The Problem: Manual Vulnerability Assessments at National Scale
India’s Ministry of Defence oversees 50+ mission-critical government web assets — each a potential attack vector for nation-state adversaries. Security teams were drowning in manual vulnerability assessments: fragmented tooling, no centralized reporting, and scan-to-report cycles that took days instead of hours.
With new CVEs emerging daily and Advanced Persistent Threats (APTs) targeting sovereign infrastructure, the existing workflow was dangerously slow. My network intrusion detection research at the University of Florida had already shown that ML could outperform traditional methods — now it was time to apply that at national scale. The government needed a unified, automated cybersecurity orchestration platform that could think faster than the threats it was built to stop.
Why Off-the-Shelf Wasn’t an Option
Commercial vulnerability scanners have three fundamental problems for defense-grade work:
- Data sovereignty — scan results from government assets cannot leave sovereign infrastructure
- Tool fragmentation — each scanner (SQLmap, Nmap, ZAP, Nuclei) operates in isolation with no shared context
- Triage bottleneck — raw scan output is noise until a human analyst classifies, prioritizes, and generates remediation guidance
What the Ministry needed was not another scanner. It needed an orchestration layer — a system that coordinates multiple scanners, auto-triages results using AI, and generates actionable reports in real-time.
The Architecture: Plugin-Based Automation with LLM Triage
I designed Phantom as a modular, plugin-based framework where any new security tool could be integrated without modifying the core engine.
Core Stack
- Django 4.2 + Python 3.11 + ASGI — chosen for battle-tested ORM, admin interface, and async capabilities
- ASGI over WSGI — because in cybersecurity, waiting for synchronous responses is not an option
- LangChain + LangGraph — LLM pipeline for auto-classifying vulnerabilities and generating developer-ready summaries
The 10+ Tool Integration Layer
Each tool runs as an isolated plugin with a standardized output interface:
- SQLmap — SQL injection detection and exploitation
- OWASP ZAP — Dynamic Application Security Testing (DAST)
- Nmap — Network reconnaissance and service fingerprinting
- Nuclei — Template-based vulnerability scanning
- Selenium Wire — Browser-based probes for client-side vulnerabilities
- Wappalyzer — Technology stack fingerprinting
- AMASS — Subdomain enumeration at scale
- Dirsearch — Directory and file brute-forcing
- Ghauri — Advanced SQL injection testing
VM Orchestration Engine
The most complex subsystem: geo-network segmented virtual machine provisioning. The system elastically scales 10+ virtual nodes based on scan workload, distributing jobs across Django/FastAPI microservices with intelligent scheduling via Crontab.
The Results
Some implementation details are classified under India’s Ministry of Defence. The metrics shared here are approved for public disclosure.
The AI Triage Pipeline
The LangChain + LangGraph pipeline was the force multiplier. Raw scan data from 10 tools generates thousands of findings — most are duplicates, false positives, or low-severity noise. The LLM pipeline:
- Deduplicates findings across tools using semantic similarity
- Classifies by CVSS score with contextual metadata
- Generates developer-ready remediation summaries
- Prioritizes based on asset criticality and exploitability
This reduced the security analyst’s triage workload by approximately 90%.
Key Takeaway
Phantom proved that defense-grade cybersecurity can be both automated and intelligent. The modular architecture means new tools can be added in hours, not weeks. The LLM triage means analysts focus on critical threats, not noise. And the VM orchestration means the system scales with the threat landscape.
“The framework now protects 50+ sovereign assets for India’s Ministry of Defence — running 24/7 with zero human intervention for routine scans.
This project was built at INNEFU Labs, a DRDO-affiliated laboratory, under the Ministry of Defence of India. Some implementation details are classified.
Explore More:
- View the Phantom Case Study — full challenge → approach → solution → impact breakdown
- See my Cybersecurity & VAPT services — how I apply these skills for clients
- View my full skill set — AI, cybersecurity, and 16+ other domains
- Read about AI saving lives on Indian highways — another AI + national-scale deployment