feat: add SecOps Alert Triage Agent for intelligent security alert processing#6182
Open
Samir-atra wants to merge 1 commit intoaden-hive:mainfrom
Open
feat: add SecOps Alert Triage Agent for intelligent security alert processing#6182Samir-atra wants to merge 1 commit intoaden-hive:mainfrom
Samir-atra wants to merge 1 commit intoaden-hive:mainfrom
Conversation
…ocessing Implements a comprehensive SecOps Alert Triage Agent that: - Ingests security alerts from Datadog, Wiz, Snyk, PagerDuty, GitHub, and webhook sources - Normalizes alert schemas into a standard format - Deduplicates and correlates related alerts by asset, time window, and attack pattern - Filters false positives using configurable suppression rules (CI/CD IPs, approved scanners, maintenance windows) - Classifies severity using CVSS scores, asset criticality, blast radius, and exploit likelihood - Enriches alerts with contextual intelligence (service owner, deployments, prior incidents, threat intel) - Requires human acknowledgment for Critical/High alerts before any automated response (HITL) - Generates daily SecOps digests with comprehensive metrics Agent workflow: intake -> dedup -> fp-filter -> severity -> enrichment -> hitl-escalation -> digest Success criteria (measurable): - False positive suppression rate >= 35% - Critical/High escalation accuracy >= 90% - 100% human confirmation for Critical/High alerts - MTTR improvement >= 40% vs manual triage baseline - Automatic daily digest generation Constraints: - Mandatory HITL for Critical/High alerts (hard constraint) - Full audit trail for all triage decisions (hard constraint) - Alert preservation (no deletion, only filtering) (hard constraint) - Rationale logging for false positive determinations (soft constraint) Includes: - Complete agent implementation with 7 nodes and 6 edges - Comprehensive test suite with 20 passing tests - CLI interface (info, validate, shell, tui) - Full documentation and README - Configuration for suppression rules, asset criticality, severity thresholds Resolves aden-hive#5866
PR Requirements WarningThis PR does not meet the contribution requirements. PR Author: @Samir-atra To fix:
Exception: To bypass this requirement, you can:
Micro-fix requirements (must meet ALL):
Why is this required? See #472 for details. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Description
Implements a comprehensive SecOps Alert Triage Agent that intelligently processes security alerts from monitoring tools (Datadog, Wiz, Snyk, PagerDuty, GitHub), correlates related events, suppresses false positives, classifies threats by severity, enriches with contextual intelligence, and escalates to on-call engineers with actionable incident briefs. Addresses the alert fatigue problem faced by security teams (thousands of alerts per day, 40%+ false positives).
Type of Change
Related Issues
Fixes #5866
Changes Made
Agent Architecture
Workflow Pipeline
Success Criteria (Measurable)
Constraints
Configuration
Test Coverage
CLI Interface
info- Display agent informationvalidate- Validate agent structureshell- Interactive CLI sessiontui- Launch TUI (requires textual)Testing
PYTHONPATH=.:core:exports uv run pytest exports/secops_alert_triage_agent/tests/test_structure.py)cd core && ruff check .) - Not applicable (new agent in exports)Checklist
Screenshots (if applicable)
N/A - This is an agent implementation, not a UI change.
Market Validation
Security teams face:
Torq built $20M ARR on this exact problem (no-code/low-code security automation for SecOps). This open-source implementation gives startups, scale-ups, and security-conscious engineering teams access to enterprise-grade alert intelligence.
Technical Details
Input Formats Supported:
Alert Normalization:
Standard schema includes: alert_id, source, timestamp, title, description, severity, affected_asset, indicators (ips, domains, hashes, users), raw_alert
Escalation Format for Critical/High Alerts:
Complete incident brief with executive summary, risk assessment, recommended actions, and contextual information (service owner, deployments, prior incidents, threat intel)