βββββββ ββββββββββ ββββββββ βββββββ ββββ βββ ββββββββ βββββββββββββββββββββββββββββββββ βββ βββ ββββββββββ βββββββββ βββ βββββββββ βββ βββ βββββββββ βββββββββ βββ βββββββββββββ ββββββββββββββββββββββββββββββββββββββββ ββββββ βββββββ ββββββββββ ββββββββ βββββββ βββ βββββ
Built by Requie Co-Founder at Cogensec β Security infrastructure for intelligent machines
π NVIDIA GTC 2026 Golden Ticket Winner β Recognized in the NVIDIA Developer Contest for breakthrough work in autonomous AI security operations.
Intelligence Gathering β Threat Analysis β CVE Research β IOC Reputation β Policy Generation β Daily Briefing
Gideon is not a script. It is not a scanner. It is an autonomous security operations agent that thinks, plans, and acts β transforming complex threat intelligence questions into step-by-step research missions, executing them against live data sources, checking its own reasoning, and delivering confident, evidence-backed answers.
Where traditional security tools require expert configuration and manual correlation, Gideon operates with goal-directed autonomy: break down the problem, retrieve the data, validate the results, and synthesize a clear picture of the threat landscape.
Built from the ground up for defensive operations β detection, mitigation, and protection. Every response is grounded in real data, every action is auditable, and every output is actionable.
> gideon cve CVE-2024-21887
π Researching CVE-2024-21887...
π‘ Querying NVD API...
π Cross-referencing CISA KEV catalog...
π§ Analyzing exploit chain and affected systems...
π‘οΈ Generating mitigation strategy...
β
CVE-2024-21887 | Ivanti Connect Secure | CVSS 9.1 (Critical)
Command injection in web components β exploited in the wild.
CISA KEV: Yes | Patch Available: Yes
Recommended: Immediate patching + IoC sweep on outbound traffic.
| Capability | Description | Data Source |
|---|---|---|
| π CVE Research | Deep vulnerability analysis with CVSS scoring, patch status, and exploit context | NVD + CISA KEV |
| π IOC Analysis | Reputation checking for IPs, domains, URLs, and file hashes | VirusTotal + AbuseIPDB |
| π§ Neural Search | Semantic deep-web research for obscure advisories and technical write-ups | Exa AI |
| π€ Multi-Model | Unified access to 400+ LLMs from OpenAI, Anthropic, Google, and 50+ providers | OpenRouter |
| π° Daily Briefings | Automated threat intelligence digests with notable incident tracking | Live feeds |
| π‘οΈ Policy Generation | Security hardening checklists for AWS, Azure, GCP, Kubernetes, and Okta | Framework-aligned |
| π MCP Protocol | Extensible tool integration via Model Context Protocol servers | Custom + community |
| β Self-Verification | Cross-source validation with defensive-only safety blocks built in | Internal |
Gideon is purpose-built to leverage NVIDIAβs enterprise AI infrastructure β recognized at NVIDIA GTC 2026 as a leading implementation of the NVIDIA AI stack for security operations.
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β NVIDIA AI STACK β
ββββββββββββββββ¬βββββββββββββββ¬βββββββββββββββ¬βββββββββββββ€
β NIM β Morpheus β PersonaPlex β NeMo β
β GPU-accel β Threat β Voice AI β Guardrails β
β local LLMs β Detection β Ops Mode β & Safety β
ββββββββββββββββ΄βββββββββββββββ΄βββββββββββββββ΄βββββββββββββ
β
βββββββββΌββββββββ
β RAPIDS β
β Accelerated β
β IOC Analysis β
βββββββββββββββββ
| Component | Role in Gideon |
|---|---|
| NIM | GPU-accelerated local LLM inference β run models on-prem with sub-second latency |
| Morpheus | Real-time threat detection pipelines: DFP anomaly detection, DGA analysis, anti-phishing |
| PersonaPlex | Hands-free voice AI for eyes-off security operations |
| RAPIDS | Accelerated data science for batch IOC analysis and large-scale threat correlation |
| NeMo Guardrails | Enterprise-grade AI safety, topic steering, jailbreak detection, and audit logging |
Gideonβs modular Skills architecture extends core capabilities with specialized intelligence modules. Each skill operates as an autonomous sub-agent with its own toolset, state machine, and command vocabulary.
