Enterprise-grade, AI-powered cybersecurity platform for autonomous network scanning, vulnerability analysis, and threat intelligence. Built with multi-tenancy, cryptographic compliance, and production-ready Kubernetes infrastructure.
- Overview
- Enterprise Features
- Architecture
- Technology Stack
- Quick Start
- API Documentation
- Development Roadmap
- Deployment
- Security & Compliance
A production-ready SaaS platform combining high-performance Rust scanners, AI-driven analysis, and enterprise-grade security features. Designed for MSPs, security teams, and compliance-focused organizations.
- π€ AI-Driven Analysis: Advanced threat intelligence using OpenRouter and Gemini
- π’ Multi-Tenant Architecture: Complete isolation with Organizations and Teams
- π Enterprise RBAC: 4-role permission system (Owner/Admin/Scanner/Viewer)
- π Professional Reporting: PDF/HTML generation with risk scoring
- βοΈ Compliance Ready: Cryptographic audit trails and authorization workflows
- βΈοΈ Cloud Native: Kubernetes deployment with auto-scaling
- π Production Observability: Prometheus metrics and structured logging
- Organizations: Isolated tenants with dedicated resources
- Teams: Sub-groups within organizations
- Row-Level Security: PostgreSQL RLS for data isolation
- Permission System: Granular access control across all API endpoints
- Cryptographic Audit Signing: Ed25519 signatures on all audit logs
- Permission to Scan: Document-based authorization workflow
- Emergency Kill Switch: Platform-wide scan halt capability
- Audit Log Export: Regulatory compliance export API
- Kubernetes Deployment: Production-ready manifests
- Horizontal Pod Autoscaling: 2-40 pods based on load
- Celery Workers: Distributed task processing
- Redis Queue: Job distribution and caching
- Prometheus Metrics: 15+ business and system metrics
graph TB
subgraph "Frontend"
UI[React Dashboard]
end
subgraph "API Layer"
GW[Go Gateway<br/>Load Balancer]
RBAC[RBAC Middleware]
end
subgraph "Services"
BRAIN[Python Brain<br/>AI Analysis]
CORE[Rust Scanners]
CELERY[Celery Workers<br/>Async Tasks]
end
subgraph "Data & Queue"
DB[(PostgreSQL<br/>Multi-tenant)]
REDIS[(Redis<br/>Queue/Cache)]
end
subgraph "External"
AI[OpenRouter API]
end
UI <-->|REST/WebSocket| GW
GW <--> RBAC
RBAC <-->|REST| BRAIN
RBAC <-->|gRPC| CORE
GW <--> DB
GW <--> REDIS
BRAIN <--> AI
CELERY <--> REDIS
CELERY <--> DB
style GW fill:#4CAF50
style BRAIN fill:#2196F3
style CORE fill:#FF5722
style DB fill:#9C27B0
- User Request β Gateway (auth + RBAC)
- Scan Job β Celery Queue β Worker β Core Scanner
- Results β Brain (AI analysis)
- Report β PDF Generation β Storage
- Audit β Cryptographic signing β PostgreSQL
| Layer | Technology | Purpose |
|---|---|---|
| Frontend | React, Chart.js | Real-time dashboard |
| Gateway | Go, Gin, gRPC | API gateway, RBAC |
| Brain | Python, OpenAI SDK | AI analysis, reporting |
| Scanners | Rust, Tokio | High-performance scanning |
| Workers | Celery, Redis | Distributed task processing |
| Database | PostgreSQL 15 | Multi-tenant data with RLS |
| Queue | Redis 7 | Job distribution, caching |
| Observability | Prometheus, JSON logs | Metrics and monitoring |
| Deployment | Kubernetes, Docker | Container orchestration |
- Docker & Docker Compose
- Kubernetes cluster (for production)
- OpenRouter API key
# Clone repository
git clone https://github.com/csa7mdm/Cypersecurity.git
cd Cypersecurity
# Set environment variables
cp .env.example .env
# Edit .env with your API keys
# Start services
docker-compose up -d
# Access dashboard
open http://localhost:3000# Create namespace
kubectl apply -f k8s/namespace.yaml
# Deploy infrastructure
kubectl apply -f k8s/postgres.yaml
kubectl apply -f k8s/redis.yaml
# Deploy services
kubectl apply -f k8s/brain.yaml
kubectl apply -f k8s/gateway.yaml
kubectl apply -f k8s/celery-worker.yaml
# Check status
kubectl get pods -n cypersecuritySee k8s/README.md for detailed deployment guide.
