π‘οΈ Piaegis: Next-Gen LLM-Powered Security Suite
DEMOS : https://drive.google.com/drive/folders/10L25hW8l-mf8dQJhoX6kWxi8Mj7X0hvY?usp=drive_link
β¨ Inspiration
Security vulnerabilities are a constant headache for dev teams. We've all been there:
- π Late nights patching critical flaws before release
- π° Stress investigating potential breaches
- π€ The feeling we should be doing more for security
Traditional SAST and DAST tools flood us with alerts (many false positives) and lack context-aware remediation advice.
Enter Piaegis: Leveraging AI to identify vulnerabilities more accurately and provide intelligent, actionable guidanceβless like an auditor, more like a helpful security expert at your side.
π What It Does
Piaegis integrates seamlessly into your development lifecycle, focusing on SANS Top 25 Most Dangerous Software Errors, OWASP Top 10, business logic flaws, and emerging threats.
Core Components:
π‘οΈ Piaegis Shield (SAST)
- LLM-powered static code analysis for .NET, Java, and more
- Understands semantic context beyond pattern matching
- Identifies complex vulnerabilities with greater accuracy
- Provides tailored remediation suggestions
βοΈ Piaegis Sword (DAST)
- Integrates with OWASP ZAP for dynamic testing
- Filters noise from raw reports
- Presents findings in clear, actionable format
- Provides insights on vulnerability implications
π° Piaegis Fortify (Interactive Security Debugger)
- Conversational security analysis
- Lets developers ask questions about vulnerabilities
- Discusses security best practices
- Offers context-aware remediation based on codebase history
π§ How We Built It
- Backend: Python
- Frontend: Streamlit for user-friendly interfaces
- LLM Integration: OpenAI, potentially Google Gemini and OpenRouter
- DAST: OWASP ZAP API integration
- Data Management: PostgreSQL, Neo4j, Redis + Celery
- Containerization: Docker Compose
- DevOps: Jenkins integration
π§ Challenges We Faced
- βοΈ Prompt Engineering: Balancing accuracy, minimizing false positives
- π§© Diverse Codebases: Adapting to different project structures
- π Tool Integration: Seamlessly working with ZAP and CI/CD systems
- β‘ Performance: Optimizing for large codebases
- π Dependencies: Managing multiple services
- βοΈ Accuracy Balance: Reducing false positives without missing vulnerabilities
- π» Platform-Specific Analysis: Tailoring for .NET, Java, Android, iOS
π Accomplishments
- β Functional core components (Shield, Sword, Fortify)
- π³ Complete Docker environment
- π€ Successful LLM and DAST tool integration
- π¨βπ» User-friendly Streamlit interfaces
- π― Focus on actionable insights
- π Prioritized SANS Top 25 vulnerabilities
π What We Learned
- LLM strengths and limitations in security context
- Complexity of comprehensive security testing
- Importance of seamless workflow integration
- Benefits of microservices architecture
- Value of containerization
π What's Next
- π Enhanced language support (.NET, Java, Android, iOS)
- π― Improved accuracy, fewer false positives
- π Deeper DAST analysis
- π§ Business logic vulnerability detection
- π Emerging threat detection
- π§ IDE and CI/CD integrations
- π Enhanced reporting and remediation guidance
- π€ Community engagement
- π Graph-based security analysis
- β‘ Performance optimization
Log in or sign up for Devpost to join the conversation.