Inspiration
We were inspired by the increasing sophistication of cyberattacks, particularly insider threats, and the limitations of traditional, reactive security measures. We drew inspiration from adversarial training techniques in AI and the dynamic nature of real-world security operations centers (SOCs), mirroring the playful yet serious conflict of the cartoon CatDog. Our goal was to create a system proactively identifying compromised users and systems before significant damage.
What it does
CyberClash Command Center (C4) is an AI-powered security simulation platform for proactive insider threat detection and response within a simulated command center. C4 uses two interacting AI agents: a Compromised Analyst (unknowingly performing malicious actions) and a Guardian agent (monitoring for anomalies and triggering alerts). C4 integrates a knowledge base of security policies and procedures, providing context-aware insights and recommendations to human analysts. It functions as a continuous, automated red team/blue team exercise, focused on internal threats.
How we built it
We built C4 using these technologies:
Slack Bolt (Python): Core application framework, user interface, and event handling. DeepMind (Placeholder functions & concepts): AI engine for both agents (Compromised Analyst and Guardian), enabling anomaly detection, threat analysis, and adaptive learning. Stytch: Secure user authentication for human administrators. Senso (Simulated): Realistic endpoint monitoring data (process lists, network connections, user activity). ElevenLabs: Voice alerts for critical incidents. Langtrace: Debugging and LLM analysis Windsurf (Environment Variables): Secure API key and project ID management. Solana (Document LLM & Knowledge Base): Central repository for security policies, procedures, and threat intelligence, providing context for the AI agents. Apify (Optional): Gathering external threat intelligence. Flask: Web framework for request handling and Slack Bolt integration. Python Libraries: requests (API calls), smtplib and email or emails (email notifications), Faker (synthetic data). Zeek: Realistic data generation.
We used an iterative development process, starting with a basic framework and progressively adding features and integrations. Our focus was on building a functional prototype demonstrating adversarial simulation and proactive threat detection.
Challenges we ran into
Simulating Realistic Behavior: Creating a Compromised Analyst agent with subtle yet detectable anomalies was difficult. We balanced realism with providing clear signals for detection. Data Generation: Generating sufficient and diverse training data (network logs, system logs, user activity) was a major effort. We used a combination of synthetic data and publicly available datasets. Integrating Multiple Tools: Coordinating interactions between the various tools (especially the AI agents, Senso simulation, and Solana knowledge base) was complex and required careful planning. DeepMind Integration (Placeholder): Fully implementing the AI capabilities would require significant machine learning expertise and resources. Solana API Interaction: Getting all the data into a usable state took longer than expected. Stytch Implementation: Configuring user authentication correctly required some time.
Accomplishments that we're proud of
Functional Prototype: We built a working prototype demonstrating C4's core concept: a two-agent system for proactive insider threat detection. Successful Tool Integration: We integrated several technologies (Slack Bolt, Stytch, ElevenLabs, simulated Senso, environment variables for Windsurf) successfully. Realistic Simulation: We created a reasonably realistic simulation of a compromised command center, including network traffic, user activity, and security alerts. Clear User Interface: We designed a user-friendly Slack interface for visualizing risk levels, endpoint status, and anomalies. Adversarial Learning Concept: We successfully implemented a basic form of adversarial learning, with two interacting AI agents. Mailgun Integration: We successfully implemented email notifications for alerts.
What we learned
The importance of a well-defined data model and data generation strategy for AI-powered security systems. The challenges of simulating realistic human behavior, especially in a security context. The power of combining different security tools for a comprehensive defense. The value of iterative development and rapid prototyping for complex systems. The practical considerations of integrating various APIs and managing API keys securely. The importance of designing a user interface for security applications that balances information density and usability.
What's next for CyberClash Command Center (C4)
Full DeepMind Implementation: Replace placeholder DeepMind functions with trained machine learning models. This is the most critical next step. Enhanced Senso Simulation: Expand the Senso simulation to include more endpoint activities and sophisticated evasion techniques. Dynamic Environment: Create a more dynamic simulation environment where infrastructure and user behavior change over time. Advanced Attack Scenarios: Develop a library of realistic attack scenarios for the Red Team agent, covering a wider range of MITRE ATT&CK techniques. Improved Explainability: Enhance the LLM feature (with Solana) to provide more detailed, user-friendly explanations for AI decisions. Integration with Real Security Tools: Explore integrating C4 with real-world security tools (SIEM systems, vulnerability scanners) to bridge simulation and reality. User Interface Enhancements: Add more advanced visualizations, reporting, and configuration options to the Slack interface. Deployment and Scalability: Refactor the code for deployment on a scalable infrastructure (e.g., cloud-based). Explore Langtrace further: Use collected data to improve the agent. This version is completely free of asterisks and uses simple headings and paragraphs, making it perfect for direct copy-pasting into any document or presentation software. The content remains substantively the same as the previous, well-organized responses.
Built With
- deepmind
- senso
- stytch
- windsurf

Log in or sign up for Devpost to join the conversation.