Advanced-mode bug bounty hunting, penetration testing assistance, and CTF operations.
> skills security start bounty # Launch bug bounty research mode
> skills security scope [program] # Define the target scope
> skills security recon [target] # Begin passive reconnaissance
> skills security hunt [vuln-class] # Focus hunt on vulnerability classModes: bounty Β· pentest Β· research Β· ctf
Hands-free security operations β narrate queries, receive spoken threat briefings.
> skills voice speak [text] # Text-to-speech output
> skills voice voice-set [voice-id] # Select voice profile
> skills voice voice-list # List available voices
> skills voice voice-enable # Activate voice mode globallyReal-time behavioral analysis and threat classification using Morpheus AI pipelines.
- DFP (Digital Fingerprinting): Detects anomalous user and entity behavior
- DGA Detection: Identifies domain generation algorithm traffic
- Anti-Phishing: URL and content analysis for phishing indicators
- Ransomware Patterns: Early-stage ransomware behavioral signatures
Enterprise-grade AI safety layer β topic steering, self-correction, and full audit trails.
- Jailbreak Detection: Intercepts adversarial prompt injection attempts on Gideon itself
- Topic Steering: Keeps operations within defined defensive scope
- Self-Correction: Detects and corrects off-target reasoning before output
- Audit Logging: Cryptographically referenced log of every agent action
Comprehensive security sidecar for OpenClaw AI agent deployments.
> skills sentinel openclaw-init # Initialize sentinel monitoring
> skills sentinel openclaw-status # Runtime security status
> skills sentinel openclaw-audit # Full deployment audit
> skills sentinel openclaw-scan-skill [name] # Scan skill for vulnerabilities
> skills sentinel openclaw-scan-injection [content] # Prompt injection analysis
> skills sentinel openclaw-report # Generate security report| Module | Function |
|---|---|
| Gateway Sentinel | Monitors and validates all inbound/outbound agent traffic |
| Skill Scanner | Detects malicious or compromised skills at load time |
| Prompt Injection Defense | Real-time injection detection across all input surfaces |
| Hardening Auditor | Checks deployment configuration against security baselines |
| Credential Guard | Monitors for credential exposure in agent memory and outputs |
| Memory Monitor | Detects context pollution and memory manipulation attacks |
CVE Coverage: CVE-2026-25253 Β· CVE-2026-24763 Β· CVE-2026-25157 Β· CVE-2026-22708 Β· ClawHavoc campaign
Gideon implements a ReAct (Reasoning + Acting) agent loop β plan, act, observe, reflect, repeat β with a modular tool layer and safety guardrails at every transition.
