An auditable AI SOC.
Agent prompts, tool calls, and decisions are recorded in an investigation ledger and replayable per case. The substrate underneath is gated by a 200-incident eval harness that runs on every PR targeting main / develop. MIT-licensed and self-hostable.
Demo opens on a pre-seeded investigation. No signup. Resets daily.
- Agent decisions
- Ledger
- Eval harness
- 200 cases
- License
- MIT
prompt + tool + rationale per step
runs in CI on every PR to main / develop
audit, fork, self-host
Detected lateral movement on SRV-FIN-04 → DC-01. Linked to T1021.002. Recommend isolating host and revoking session tokens.
What is in the box
Ingest, detection, analysis and response are separate services that can be inspected, extended and run in your own environment.
Streaming correlation
Events flow through Kafka into rule- and ML-based detectors. Latency depends on deployment size; on the demo stack alerts typically surface in well under a second.
Agent-assisted triage
The copilot enriches alerts with threat intel, identity context and host telemetry, and records the prompts and rationale behind each decision.
MITRE ATT&CK mapping
Detection rules, alerts and the coverage heatmap reference ATT&CK techniques, so coverage gaps show up alongside live activity.
Attack graph
A graph view links identities, hosts and assets, with pivots into the hunter and case views.
Detection-as-code
Sigma, KQL, EQL and YAML rules can be authored in the inline editor, tested against historical data and version-controlled in Git.
Pluggable connectors
A connector framework handles ingest, schema mapping and rate limits for cloud trails, EDR, identity, network and SaaS sources.
Pipeline overview
Each stage is a separate service with its own container image and interface, so individual components can be swapped or replaced.
- Cloud trails
- EDR
- Identity
- Network
- SaaS APIs
- Custom
- Kafka topics
- Connector framework
- Schema normalisation
- Sigma / KQL / EQL
- ML correlator
- Threat intel
- Identity graph
- Agentic copilot
- Attack graph
- MITRE mapper
- Case builder
- Playbooks
- Connector actions
- Webhooks
- Audit trail
Coverage by tactic
Detection rules and alerts reference ATT&CK techniques, and the console renders a live heatmap from the deployed rule set. The tiles below are illustrative; numbers depend on which detection packs you enable.
Built in the open.
AiSOC is a single-edition open-source project. There are no separate “community” and “enterprise” builds, no runtime fees and no per-seat licensing.
$ git clone https://github.com/beenuar/AiSOC $ cd aisoc && make up $ pnpm seed:demo › Console ready at http://localhost:3000
MIT licensed
Use it, fork it, build services around it. No CLA, no telemetry, no calls home.
Self-hosted by default
docker compose up runs the full stack on your own hardware. Managed hosting is optional.
Auditable end to end
Detections, agent decisions and connector actions are logged with inputs, prompts and rationale.
Community-maintained
Maintained in the open by SOC analysts, detection engineers and contributors. Security disclosures are handled via SECURITY.md.