feat(agentic): add Security Threat Intelligence Agent#75
feat(agentic): add Security Threat Intelligence Agent#75RohitSwami33 wants to merge 2 commits intoLamatic:mainfrom
Conversation
- Next.js 14 dashboard with cybersecurity dark UI - GraphQL integration with Lamatic workflow engine - Parallel threat scanning via VirusTotal, AbuseIPDB, and Shodan - LLM-powered threat synthesis with risk scoring - Color-coded risk visualization (CRITICAL/HIGH/MEDIUM/LOW) - Defensive JSON parsing for markdown-wrapped responses - Complete documentation and configuration files Co-authored-by: Qwen-Coder <qwen-coder@alibabacloud.com>
Co-authored-by: Qwen-Coder <qwen-coder@alibabacloud.com>
📝 WalkthroughWalkthroughThis PR introduces a complete Security Threat Intelligence Agent kit with Next.js scaffolding, Tailwind CSS styling, TypeScript configuration, and a Lamatic workflow for parallel IP threat analysis across VirusTotal, AbuseIPDB, and Shodan APIs, including client-side threat report parsing and visualization. Changes
Sequence DiagramsequenceDiagram
participant User
participant Client as React Client<br/>(app/page.tsx)
participant LamaticAPI as Lamatic GraphQL<br/>API
participant ExternalAPIs as External APIs<br/>(VirusTotal, AbuseIPDB, Shodan)
participant LLM as LLM Processor
User->>Client: Submit IP address via form
Client->>LamaticAPI: executeWorkflow(IP, NEXT_PUBLIC_LAMATIC_API_KEY)
LamaticAPI->>ExternalAPIs: Parallel threat queries for IP
ExternalAPIs-->>LamaticAPI: Threat data (malware scores,<br/>abuse reports, host info)
LamaticAPI->>LLM: Process results with system prompt
LLM-->>LamaticAPI: Structured threat_report<br/>(risk_level, risk_score, summary)
LamaticAPI-->>Client: GraphQL response with<br/>nested data.executeWorkflow.result
Client->>Client: Parse JSON result,<br/>validate threat_report
Client-->>User: Render threat analysis card<br/>(risk badge, score bar,<br/>recommended action)
Estimated code review effort🎯 3 (Moderate) | ⏱️ ~25 minutes Possibly related PRs
🚥 Pre-merge checks | ✅ 2 | ❌ 1❌ Failed checks (1 warning)
✅ Passed checks (2 passed)
✏️ Tip: You can configure your own custom pre-merge checks in the settings. ✨ Finishing Touches🧪 Generate unit tests (beta)
Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment Tip CodeRabbit can generate a title for your PR based on the changes with custom instructions.Set the |
There was a problem hiding this comment.
Actionable comments posted: 9
🧹 Nitpick comments (1)
.gitignore (1)
1-33: Consider adding common IDE and editor directories.The
.gitignorefile could be enhanced by adding patterns for common IDEs and editors to prevent developer-specific configurations from being committed.💡 Suggested additions for IDE directories
Add a new section before or after the existing sections:
+# IDEs and editors +.vscode/ +.idea/ +*.swp +*.swo +*~ +.project +.classpath +.c9/ +*.launch +.settings/ + # dependencies
ℹ️ Review info
⚙️ Run configuration
Configuration used: Organization UI
Review profile: CHILL
Plan: Pro
Run ID: 1d09271a-7cdb-427e-a78e-9d33c32062cd
⛔ Files ignored due to path filters (1)
package-lock.jsonis excluded by!**/package-lock.json
📒 Files selected for processing (12)
.env.example.gitignoreREADME.mdapp/globals.cssapp/layout.tsxapp/page.tsxlamatic-config.jsonnext.config.jspackage.jsonpostcss.config.jstailwind.config.tstsconfig.json
amanintech
left a comment
There was a problem hiding this comment.
invalid agentKit contribution
What does this PR do?
Adds a new Security Threat Intelligence Agent to the Agentic kits.
Problem Statement
Security analysts and developers waste valuable time manually checking suspicious IPs or domains across multiple siloed threat intelligence tools (VirusTotal, AbuseIPDB, Shodan).
The Solution
This agent utilizes Lamatic's Flow Builder to execute a Fan-Out architecture.
Features
lamatic-config.jsonincluded in the kit.README.mdwith setup instructions.feat(agentic): add Security Threat Intelligence Agent