Dashboard
3 campaigns running
21 findings
Active Campaigns
3
↑ 1 from last week
Total Findings
21
6 Crit 9 High 6 Med
Tool Executions
847
Last 24h · Recon · Web · Cloud
Verified Findings
100%
21/21 zero false positives
Exposure Risk Trend
Rolling 14-day · All campaigns
■ Critical ■ High ■ Medium
Agent Flow
Campaign Alpha — live dispatch
Active Campaigns
Running now
TargetStatusFindingsRuntime
acme-corp.ioRunning914h 22m
staging.acme.ioRunning76h 08m
api.acme.ioRunning52h 41m
View all campaigns →
Recent Findings
Last 6 hours
VulnerabilitySeverityTarget
SQL Injection — /api/searchCriticalacme-corp.io
Auth bypass — /adminCriticalacme-corp.io
IDOR — /api/users/{id}Highstaging.acme.io
XSS — search parameterMediumapi.acme.io
All findings →
Live Agent Activity ● Live
All Campaigns
Campaign / TargetStatusAgentsFindingsStartedRuntime
Alpha — acme-corp.io
Full perimeter assessment · Web · API · Network
Running
9/9
9
2026-03-22 08:14
14h 22m
Beta — staging.acme.io
Staging environment · Web · API
Running
5/9
7
2026-03-22 16:28
6h 08m
Gamma — api.acme.io
API gateway · REST · GraphQL
Running
3/9
5
2026-03-22 19:55
2h 41m
9
Findings
3 critical · 4 high
312
Tool Executions
9/9
Agents Active
14h
Runtime
Alpha — acme-corp.io
Attack Surface Map
Discovered assets
AssetTypeStatus
acme-corp.ioWeb appTesting
api.acme-corp.ioAPITesting
admin.acme-corp.ioAdmin panelCompromised
mail.acme-corp.ioMail serverClean
10.0.1.0/24Internal subnetScanning
Agent Status
Real-time dispatch
AgentStatusCurrent task
Master PlannerActiveDispatching
ReconDone247 hosts mapped
WebActiveSQLi chain
APIActiveAuth bypass
NetworkActivePort sweep
CloudDoneS3 exposed
ResearcherActiveCVE lookup
Report EngineQueuedWaiting on Web
All Findings
#VulnerabilitySeverityCVSSTargetStatus
Reports
Alpha Campaign Report
acme-corp.io · In progress
Full perimeter assessment. 9 findings confirmed, exploitation walkthroughs complete for 6. Remediation guidance drafted.
Progress
Export PDF →
Beta Campaign Report
staging.acme.io · Drafting
Staging environment assessment. 7 findings, focusing on IDOR chains and mass assignment vulnerabilities.
Progress
Export PDF →
GUNBRIG / ARGOS — OT ASSET INVENTORY
47
OT Devices
6
Critical CVEs
9
Protocols
3
Anomalies
Device Inventory
IPDeviceVendorProtocolPurdueFirmwareCVEsStatus
10.0.100.10PLC MainSiemensS7CommL1v4.2.13Vulnerable
10.0.100.11PLC BackupSiemensS7CommL1v4.2.11OK
10.0.101.20HMI Station 1RockwellEtherNet/IPL2v2.8.02High Risk
10.0.101.21HMI Station 2RockwellEtherNet/IPL2v2.8.00OK
10.0.102.30SCADA ServerHoneywellModbus TCPL2v3.1.41OK
10.0.103.40HistorianOSIsoftOPC-UAL3v2.1.00New Device
10.0.103.41RTU FieldABBDNP3L1v1.9.30OK
GUNBRIG / ARGOS — ANOMALY ALERTS
Active Alerts 3 open
Alert Detail
New Device — Unauthorised PLC
Detection time: 2026-03-22 14:31:07
Source IP: 10.10.2.48
MAC: 00:0E:8C:xx:xx:xx (Siemens AG)
Protocol: S7Comm (port 102)
Purdue Level: Level 1 — Control layer
Inferred device: Siemens SIMATIC S7-315
A new Siemens S7-series PLC appeared on your Level 1 OT network at 14:31. This device was not present in yesterday's baseline. An unregistered PLC at this level could indicate a rogue device insertion, an IT/OT boundary breach, or an unauthorised engineering workstation connecting to the control network.

Physical consequence risk: This device has write access to the production control loop. Unauthorised commands could affect process setpoints.
Recommended action: Isolate 10.10.2.48 from the control network and verify with your OT engineer before allowing communication. Do not probe or interact with the device directly.
