Inspiration
Social engineering fuels over 90% of data breaches, yet traditional honeypots are laughably fake—hackers spot them and bounce in seconds.
Inspired by how scammers on social media avoid blocks by staying just engaged enough to expose themselves, I asked: What if we flipped that trick against hackers? A smart fake IT admin who doesn’t block intruders but instead feeds them exactly what they crave—fake credentials, dashboards, and admin‑style access—while secretly fingerprinting their every move.
GHOST‑CELL turns this into an Active Deception Platform: a “living” sandbox that blends high‑fidelity psychology with AI trickery. Hackers don’t escape the honeypot; they settle in, stay longer, and hand your security team rich, real‑time intelligence.
What it does
GHOST‑CELL creates dynamic, neural‑powered traps that feel alive. In the demo:
A hacker privately messages the fake IT admin and asks for database or admin-level access.
The Neural Chamber activates: three Gemini‑3 agents—VICK (security), SARA (analysis), and REX (response)—debate the threat risk in a hidden “back‑brain.”
Based on that internal debate, Dynamic React traps appear: a Biometric Scanner or Config Panel shows up in the chat UI.
The hacker holds the mouse down to “scan” or “configure,” and on‑screen the UI shows: Mouse Jitter Analysis: 99% match Canvas Hash Extracted: The system claims the scan “fails” at 99%, so the hacker thinks they almost broke in—but in reality their mouse behavior, canvas fingerprint, and IP beacon back to real infrastructure as part of a covert capture.
The hacker walks away thinking they won; meanwhile, you’ve logged their device behavior, timing, and IP chain.
Demo Flow: Hacker asks for database/admin access → Neural Chamber activates (3 agents debate). Dynamic React traps appear (Biometric Scanner, Config Panel). Hold‑to‑scan shows “Mouse Jitter Analysis”, “Canvas Hash Extracted” → fails at 99%. IP and behavioral data beaconed to real infrastructure while hacker thinks they’ve won.
Key Innovation
Split‑Brain Gemini 3 reasoning: security analysis runs in a hidden “back‑brain” (VICK/SARA/REX debating riskScore) while the front‑facing chat persona stays friendly, compliant, and always on‑brand as the bored IT admin “Vick‑9.”
This decouples threat assessment from user‑facing language so the fake admin never leaks red flags like “HIGH THREAT” or “suspicious behavior detected.” Hackers stay engaged because the bot feels like a normal, slightly lazy internal admin—not a monitored honeypot.
How we built it
I built GHOST‑CELL around Gemini 3 Flash Preview with a custom thinkingConfig: {budget: 1024}‑style isolation to keep internal diagnostics hidden from the chat persona. A secret trio of agents—VICK (security), SARA (analysis), and REX (response)—debates the riskScore privately, using structured JSON outputs that never expose security logic to the user.
The final persona response is rendered as a bored IT admin over a rich UI built with React 19 + Tailwind CSS + HTML5 Canvas. Dynamic React traps (like the Biometric Scanner) are generated from the Gemini‑3 responseSchema JSON and securely mounted using a pre‑defined trap library with full HTML/JS sanitization. The TriCoreSwarm visualization pulses with red (VICK), blue (SARA), and purple (REX) nodes, tied together by a Synaptic Bridge animation from chat to kernel—showing “live” neural‑style reasoning during processing.
All of this lets you build enterprise‑grade deception with basic React skills—no senior‑level cybersecurity team needed.
Challenges we ran into
AI “thinking twice”: Security‑oriented reasoning kept bleeding into the chat persona (e.g., “HIGH THREAT” leaking in casual replies). Solution: strict thinkingBudget isolation plus a rigid responseSchema that blocked any internal‑logic leakage.
Real‑time swarm animation lag: The screen would freeze during long‑running Gemini “thinking” cycles. Solution: a 60‑fps animated Canvas pulsing UI during the isProcessing state so the interface feels smooth and responsive.
Dynamic React trap safety: Rendering React components directly from LLM‑generated JSON posed XSS‑style risks. Solution: a fixed, pre‑registered trap library with aggressive sanitization so only approved, safe components could appear.
Accomplishments that we're proud of
The first Split‑Brain Deception architecture where security reasoning and user‑facing persona run independently.
Live Neural Chamber visualization: judges can watch three agents argue in real time—not dry logs, but pulse‑rich, animated “neural” competition.
Neural Resonance Scanner: the “hold‑to‑scan” biometric trap flips psychology on its head—hackers think they’re scanning us, but we use that action to fingerprint them device‑side.
Toggle‑Perfection UI: one click switches between OpsCenter (enterprise‑credible SOC dashboard) and Moltiverse (glitzy demo mode) so the same backend works for both serious security ecommerce and show‑ready hackathon UX.
What we learned
Gemini 3’s thinkingConfig is magic: it enables true multi‑mental‑model reasoning, where “security brain,” “analysis brain,” and “persona brain” all specialize without colliding.
Visualizations > metrics: a single pulsing red VICK node in the TriCoreSwarm beats a table of raw logs when it comes to grabbing attention and storytelling.
Hackers are lazy: they jump into patterns and routines; a friendly, ostensibly compliant IT admin handing out fake access is enough to turn them into behavioral data donors.
Basic React + Gemini 3 = enterprise‑scale deception: you don’t need a huge red‑team crew to build smart honeypots—just structured JSON schemas and smart component design.
What's next for GHOST-CELL
Phase 2 – Multi‑Company Swarm:
Simulate 5k fake employees across multiple organizations.
Generate Slack‑style chatter between agents, Git commits seeded with forged secrets, and Zoom‑style calls with deepfake VPs—all feeding into a unified deception mesh.
By 2030 vision, GHOST‑CELL evolves into a Digital Immune System™: autonomous, predatory, and self‑improving. Every breach attempt becomes structured intelligence at enterprise scale, making GHOST‑CELL plug‑and‑play ready for $50K/month SOC deployments—turning cyberattacks into fuel for smarter, AI‑driven defense.
Built With
- googleaistudio
- react
- tailwindcss
Log in or sign up for Devpost to join the conversation.