Iβve been building a program that started as βI need to stop wasting time on tool output chaosβ and turned into something that feelsβ¦ different.
This is not a scanner. Itβs not a SIEM. Itβs not βAI security.β
Itβs an engine that runs security investigations.
Most security workflows still look like this:
Run tool β stare at output β manually connect dots β rerun different tool β forget what you already tested β repeat
This program tries to turn that into:
Run tool β interpret signals β decide what matters β pick the next action β keep escalating until the lead is either proven or dead
So instead of βhere are 900 findings,β the output is closer to: β’ what was tested β’ why it was tested β’ what changed the investigationβs direction β’ what got confirmed vs ruled out β’ what the next step would be if you kept going
The part that makes this unusual
I hit the wall where security automation always becomes a dumpster fire: scripts calling scripts calling scripts, YAML pipelines that grow teeth, glue code everywhere, no real structure, no replayability.
So I did something that sounds insane:
I built a purpose-built programming language inside it.
Not because I wanted βmy own language,β but because security workflows need a way to be expressed as real programs: repeatable, constrained, auditable, and not dependent on a human remembering the next step.
The language exists for one reason: security automation should not collapse into spaghetti.
What I need help with
Iβm not posting the full repo publicly yet, but I do want real critique from people whoβve built: β’ orchestration engines β’ DSLs / interpreters β’ security automation frameworks β’ pipelines with state, decision-making, and evidence trails
Please let me know if youβre interested in reviewing.