A high-performance security data pipeline platform with a built-in real-time rules engine.
Process, enrich, detect, and respond — all in one place, with simple XML-based rules.
If you work in security operations, you probably deal with massive volumes of raw logs and alerts every day. You need to normalize, enrich, correlate, and route them — and ideally detect threats in real time. AgentSmith-HUB is built to handle all of this in a single platform:
- No coding required — Write detection and processing logic in simple, readable XML rules
- Blazing fast — 3.90M messages/sec on just 2 vCPUs (benchmark)
- All-in-one pipeline — Input, detection, enrichment, transformation, and output in a unified flow
- CEP built-in — Detect ordered event sequences, absence patterns, and multi-source correlations over time
- Scale horizontally — Built-in cluster mode with leader/follower architecture
- Rich plugin ecosystem — Threat intel (VirusTotal, ThreatBook, Shodan), GeoIP, encoding, regex, and more
- Modern Web UI — Visual rule editing, project orchestration, real-time testing, and log search
- MCP support — Integrate with AI-powered tools for intelligent rule management
AgentSmith-HUB uses a straightforward pipeline model:
INPUT (Kafka / SLS / ...) → RULESET (detect & transform) → OUTPUT (Kafka / ES / ClickHouse / SLS / ...)
Multiple rulesets can be chained together within a Project, giving you full control over data flow:
The rules engine uses seven intuitive XML elements:
| Element | Purpose | Example |
|---|---|---|
<check> |
Detection — regex, string match, numeric comparison, plugin | <check type="REGEX" field="src_ip">^10\..*</check> |
<checklist> |
Logical combination of checks (AND / OR / NOT) | <checklist condition="a and (b or c)"> |
<threshold> |
Frequency-based detection with time windows | Detect brute-force: 5 failures in 60s |
<sequence> |
CEP — detect ordered event patterns across time | login -> !mfa (login without MFA) |
<append> |
Enrich or modify data fields | <append type="PLUGIN" field="geo">geoMatch(src_ip)</append> |
<del> |
Remove fields from data | <del>sensitive_field</del> |
<plugin> |
Call external APIs or custom logic | Threat intel lookup, enrichment, etc. |
Rules execute in the order you write them, so you can freely combine detection and transformation:
<rule id="enrich_and_detect">
<!-- First, enrich with threat intelligence -->
<append type="PLUGIN" field="threat_info">threatbook(src_ip)</append>
<!-- Then, detect based on enriched data -->
<check type="EQU" field="threat_info.severity">high</check>
<!-- Finally, add metadata -->
<append field="alert_level">critical</append>
</rule>Detect event sequences across time with CEP:
<rule id="login_no_mfa" name="Login without MFA">
<sequence within="2m" group_by="user_id">
<event id="login">
<check type="EQU" field="event_type">login</check>
</event>
<event id="mfa">
<check type="EQU" field="event_type">mfa_verify</check>
</event>
<condition>login -> !mfa</condition>
</sequence>
</rule>AgentSmith-HUB ships with production-ready detection rulesets that you can deploy immediately — no rule-writing required. All rules are mapped to MITRE ATT&CK for seamless integration with your security workflows.
Two rulesets covering 25 detection rules for Kubernetes audit logs, designed with multi-condition correlation and system-controller exclusion to minimize false positives.
k8s_audit_baseline — Workload & RBAC Security Baseline (11 rules)
Detects Kubernetes configurations that violate security best practices at the point of creation or modification.
| Rule | Detection | Severity | MITRE ATT&CK |
|---|---|---|---|
| B001–B003 | Privileged containers — Pod, Deployment, DaemonSet with privileged: true |
HIGH | T1611 Privilege Escalation |
| B004–B005 | Host namespace sharing — hostNetwork / hostPID / hostIPC breaks container isolation |
HIGH | T1611 Privilege Escalation |
| B006, B011 | Container runtime socket mount — docker.sock / containerd.sock enables container escape |
HIGH | T1611 Privilege Escalation |
| B007 | Sensitive hostPath mount — mounting /, /etc, /proc, /sys, /root |
HIGH | T1611 Privilege Escalation |
| B008 | CAP_SYS_ADMIN capability — near-equivalent to full privileged mode | HIGH | T1611 Privilege Escalation |
| B009 | Wildcard ClusterRole — resources: ["*"] or verbs: ["*"] grants unrestricted access |
HIGH | T1098.001 Persistence |
| B010 | cluster-admin binding — any subject bound to cluster-admin = full cluster compromise | HIGH | T1098.001 Persistence |
k8s_audit_intrusion — Active Intrusion Detection (14 rules)
Detects highly suspicious operations that indicate active intrusion, lateral movement, or post-exploitation activity.
