AI Agent Examples
Explore practical examples of how DeepTraq's AI agents can help you automate security operations, analyze vulnerabilities, and enhance your security posture. These real-world scenarios demonstrate the power of AI-driven security automation.
Vulnerability Analysis Examples
Example 1: Analyzing Critical CVEs
Question: "Analyze CVE-2024-3094 and tell me if it affects my environment. What's the risk level?"
What the AI does:
- Searches the CVE database for vulnerability details
- Checks your asset inventory for affected software versions
- Evaluates CVSS score and exploitability
- Identifies if public exploits are available
- Provides risk assessment specific to your environment
Sample Response:
CVE-2024-3094 is a critical supply chain vulnerability (CVSS: 10.0) in XZ Utils 
affecting versions 5.6.0 and 5.6.1. 
Environment Impact:
- 3 Linux servers running affected versions detected
- All are internet-facing production systems
- Public exploit code is available
Risk Level: CRITICAL
Recommendation: Immediate patching required. Downgrade to XZ Utils 5.4.x or upgrade 
to 5.6.2+ within 24 hours.
Example 2: Prioritizing Vulnerabilities for Patching
Question: "Which 5 vulnerabilities should I patch first this week based on severity, exploitability, and business impact?"
What the AI does:
- Analyzes all detected vulnerabilities
- Considers CVSS scores, exploit availability, and asset criticality
- Evaluates business context (production vs. dev systems)
- Ranks vulnerabilities by actual risk
- Provides actionable patch recommendations
Sample Response:
Top 5 Vulnerabilities to Patch This Week:
1. CVE-2024-1234 - Apache Tomcat RCE (CVSS: 9.8)
   • Affects: 12 production web servers
   • Active exploitation detected in wild
   • Patch: Upgrade to Tomcat 10.1.20
2. CVE-2024-5678 - OpenSSH Authentication Bypass (CVSS: 9.1)
   • Affects: 45 servers with public SSH access
   • PoC exploit publicly available
   • Patch: OpenSSH 9.7p1
3. CVE-2023-9999 - PostgreSQL SQL Injection (CVSS: 8.5)
   • Affects: 5 database servers with customer data
   • Associated with ransomware campaigns
   • Patch: PostgreSQL 15.6
4. CVE-2024-4321 - NGINX Buffer Overflow (CVSS: 8.2)
   • Affects: 8 load balancers
   • Exploit difficulty: Medium
   • Patch: NGINX 1.25.4
5. CVE-2024-8765 - Redis Unauthorized Access (CVSS: 7.8)
   • Affects: 3 cache servers
   • Default configuration vulnerability
   • Fix: Enable authentication + update to 7.2.4
Example 3: Understanding Complex Vulnerabilities
Question: "Explain CVE-2024-21626 (Leaky Vessels) in simple terms. How does it work and why is it dangerous?"
Example 4: Vulnerability Trend Analysis
Question: "Show me the trend of vulnerabilities over the last 6 months. Are we getting better or worse?"
Threat Intelligence Examples
Example 5: Checking for Active Exploits
Question: "Do any of my critical vulnerabilities have active exploits being used by threat actors right now?"
What the AI does:
- Cross-references your vulnerabilities with threat intelligence feeds
- Checks CISA KEV catalog and exploit databases
- Identifies active exploitation campaigns
- Prioritizes based on real-world threat activity
Sample Response:
⚠️ 4 Critical Vulnerabilities with Active Exploitation Detected:
1. CVE-2024-4577 - PHP-CGI RCE
   Status: Active exploitation (Last 48 hours)
   Threat Actor: APT41, Ransomware groups
   Your Exposure: 6 web servers
   Action: IMMEDIATE PATCHING REQUIRED
2. CVE-2023-46604 - Apache ActiveMQ RCE
   Status: Mass exploitation (CISA KEV listed)
   Used by: HelloKitty ransomware
   Your Exposure: 2 message queue servers
   Action: Patch + Network segmentation
3. CVE-2024-1086 - Linux Kernel Privilege Escalation
   Status: Active in APT campaigns
   Seen with: Scattered Spider group
   Your Exposure: 18 Linux servers
   Action: Kernel update to 6.7.1+
4. CVE-2024-3400 - Palo Alto PAN-OS Command Injection
   Status: Widespread exploitation
   Threat: State-sponsored actors
   Your Exposure: 1 firewall device
   Action: Emergency patch + IOC hunting
Recommendation: Prioritize patching these 4 vulnerabilities within 24 hours.
Example 6: Ransomware Risk Assessment
Question: "Which of my vulnerabilities are commonly exploited by ransomware groups? What's my ransomware risk score?"
Example 7: Threat Actor TTPs
Question: "What are the common tactics, techniques, and procedures (TTPs) used to exploit vulnerabilities in my industry?"
Network Security Examples
Example 8: Open Ports Risk Analysis
Question: "What are the most risky open ports in my network and which ones should I close immediately?"
Example 9: Attack Surface Reduction
Question: "How can I reduce my attack surface based on my current security findings?"
Example 10: External Exposure Assessment
Question: "What services are exposed to the internet and which ones shouldn't be?"
Compliance & Reporting Examples
Example 11: Compliance Gap Analysis
Question: "What vulnerabilities are preventing me from meeting PCI-DSS compliance requirements?"
Example 12: Executive Security Summary
Question: "Create an executive summary of my security posture for the board meeting next week."
Example 13: Regulatory Violation Check
Question: "Are there any security issues that could result in GDPR violations or fines?"
Remediation & Patching Examples
Example 14: Patch Deployment Strategy
Question: "What's the safest way to patch my production database servers without causing downtime?"
Example 15: Workaround Recommendations
Question: "I can't patch CVE-2024-1234 immediately. What temporary workarounds can I implement?"
Cloud Security Examples
Example 16: Cloud Misconfigurations
Question: "What are the most critical misconfigurations in my AWS environment?"
Example 17: Container Security
Question: "What vulnerabilities exist in my container images and how can I fix them?"
Code Security Examples
Example 18: Vulnerable Dependencies
Question: "Which third-party libraries in my applications have known vulnerabilities?"
Example 19: Secret Exposure
Question: "Have any API keys, passwords, or secrets been accidentally committed to my repositories?"
Incident Response Examples
Example 20: Incident Prioritization
Question: "I have multiple security alerts. Which ones should I investigate first?"
Getting Started with AI Agents
To use these examples:
- Access the AI Agent from your dashboard or vulnerability cards
- Select an AI model that best fits your query complexity
- Type or select a question from the predefined options
- Review the response and ask follow-up questions for deeper analysis
- Take action based on AI recommendations
Tips for Better Results
- Be specific: Include CVE IDs, asset names, or specific concerns
- Provide context: Share relevant scan results or environment details
- Ask follow-ups: Dig deeper into any response for more information
- Combine queries: Start with broad questions, then narrow down