An autonomous Cisco security auditor. Tell it an IP. It SSHes in, runs hardening checks, cross-references NIST 800-53 and CIS, looks up live CVEs, and produces the report. No checklists, no scripts.
Network security audits are slow, inconsistent, and gated on the senior engineer who knows where the gotchas live. The good ones take days. The bad ones miss CVEs that have been public for months. Either way, nobody runs them often enough.
Built an MCP server that gives Claude direct, controlled access to a Cisco device — SSH, show commands, even config push.
Loaded NIST 800-53 controls and the CIS IOS XE Benchmark into a ChromaDB vector store, so every finding can cite the exact control it violates.
Wired live CVE lookup against the NIST NVD — the moment Gladius detects an IOS version, it pulls every known CVE with CVSS scores.
Wrapped the whole thing in a FastAPI dashboard with templated HTML reports, an SSE stream, a Slack audit bot, and a separate Slack 'overseer' agent that can read code, restart containers, and commit changes.
Gladius is the tool I've always wanted to hand to a junior on day one — every finding comes with the control it breaks and the command to fix it.
A multi-tab SSH terminal with an AI sidekick that watches your session and suggests the right command before you Alt-Tab…
A streaming chat UI for Cisco's DevNet Content Search MCP. Ask anything about Meraki or Catalyst Center APIs and get a t…
A continuous-model platform: snapshots the whole network with pyATS, runs tiered AI agents over it (Ollama → Haiku → Son…