| Rule | Detection | Severity | MITRE ATT&CK |
|---|---|---|---|
| I001 | Exec into kube-system pod — non-system user shell access to critical pods | HIGH | T1609 Execution |
| I002 | Cluster-wide secrets enumeration — listing secrets across all namespaces | HIGH | T1552.007 Credential Access |
| I003 | Anonymous RBAC binding — granting roles to system:anonymous |
HIGH | T1098 Persistence |
| I004 | Admission webhook tampering — mutating webhook can intercept all resource creation | HIGH | T1546 Persistence |
| I005 | External workload in kube-system — non-system user deploying to kube-system | HIGH | T1610 Persistence |
| I006 | Validating webhook deletion — disabling OPA/Gatekeeper/Kyverno policy enforcement | HIGH | T1562.001 Defense Evasion |
| I007 | Node proxy access — direct kubelet API access bypassing RBAC | HIGH | T1599 Lateral Movement |
| I008 | User impersonation — assuming another identity via impersonation headers | HIGH | T1134.001 Privilege Escalation |
| I009 | kube-system secret/configmap deletion — disrupting cluster operations | MEDIUM | T1485 Impact |
| I010 | Excessive secret access — 20+ distinct secrets read in 5 min (threshold) | MEDIUM | T1552.007 Credential Access |
| I011 | Exec shell spray — exec into 10+ different pods in 3 min (threshold) | HIGH | T1609 Lateral Movement |
| I012 | Privileged SA token theft — creating tokens for kube-system service accounts | HIGH | T1528 Credential Access |
| I013 | CronJob with reverse shell — bash reverse shells, nc, base64 obfuscation, attack tools | HIGH | T1053.007 Execution |
| I014 | Attack tool / crypto-miner images — kali, metasploit, xmrig, cobaltstrike, etc. | HIGH | T1610 Execution |
Quick start: Import the built-in rulesets from
config/ruleset/(k8s_audit_baseline.xmlandk8s_audit_intrusion.xml), connect your K8s audit log source, and you have production-grade Kubernetes threat detection running in minutes — no tuning needed.
AgentSmith-HUB includes Kubernetes security rulesets out of the box. You can use them directly without writing custom XML first:
config/ruleset/k8s_audit_baseline.xmlconfig/ruleset/k8s_audit_intrusion.xml
Recommended onboarding flow:
- Import both built-in rulesets.
- Route Kubernetes audit logs to these rulesets in your Project.
- Verify detections in test mode with real sample events.
- Tune thresholds (if needed) for your cluster's normal behavior.
More built-in rulesets for additional data sources are on the roadmap. Contributions are welcome!
|
Rule Editing |
Rule Testing |
|
Project Orchestration |
Plugin Testing |
|
Input Connection Check |
Search |
|
Error Logs & Operations History |
MCP Integration |
- Download and extract the release archive to
/opt/agentsmith-hub - Copy the config folder:
cp -r /opt/agentsmith-hub/config /opt/hub_config - Configure Redis in
/opt/hub_config/config.yaml - Start the service:
# Leader mode (default) ./start.sh # Follower mode (uses the same Redis as leader) ./start.sh --follower # See all options ./start.sh --help
- Access token is generated at
/etc/hub/.tokenon first run - Install and configure Nginx:
sudo cp /opt/agentsmith-hub/nginx/nginx.conf /etc/nginx/ sudo nginx -s reload
- Open
http://your-hostin your browser (port 80)
K8s deployment manifests are available in the k8s/ directory.
AgentSmith-HUB is licensed under the Apache License 2.0 with the Commons Clause restriction.
You are free to use, modify, and deploy this software — the restriction only prevents selling the software itself as a commercial product or service. Internal enterprise use is fully permitted.