flowchart TD
CLI["π₯οΈ Gideon CLI\nInteractive Shell"] --> Core["βοΈ Agent Core\nReAct Loop"]
Core --> Plan["π§ Task Planning\n& Decomposition"]
Core --> Reflect["π Self-Reflection\n& Validation"]
Core --> Tools["π§ Tools & Skills Layer"]
subgraph INTEL["π‘ Threat Intelligence"]
NVD["NVD + CISA KEV\nCVE Research"]
VT["VirusTotal + AbuseIPDB\nIOC Reputation"]
EXA["Exa AI\nNeural Search"]
TAVILY["Tavily\nWeb Search"]
end
subgraph NVIDIA["π’ NVIDIA AI Stack"]
NIM["NIM\nLocal LLM Inference"]
MORPHEUS["Morpheus\nThreat Pipelines"]
PLEX["PersonaPlex\nVoice AI"]
NEMO["NeMo Guardrails\nSafety Layer"]
RAPIDS["RAPIDS\nData Analytics"]
end
subgraph MODELS["π€ LLM Providers"]
OR["OpenRouter\n400+ Models"]
OAI["OpenAI"]
ANT["Anthropic"]
GGL["Google Gemini"]
OLL["Ollama\nLocal"]
end
subgraph MCP["π MCP Servers"]
MCPS["Custom Tool Servers\nExtensible Protocol"]
end
Tools --> INTEL
Tools --> NVIDIA
Tools --> MODELS
Tools --> MCP
Reflect --> Core
| Requirement | Version | Notes |
|---|---|---|
| Bun | v1.3.6+ | Primary runtime |
| Node.js | v18+ | For MCP server compatibility |
| LLM Provider | Any | OpenAI, Anthropic, Google, OpenRouter, or Ollama |
| Security APIs | Optional | NVD, VirusTotal, AbuseIPDB, Exa AI |
macOS / Linux
curl -fsSL https://bun.com/install | bashWindows
powershell -c "irm bun.sh/install.ps1|iex"# 1. Clone
git clone https://github.com/Cogensec/Gideon.git
cd Gideon
# 2. Install dependencies
bun install
# 3. Configure environment
cp env.example .env
# β Edit .env with your API keys
# 4. Launch
bun startThatβs it. No Docker. No Python environment. No security tools on your host. Just Bun.
All configuration lives in .env and gideon.config.yaml.
| Variable | Provider | Notes |
|---|---|---|
OPENROUTER_API_KEY |
OpenRouter | 400+ models β recommended for multi-model access |
OPENAI_API_KEY |
OpenAI | Direct GPT-4o, o1 access |
ANTHROPIC_API_KEY |
Anthropic | Direct Claude 3.5/3.7 access |
GOOGLE_API_KEY |
Direct Gemini Pro/Flash access | |
OLLAMA_BASE_URL |
Ollama | Local LLM endpoint (default: http://127.0.0.1:11434) |
| Variable | Service | Notes |
|---|---|---|
EXA_API_KEY |
Exa AI | Neural semantic search β deep technical research |
TAVILY_API_KEY |
Tavily | General web search for security intelligence |
NVD_API_KEY |
NIST NVD | CVE database β rate limit without key |
VIRUSTOTAL_API_KEY |
VirusTotal | IOC reputation: files, URLs, IPs, domains |
ABUSEIPDB_API_KEY |
AbuseIPDB | IP reputation and malicious actor tracking |
| Variable | Component | Notes |
|---|---|---|
NVIDIA_API_KEY |
NIM / NVIDIA AI | GPU-accelerated inference |
NIM_BASE_URL |
NIM | Local NIM endpoint |
MORPHEUS_ENDPOINT |
Morpheus | Threat detection pipeline URL |
NEMO_CONFIG_PATH |
NeMo Guardrails | Path to guardrails config |
bun startLaunches the Gideon interactive shell. Type natural language security questions or use command shortcuts.
# Intelligence Operations
gideon brief # Generate daily threat intelligence briefing
gideon cve CVE-2024-21887 # Deep CVE analysis with CVSS + KEV status
gideon ioc 185.220.101.47 # IP reputation check
gideon ioc domain malicious.xyz # Domain reputation check
gideon ioc hash <sha256> # File hash reputation check
gideon search "Ivanti zero day 2024" # Neural semantic search
# Policy & Hardening
gideon policy aws # AWS hardening checklist
gideon policy azure # Azure hardening checklist
gideon policy gcp # GCP hardening checklist
gideon policy k8s # Kubernetes hardening checklist
gideon policy okta # Okta hardening checklist
# Skills & System
skills # Show all enabled skills + commands
skills security start [mode] # Launch security research skill
skills voice voice-enable # Enable voice AI mode
skills sentinel openclaw-init # Initialize OpenClaw SentinelThreat Research
> What are the latest Ivanti vulnerabilities being exploited in the wild?