Completed β :
- Enterprise architecture (multi-tenancy, RBAC, compliance)
- Kubernetes deployment infrastructure
- Professional reporting engine
- Cryptographic audit trails
- Nmap Scanner Integration (18 tests, TDD approach)
- Stripe Billing System (15 tests, subscription management)
- Email Notifications (12 tests, user engagement)
- OWASP ZAP Scanner (14 tests, web vulnerabilities)
- CVE/NVD Intelligence (12 tests, threat enrichment)
In Progress π:
- OWASP ZAP integration (web vulnerability scanning)
- CVE database integration
- Billing system (Stripe)
Next Up π:
- Email notifications
- User onboarding flow
- Complete test coverage (80%+ target)
- CI/CD pipeline
| Phase | Status | Features | Timeline |
|---|---|---|---|
| Phase 1-3 | β Complete | Architecture, Multi-tenancy, K8s | Done |
| Phase 4 | π Active | Scanners, Billing, Tests | 8 weeks |
| Phase 5 | π Planned | Onboarding, Docs, UX | 4 weeks |
| Phase 6 | π Planned | Quality, CI/CD | 4 weeks |
| Phase 7 | π Planned | Analytics, Optimization | 2 weeks |
Priority Features (P0):
- β Nmap Integration - COMPLETE
- β Stripe Billing - COMPLETE
- π OWASP ZAP Integration - Next
- π Email Notifications - Next
See implementation_plan.md for detailed roadmap.
Authentication
POST /api/v1/auth/register- User registrationPOST /api/v1/auth/login- User login
Organizations
POST /api/v1/organizations- Create organizationGET /api/v1/organizations- List user's organizationsPOST /api/v1/organizations/:id/invite- Invite user (Admin)
Scanning
POST /api/v1/scans- Create scan (requires authorization)GET /api/v1/scans- List scansPOST /api/v1/scans/:id/report- Generate report
Compliance
POST /api/v1/scan-authorizations- Submit authorizationPOST /api/v1/scan-authorizations/:id/verify- Approve/reject (Admin)POST /api/v1/emergency/stop- Emergency stop (Owner only)GET /api/v1/audit/export- Export audit logs
Observability
GET /health- Health checkGET /metrics- Prometheus metrics
Full API documentation: API_CONTRACTS.md
- Gateway: 3-20 replicas
- Brain: 2-10 replicas
- Celery Workers: 3-20 replicas
- Auto-scaling: Based on CPU (70%) and memory (80%)
| Component | CPU Request | Memory Request | CPU Limit | Memory Limit |
|---|---|---|---|---|
| Gateway | 100m | 256Mi | 500m | 1Gi |
| Brain | 250m | 512Mi | 1000m | 2Gi |
| Celery Worker | 250m | 512Mi | 1000m | 2Gi |
| PostgreSQL | 250m | 512Mi | 1000m | 2Gi |
# View metrics
kubectl port-forward -n cypersecurity svc/gateway 8080:8080
curl http://localhost:8080/metrics
# View logs
kubectl logs -n cypersecurity deployment/gateway -f- Encryption: TLS 1.3 for all communications
- Row-Level Security: PostgreSQL RLS for data isolation
- Audit Logging: Ed25519 cryptographic signatures
- Secrets Management: Kubernetes Secrets
- SOC 2 Ready: Complete audit trail
- GDPR Compliant: Data isolation and export
- Authorization Workflow: Legal proof of permission
- Emergency Controls: Immediate platform shutdown
- Regular security audits
- Principle of least privilege
- Immutable infrastructure
- Automated vulnerability scanning
- Scan Processing: 1000+ concurrent scans
- API Throughput: 10,000 req/sec
- Auto-scaling: Sub-minute response
- Report Generation: <5s for standard reports
- Architecture - Detailed system design
- Database Schema - Complete data model
- API Contracts - Full API reference
- Deployment Guide - Kubernetes deployment
- Terms of Use - Legal terms
- Responsible Use - Ethics guidelines
We welcome contributions! Please see our contributing guidelines.
- Fork the repository
- Create a feature branch
- Make your changes
- Submit a pull request
MIT License - see LICENSE for details.
Built with β€οΈ for enterprise security teams
