Skip to content Skip to footer

Dev Log #2: 32 Enterprise Modules, Unified AI Assistant, and Automated QA

Dev Log #2

32 Enterprise Modules, Unified AI Assistant, and Automated QA

From broken SOCFortress ports to a fully functional 32-page cybersecurity platform — with intelligent auto-detecting chat, enterprise-grade assist mode, and Playwright-driven visual regression testing across every page.

32
Platform Pages

13
Security Connectors

9
Monitored Services

28
Navigation Routes

What We Built This Sprint

This development cycle focused on three pillars: fixing broken copilot modules ported from SOCFortress, unifying the chat experience into a single intelligent assistant, and hardening the assist mode for enterprise reliability. Every change was validated with automated Playwright visual QA across all 32 pages.

Super Agent: AI-Powered Command Center

The Super Agent is the heart of AgentiX Cyber — a full-page conversational AI interface with MCP (Model Context Protocol) integration for real-time access to Wazuh, TheHive, Cortex, Velociraptor, and more. It supports multiple LLM backends including local Ollama models and cloud providers.

super-agent.tsx — /super-agent

AgentiX Super Agent Chat Interface

Full-page Super Agent with MCP tool badges, model selector, and quick action cards for Threat Hunting, Incident Triage, and Security Posture analysis.

Unified Floating Assistant

We merged the separate Chat and Assist modes into a single intelligent assistant that auto-detects user intent. No more manual toggle — type a question and it routes to the AI chat; type a UI command like “Go to SIEM Alerts” and it activates the assist agent to navigate and interact with the platform autonomously.

Auto-Detect Pipeline

User Input

Intent Classifier

Chat (MCP Query)
|
Assist (DOM Agent)

Response / Action

The intent classifier uses regex-based pattern matching to detect navigation, click, type, and scroll intents. Phrases like “go to”, “navigate to”, “click on”, and “show me the” trigger the assist agent, while everything else flows to the Super Agent chat with full MCP tool access.

SOC Operations Modules

The platform now includes 32 fully functional pages organized into logical groups: AI Center, Intelligence, Detection, Investigation, Response, Compliance, and Administration. Here are the highlights.

Command Center

The real-time SOC operations overview with live threat activity charts, active threat feed, cases overview, agent health monitoring, MITRE ATT&CK coverage heatmap, and quick action buttons for common SOC workflows.

command-center.tsx — /command-center

AgentiX Command Center Dashboard

SOC Command Center with 24-hour threat activity graph, active threat feed with real-time updates, and MITRE ATT&CK coverage matrix showing detection across 14 tactics.

Threat Queue & SIEM Alerts

Threat Queue
Threat Queue — Priority-based threat triage with severity columns (Critical, High, Medium, Low), source attribution (Wazuh, TheHive, Graylog), and MITRE technique tags.
SIEM Alerts
SIEM Alerts — Real-time alert ingestion from Wazuh Indexer with export, filtering, and refresh capabilities. Gracefully handles connectivity timeouts.

Security Integrations

System Health Dashboard
System Health — 9 monitored services (Wazuh, Graylog, TheHive, Cortex, Velociraptor, MISP, Grafana, Database) with response time charts and configurable alert rules.
Security Connectors
Connectors — 13 security tool connectors including Wazuh, Graylog, Velociraptor, InfluxDB, Grafana, VirusTotal, and HAProxy. Each with configure, verify, and connect workflows.

MITRE ATT&CK & Attack Simulation

MITRE ATT&CK Matrix
MITRE ATT&CK — Enterprise framework with Matrix, List, and Coverage views. Tracks tactics, detected techniques, and coverage percentage across the kill chain.
Attack Simulation
Attack Simulation — Atomic Red Team integration with MITRE technique ID input, endpoint selection, and simulation execution. Dual tabs for attack simulation and vulnerability scanning.

Assist Mode: Enterprise-Grade UI Automation

The assist agent can navigate the platform, click buttons, fill forms, and read page content — all autonomously. This sprint brought major reliability improvements:

🔍

SPA-Friendly Navigation

Three-strategy approach: sidebar link click, pushState with popstate, then full reload as last resort. No more unnecessary page refreshes.

🔄

Retry with Fallback

Every action retries up to 3 times with 500ms delays. Element resolution uses a 5-strategy fallback chain from CSS selectors to fuzzy text matching.

📋

Complete Route Map

The LLM now knows all 28 navigation routes. Previously only 13 were documented, causing “page not found” failures for half the platform.

👁

MutationObserver Waits

Replaced fixed sleep delays with reactive MutationObserver-based DOM settle detection. Actions proceed as soon as the page stabilizes, not after arbitrary timeouts.

Assist Action Pipeline

Capture DOM

LLM Analysis

Action Plan

Execute + Retry

Validate Effect

Next Step

Automated Visual QA

Every page is validated using Playwright-driven visual regression testing. The test suite navigates to each of the 32 pages, takes full-page screenshots, and verifies that no page crashes, shows infinite spinners, or displays broken layouts.

Quality gate: TypeScript strict mode with zero errors, Vite build verification, and Playwright screenshot comparison across desktop (1440×900), tablet (768×1024), and mobile (375×812) viewports. All 32 pages pass with no crash states or layout regressions.

Pages Fixed This Sprint

Five SOCFortress copilot modules were broken after porting — displaying infinite loading spinners or crash screens due to missing API integrations. Each was rebuilt with proper error handling and graceful degradation:

  • SIEM Alerts — Rewired to Wazuh Indexer with real API calls, timeout handling, and export functionality
  • Artifacts & Evidence — Rebuilt artifact viewer with proper error states when Wazuh is disconnected
  • Graylog Management — 6-tab interface (Inputs, Streams, Indices, Messages, Alerts, Events) with graceful connection error handling
  • Graylog Metrics — Real-time metrics dashboard with fallback to “connection unavailable” state
  • Graylog Pipelines — Pipeline viewer with proper empty state when no pipelines configured

All 28 Navigation Routes

Platform Navigation Map

Super Agent
Dashboard
Command Center
Threat Queue
SIEM Alerts
Agents List
Agent Groups
Sysmon Config
Detection Rules
CiBRAI Actions
Vuln Overview
SCA Overview
MITRE ATT&CK
Artifacts
Log Search
Cases
Reports
Attack Simulation
Connectors
Graylog Mgmt
Graylog Metrics
Graylog Pipelines
Incident Sources
Customers
Healthcheck
Sigma Rules
Activity Logs
Admin Panel

Next: Live MCP Tool Execution

The next sprint focuses on connecting live Wazuh, Graylog, and TheHive instances to populate dashboards with real security data, and enabling the Super Agent to execute MCP tools in production workflows.

Leave a comment

0.0/5