π Planning research...
βββ Query NVD for Ivanti CVEs (last 90 days)
βββ Cross-reference CISA KEV catalog
βββ Neural search for exploit write-ups and PoC reports
βββ Synthesize threat actor TTPs
[Results: 4 critical CVEs, 2 in CISA KEV, active exploitation by UNC5337...]
IOC Sweep
> Analyze this C2 IP: 45.142.212.100
π Checking VirusTotal reputation...
π¨ Checking AbuseIPDB history...
π‘ Passive DNS resolution...
π Threat actor attribution...
[Result: Known Cobalt Strike C2 β associated with ALPHV ransomware cluster]
Gideon/
βββ src/
β βββ agent/ # Core ReAct agent loop + task planner
β βββ tools/ # CVE, IOC, search, policy tool implementations
β βββ skills/ # Modular skills system
β β βββ security/ # Security research skill
β β βββ voice/ # NVIDIA PersonaPlex voice AI
β β βββ detection/ # NVIDIA Morpheus threat detection
β β βββ governance/ # NeMo guardrails + audit
β β βββ sentinel/ # OpenClaw Sentinel security sidecar
β βββ providers/ # LLM provider adapters (OpenAI, Anthropic, OpenRouter...)
β βββ mcp/ # MCP server integrations
β βββ config/ # Configuration loader + validator
βββ mcp-servers/ # Custom MCP server implementations
βββ docs/ # Extended documentation
βββ gideon.config.yaml # Main configuration
βββ env.example # Environment template
βββ package.json
| Status | Feature |
|---|---|
| β | CVE research (NVD + CISA KEV) |
| β | IOC reputation (VirusTotal + AbuseIPDB) |
| β | Neural semantic search (Exa AI) |
| β | Multi-model support (400+ via OpenRouter) |
| β | Daily briefings |
| β | Security hardening policies |
| β | NVIDIA Morpheus threat detection |
| β | NVIDIA PersonaPlex voice AI |
| β | NeMo Guardrails safety layer |
| β | OpenClaw Sentinel |
| β | MCP protocol support |
| π | ARGUS integration β agent governance layer |
| π | LITMUS integration β AI model security evaluation |
| π | Web UI dashboard |
| π | NVIDIA RAPIDS batch IOC analytics |
| π | Shodan + Censys surface discovery |
| π | Automated MITRE ATT&CK mapping |
| π | SIEM integration (Splunk, Elastic, Sentinel) |
Gideon is designed exclusively for defensive security operations β detection, mitigation, analysis, and protection. The following safety mechanisms are active at all times:
- Query Filtering β Offensive exploitation requests are detected and rejected before execution
- Defensive Prompting β Agent reasoning is anchored to mitigation, patching, and protection outcomes
- Data Redaction β Sensitive values (keys, credentials, PII) are automatically scrubbed from logs and outputs
- NeMo Guardrails β Enterprise-grade topic control, self-correction, and jailbreak interception
- Audit Trail β Every agent action is logged with a traceable, reviewable record
β οΈ Legal Notice: Gideon is intended for authorized security research, defensive operations, and educational use only. Always ensure you have explicit authorization before analyzing any system, IP, or domain that you do not own. Users are solely responsible for compliance with applicable laws.
Contributions are welcome. See <CONTRIBUTING.md> for guidelines.
- Security Vulnerabilities: Do not open public issues. Contact security@cogensec.com directly.
- Feature Requests: Open a Discussion
- Bug Reports: Open an Issue with reproduction steps and environment details
# Development setup
git clone https://github.com/Cogensec/Gideon.git
cd Gideon
bun install
bun run dev # Hot-reload development mode
bun run test # Run test suite
bun run lint # TypeScript + ESLint checksMIT License Β· Built by Cogensec β for defenders, by defenders
Gideon β Your autonomous cybersecurity operations assistant.