⚠️ This application is intentionally vulnerable. It is built for demonstration purposes only. Do not deploy this in production environments.
AegisFlow is a modern, threat-aware CI/CD pipeline built to demonstrate proactive DevSecOps automation. It integrates real-world attacker techniques (via MITRE ATT&CK), threat intelligence (via AlienVault OTX), and full SBOM scanning to detect vulnerabilities before code hits production.
🧪 This project is intentionally vulnerable for educational and testing purposes only.
AegisFlow scans your application for:
- 🔍 Insecure code patterns using Semgrep + MITRE ATT&CK mappings
- 📦 Dependency vulnerabilities using Trivy
- 🧾 Package-level metadata using Syft SBOM
- ☠️ Known malware IOCs using AlienVault OTX
- 🕵️ Simulated dark web targeting (optional)
- 📊 Output summary for security reports and interviews
aegisflow/
├── app/ # Vulnerable Flask app
├── semgrep-rules/ # Custom MITRE-tagged Semgrep rules
├── .github/
│ └── workflows/
│ └── ci.yml # GitHub Actions CI configuration
├── sbom/ # SBOM output via Syft
├── scripts/ # OTX and dark web scan scripts
├── reports/ # Security scan outputs (Semgrep, Trivy, OTX)
├── analysis/ # Python result summarizer script
├── threat_model/ # STRIDE threat analysis and DFD diagram
├── requirements.txt # Frozen Python dependencies
└── README.md # Project documentation
Area | Tool |
---|---|
Static Analysis (SAST) | Semgrep |
Vulnerability Scanning | Trivy |
SBOM Generation | Syft |
Threat Feeds | AlienVault OTX |
Simulated Intel Feed | Dark Web API (mock) |
CI/CD | GitHub Actions |
App Framework | Python + Flask |
-
🔍 Semgrep scans code using custom rules mapped to MITRE techniques:
- e.g.
eval()
→ MITRET1059
(Execution)
- e.g.
-
📦 Syft generates a Software Bill of Materials from your app
-
🧨 Trivy scans installed packages for known CVEs
-
🚨 OTX script checks SBOM hashes against real-world malware indicators
-
🕵️ Dark web simulation checks if the app appears on a watchlist
-
📊 Results are summarized with MITRE references + IOC hits in CI logs
# Clone the repo
git clone https://github.com/Paulinhx/aegisflow.git
cd aegisflow
# Create and activate virtual environment
python3 -m venv venv
source venv/bin/activate
# Install Python requirements
pip install -r requirements.txt
# Run the app (for local test)
python app/main.py
The CI/CD pipeline is triggered on each push to main.
It performs:
✅ Semgrep scan (custom MITRE rules)
✅ SBOM generation via Syft
✅ Trivy CVE scan
✅ IOC enrichment via AlienVault OTX
✅ Dark web lookup (mocked)
✅ Summary output via analysis/summarize.py
📌 Live CI badge:
/eval → Tampering, Code Injection (T1059)
/shell → Execution, Privilege Escalation (T1202)
/pickle → Insecure Deserialization (T1609)
DFD diagram included in threat_model/dfd.png
This repo is ideal for students or junior engineers to learn:
How to write secure code (by reviewing insecure examples)
What TTPs attackers actually use
How DevSecOps integrates with real threat intelligence
How to build and automate a modern security pipeline
This app contains intentional vulnerabilities. Do not deploy it in production. It is for educational and demonstration use only.
Created by Paul D. With support from Open Threat Exchange, Semgrep, Trivy, and the MITRE ATT&CK framework.