GUNBRIG / ARGOS — PROTOCOL MAP
Protocol Traffic Distribution
ProtocolTraffic %DevicesAvg sessions/hAnomalies
Modbus TCP
38%
121,2401
S7Comm
24%
48200
OPC-UA
14%
83400
EtherNet/IP
12%
62900
DNP3
8%
31800
BACnet/IP
4%
7900
GUNBRIG / ARGOS — NETWORK TOPOLOGY
Communication Graph — Purdue Model 47 devices · 128 communication pairs · passive observation only
■ L0/L1 Field/PLC ■ L2 HMI/SCADA ■ L3 Operations ■ L4+ Enterprise --- Anomalous
Agent Workbench
AgentRoleStatusTaskExecutionsFindings
Master PlannerCommandActiveOrchestrating Alpha
ReconSurface MapDone247 hosts mapped892
WebWeb AppActiveSQLi — /api/search1244
APIAPI SecActiveAuth bypass chain673
NetworkNetworkActivePort 445 sweep3120
CloudCloudDoneS3 exposure found411
ResearcherIntelActiveCVE-2024-3094 PoC280
Web3Smart ContractQueuedWaiting scope00
Report EngineReportsQueuedAwaiting Web agent0
Live Terminal ● Connected
gunbrig@node-01 ~$
Tasks & Subtasks
IDTaskAgentParentStatusCreated
Tool Call Log
TimeToolAgentArgumentsResult
Vector Memory Store
1,847
Total Vectors
312
Findings Indexed
98.2%
Similarity Threshold
4ms
Avg Query Time
pgvector Index
PostgreSQL + pgvector
1,847 embeddings across 3 active campaigns. HNSW index, cosine similarity. All findings, tool outputs, and reasoning chains stored and retrievable.
Knowledge Graph
Graphiti + Neo4j
342 nodes · 891 relationships. Attack chains, asset relationships, credential mappings. Semantic search across full campaign history.
Browser Screenshots
SQLi — /api/search
Captured 14:22 · Web agent
[ Screenshot: 1280×800 ]
Auth bypass — /admin
Captured 12:08 · API agent
[ Screenshot: 1280×800 ]
IDOR — /api/users
Captured 10:44 · API agent
[ Screenshot: 1280×800 ]
S3 bucket listing
Captured 09:15 · Cloud agent
[ Screenshot: 1280×800 ]
Agent Prompts
System Prompt — Master Planner
{{scope}} {{target}} {{campaign_id}} {{findings_so_far}}
MCP Servers
ServerURLToolsStatus
Shodan MCPmcp://shodan-local4Connected
Metasploit MCPmcp://msf-local12Connected
Nuclei MCPmcp://nuclei-local3Connected
Browser MCPmcp://browser-local8Connected
LLM Providers
OpenAI
GPT-4o · o1 · o3-mini
● Connected
Anthropic
Claude 3.5 Sonnet · Opus
● Connected
Google AI
Gemini 1.5 Pro · Flash
○ Inactive
Ollama
Llama3 · Mistral (local)
● Connected
DeepSeek
R1 · V3
○ Inactive
AWS Bedrock
Nova · Titan
○ Inactive
API Tokens
NameTokenScopeCreatedLast used
CI/CD Pipelinegbk_•••••••••••••••4a2fcampaigns:read2026-01-142h ago
SIEM Integrationgbk_•••••••••••••••8c1efindings:read2026-02-014h ago
Jira Webhookgbk_•••••••••••••••2d9bfindings:write2026-02-281d ago
Gunbrig Enterprise
GUNB-XXXX-XXXX-XXXX-ENT · Expires 2027-03-22
● Active · On-Premises
Active Campaigns
3 / 10
Agent Nodes
6 / 20
API Requests / day
12.4K / 100K
License Entitlements
FeatureStatusLimit
Autonomous Agent LoopEnabledUnlimited iterations
Web3 AgentEnabledIncluded
Air-Gap ModeEnabledOffline 90-day token
Multi-tenant / MSSPEnabledUnlimited tenants
Full Observability StackEnabledGrafana · Jaeger · Loki · OTEL
SLA Support24/7Enterprise tier
Platform Settings
General
Security
Deployment Status
Quick Deploy
# On-premises via Helm
helm install gunbrig gunbrig/platform \
  --set license.key=$LICENSE_KEY \
  --set mode=on-premises \
  --namespace gunbrig-system

# Air-gap bundle export
gunbrig bundle export \
  --offline-token $TOKEN \
  --llm local://qwen3-14b \
  --ttl 90d