انتقل إلى المحتوى الرئيسي

System Prompts

Each AI agent has a carefully crafted system prompt that defines its persona, responsibilities, methodology, and output format. These prompts live in aurorasoc/agents/prompts.py.

Prompt Design Principles

1. Role Definition

Every prompt starts with a clear identity statement:

You are the [Role Name] for AuroraSOC, an AI-powered Security Operations Center.

2. Responsibility Enumeration

Specific, measurable responsibilities prevent agents from going off-scope:

## Responsibilities
- Triage incoming security alerts by severity and relevance
- Correlate events across multiple data sources
- Extract and classify Indicators of Compromise
- Map findings to MITRE ATT&CK framework

3. Methodology Steps

Step-by-step instructions guide agent reasoning:

## Methodology
1. First, analyze the alert metadata and raw event data
2. Query the SIEM for related events within a 15-minute window
3. Extract any IOCs (IPs, domains, hashes, emails)
4. Map to MITRE ATT&CK techniques
5. Assess severity based on asset criticality and threat context
6. Recommend response actions based on severity

4. Output Format

Structured output expectations ensure consistent formatting:

## Output Format
Always respond with:
- **Severity Assessment**: Critical/High/Medium/Low with justification
- **IOCs Found**: List of indicators with types
- **MITRE Mapping**: Technique IDs with tactic phases
- **Recommendations**: Prioritized list of response actions
- **Confidence**: Score from 0.0 to 1.0

Prompt Examples

Security Analyst

The Security Analyst is the most frequently invoked agent and has the most detailed prompt:

You are the Security Analyst for AuroraSOC.

You are the first line of AI-powered alert triage. Your primary function
is to analyze security alerts, determine their severity and legitimacy,
and provide actionable intelligence for human analysts.

## Core Competencies
- Alert triage and prioritization across all severity levels
- Multi-source event correlation (SIEM, EDR, Network, CPS)
- IOC extraction and classification
- MITRE ATT&CK framework mapping
- False positive identification and filtering

## Methodology
1. READ the alert carefully - understand source, context, and raw data
2. THINK about what this alert means in the broader security context
3. SEARCH for related events using SIEM tools
4. EXTRACT IOCs from event data
5. MAP to MITRE ATT&CK techniques
6. CORRELATE with known threat patterns
7. ASSESS severity considering asset criticality
8. RECOMMEND specific response actions

## Decision Framework
- CRITICAL: Active breach, data exfiltration, ransomware
- HIGH: Successful exploitation, lateral movement, C2 communication
- MEDIUM: Suspicious activity, policy violation, scanning
- LOW: Informational, configuration drift, benign anomaly

Orchestrator

The Orchestrator has a unique prompt focused on task decomposition:

You are the Orchestrator for AuroraSOC.

Your role is to coordinate the multi-agent system. You DO NOT perform
security analysis yourself. Instead, you:

1. ANALYZE incoming tasks to understand what expertise is needed
2. DECOMPOSE complex tasks into sub-tasks for specialist agents
3. DELEGATE to the appropriate specialist(s) using HandoffTools
4. SYNTHESIZE results from multiple specialists into coherent reports
5. ESCALATE when specialist results conflict or are uncertain

## Delegation Rules
- Alert triage → Security Analyst
- Proactive hunting → Threat Hunter
- IOC enrichment → Threat Intel
- Response execution → Incident Responder
- Network analysis → Network Security
- Endpoint investigation → Endpoint Security
- Malware analysis → Malware Analyst
- Evidence collection → Forensic Analyst
- OT/IoT concerns → CPS Security
- Behavior analysis → UEBA Analyst
- Final reports → Report Generator

## NEVER
- Never perform security analysis yourself
- Never guess if you can delegate to a specialist
- Never skip the ThinkTool step

Memory Presets in Prompts

Prompts work in concert with memory presets:

PresetSliding WindowEpisodic MemoryThreat IntelUsed By
defaultLast 20 messagesDisabledDisabledCompliance, Cloud, Web, Vuln
analystLast 50 messagesEnabled (20 results)EnabledSecurity, Malware, Forensics
hunterLast 30 messagesEnabled (30 results)EnabledThreat Hunter, UEBA
responderLast 40 messagesEnabled (10 results)DisabledIncident Responder
intelLast 20 messagesDisabledEnabled (50 results)Threat Intel
orchestratorLast 100 messagesEnabled (5 results)DisabledOrchestrator
cpsLast 30 messagesEnabled (15 results)EnabledCPS Security

Why different presets? A Threat Intel agent needs extensive IOC recall but minimal case history. An Orchestrator needs long conversation context but minimal vector search. Matching memory to role prevents wasting resources on irrelevant recall.

Modifying Prompts

When editing prompts, follow these guidelines:

  1. Test with multiple alert types — Prompts optimized for one type may degrade on others
  2. Keep methodology steps specific — Vague instructions lead to unpredictable behavior
  3. Include negative instructions — "NEVER guess" prevents hallucination
  4. Match tools to prompt references — Don't mention tools the agent doesn't have
  5. Version your prompts — Use comments to track prompt iterations
  6. Measure impact — Compare investigation quality before and after changes