team collaboration, tags, comments, sharing Customizable dashboards with drag-and-drop widgets

Frontend: React + TailwindCSS shadcn/ui components @tanstack/react-query (data fetching) @hello-pangea/dnd (drag-and-drop dashboards/playbooks) Recharts + Framer Motion (visualizations & animations)

Backend (Base44) Entities: Analysis, Alert, AutomationRule, ThreatReport, ThreatCorrelation, Comment, DashboardConfig, Integration, Team AI analysis layer (LLM-based): Extracts IOCs, assigns risk levels & reasons Automation engine: Triggers rules → alerts / tags / playbook execution Integration layer: VirusTotal, AbuseIPDB, MISP, Webhooks

Built a working AI cybersecurity analyst

  1. Created visual SOAR playbook builder (drag + drop)
  2. Built threat hunting search + correlation engine
  3. Designed a scalable backend entity model
  4. Created UI that looks like a real SOC platform
  5. Combined AI, automation, threat intel, dashboards & collaboration in one system

What we learned

How real SOC teams investigate phishing/malware Prompt engineering for cybersecurity AI analysis Designing database/entity models for security applications Working with drag-and-drop UI & dashboard components Difference between SIEM vs SOAR vs Threat Intel platforms Importance of collaboration & traceability in security tools

What’s next for CSA 101

Upcoming Features Planned: Incident / Case Management Audit logs (SOC compliance) “Dry Run Mode” for automation rules Live system monitoring agent for Linux endpoints Dataset to train a dedicated phishing detection model AI-driven campaign detection & timeline view Deploy as a SaaS platform with multi-tenancy

Long term vision: A full AI-powered SOC assistant — that investigates threats faster than humans.

Built With

Share this project:

Updates