π οΈ About the Project
π Inspiration
The idea for CyberSentry was born from a common challenge faced by beginners in cybersecurity:
"How do I read and understand log files or identify phishing attacks effectively?"
With the rise of AI-generated phishing emails and the overwhelming nature of raw system logs, we envisioned a platform that could bridge the knowledge gap using the power of modern AI β specifically Google's Gemini API. CyberSentry empowers new security analysts by turning complex cybersecurity data into simple, actionable insights using plain-English explanations.
π What We Learned
During the development of CyberSentry, we explored and learned:
- π§ Integration of Google Gemini AI in a full-stack application
- π¬ Understanding of email headers and phishing red flags
- π Log pattern recognition and anomaly detection strategies
- π Building clean, responsive UIs using React 18 and Tailwind CSS
- π API security best practices, including key handling and input sanitization
π§± How We Built It
CyberSentry is a full-stack web application built with the following technologies:
π§ Frontend
- React 18 with Vite for a fast and modern development experience
- Tailwind CSS for styling
- Lucide React for consistent, lightweight icons
- Axios for handling API requests
- React Hot Toast for elegant user notifications
π₯οΈ Backend
- Node.js with Express.js to build scalable APIs
- Multer for secure file upload handling
- Google Gemini AI for intelligent log and email analysis
- Middleware for CORS, rate limiting, and input sanitization
π Workflow & Features
PhishSentry
Paste email content and headers β AI detects phishing signals β Outputs risk score, indicators, and recommendationsLogLens
Upload.logor.txtfile β AI scans for suspicious activity β Click any log line for plain-English explanationsModern UX/UI
Cybersecurity-themed, responsive interface with loading states, toast messages, and interactive features
β οΈ Challenges We Faced
Prompt Engineering for Clarity
AI output needed to be consistent, understandable, and technically accurate for beginners.File Handling Constraints
Managing different log formats and limiting upload size for smooth user experience was challenging.Security and API Key Management
Ensuring secure handling of the Gemini API key and preventing abuse required careful planning.User Education Layer
It was important to not just detect threats, but also teach users why something is dangerous and how to respond.
π§ The Outcome
CyberSentry stands as an AI-powered educational tool designed to help beginners learn cybersecurity concepts while analyzing real data. It demonstrates how modern LLMs can make cybersecurity analysis more accessible, interactive, and understandable for everyone.
β οΈ Disclaimer: This platform is for educational and demonstration purposes only. Always verify results with professional cybersecurity tools and experts.
Log in or sign up for Devpost to join the conversation.