(no title)
Zamaamiro | 9 months ago
The approach is to perform system scanning using a combination of LLMs and traditional algorithms to dynamically populate a Datalog knowledge base. The facts of the program are constrained to a predefined “model schema” of sorts and a predefined set of rules that encode specialized domain knowledge of how new facts can be derived from known facts.
We generate proof trees / attack graphs from the knowledge base and queries posed to it. The attack graph uses big-step semantics to plan and guide the execution flow, and the system dispatches to agents with tool use to fill in the details and implement the small-step semantics, so to speak. This may include API calls to a Metasploit Framework server or RAG over vulnerability and exploit databases.
We use Pydantic AI to constrain the LLM output to predefined schemas at each step, with a dash of fuzzy string matching and processing to enforce canonicalization of, e.g., software names and other entities.
Tl;dr: neurosymbolic AI research tool for cybersecurity analysis and pentesting.
rriley|9 months ago