Skip to main content

AI Agents — The Current Runtime Reference

AuroraSOC currently runs 14 agents total: 1 orchestrator and 13 specialist agents. The live runtime is centered on a shared factory and a generic specialist server, not on one dedicated server.py per agent package.

Current Runtime Layout

  • aurorasoc.agents.factory.AGENT_SPECS is the source of truth for runnable specialist agents, their roles, prompts, and memory templates.
  • aurorasoc.agents.mcp_agent_loader.AGENT_MCP_BINDINGS is the source of truth for which MCP domains each agent may access.
  • aurorasoc.agents.generic_server launches almost every specialist service from environment variables.
  • aurorasoc.agents.orchestrator.server remains a dedicated entry point because it builds A2A handoff tools to the specialist fleet.
  • The subpackages under aurorasoc/agents/* are mostly package markers or migration-compatibility shims. They are not the primary runtime implementation surface.

Example specialist launch:

AGENT_NAME=SecurityAnalyst \
AGENT_PORT=9001 \
AGENT_TAGS=siem,detection \
python -m aurorasoc.agents.generic_server

The generic specialist server accepts these environment variables:

VariableRequiredPurpose
AGENT_NAMEyesAgent key from AGENT_SPECS, for example SecurityAnalyst
AGENT_PORTyesA2A listener port
AGENT_TAGSnoComma-separated discovery tags
AGENT_FACTORY_METHODlegacyBackward-compatibility alias for older create_* naming

How The Fleet Works

  1. The orchestrator receives an investigation request.
  2. It reasons about the task and chooses the right specialists.
  3. It delegates work over A2A handoff tools.
  4. Each specialist loads only the MCP tools authorized for its domain bindings.
  5. The orchestrator synthesizes the results and routes high-risk actions through approval gates.

Runnable Agents

AgentPortMemoryMCP DomainsPrimary Use
Orchestrator9000ORCHESTRATOR_MEMORYsoarInvestigation planning, delegation, synthesis, approval-aware coordination
SecurityAnalyst9001ANALYST_MEMORYsiem, soar, osint, documentAlert triage, IOC extraction, MITRE mapping, compliance-oriented analysis
ThreatHunter9002HUNTER_MEMORYsiem, ueba, osintHypothesis-driven hunting, LOLBin detection, behavioral threat review
MalwareAnalyst9003INTEL_MEMORYmalware, threat_intel, malware_intelMalware family analysis, sandbox review, YARA and behavioral signatures
IncidentResponder9004RESPONDER_MEMORYsoar, edr, network, documentContainment, eradication, recovery, and response playbook execution
NetworkSecurity9005ANALYST_MEMORYnetwork, siem, network_captureNetwork detections, anomalies, exfiltration, and response context
WebSecurity9006ANALYST_MEMORYsiem, network, osintWeb attacks, WAF review, and API abuse analysis
CloudSecurity9007ANALYST_MEMORYsiem, cloud_providerCloud posture, IAM anomalies, and container-oriented security review
CPSSecurity9008RESPONDER_MEMORYcps, network_captureCPS, IoT, OT, attestation, and physical-cyber correlation
ThreatIntel9009INTEL_MEMORYthreat_intel, siem, osint, vuln_intel, documentIOC enrichment, threat feeds, CVE and EPSS prioritization, regulatory correlation
EndpointBehavior9010HUNTER_MEMORYueba, edr, siem, malwareUnified EDR and UEBA analysis, process trees, baselines, insider-risk signals
ForensicAnalyst9012RESPONDER_MEMORYforensics, siem, network_captureEvidence collection, timeline reconstruction, and chain-of-custody workflows
ReportGenerator9015LIGHTWEIGHT_MEMORYsoar, siem, documentExecutive summaries, technical reports, and documentation output
NetworkAnalyzer9016ANALYST_MEMORYnetwork, siem, network_captureRead-only network analysis; explicitly excludes active blocking tools

Historical Consolidations

Older docs, screenshots, or branch history may still mention specialists that are no longer standalone runtime agents:

  • EndpointSecurity and UEBAAnalyst were consolidated into EndpointBehavior.
  • VulnerabilityManager capabilities were folded into ThreatIntel.
  • ComplianceAnalyst responsibilities were absorbed by SecurityAnalyst and ThreatIntel.

The compatibility packages for those names remain in the repository, but they are retained for migration stability rather than active deployment.

Tool Authorization And Safety

  • Tool access is deterministic. Agents only see MCP tools from the domains listed in AGENT_MCP_BINDINGS.
  • generic_server validates the requested agent name before startup.
  • MCP bindings are validated at startup to catch unregistered domains or missing ports.
  • NetworkAnalyzer is the read-only network specialist. It shares network-analysis domains with NetworkSecurity but excludes block_ip.

Memory Profiles

ProfileUsed ByNotes
ANALYST_MEMORYSecurityAnalyst, NetworkSecurity, WebSecurity, CloudSecurity, NetworkAnalyzerAnalyst-oriented working set with episodic recall
HUNTER_MEMORYThreatHunter, EndpointBehaviorOptimized for hunting and behavioral investigations
RESPONDER_MEMORYIncidentResponder, CPSSecurity, ForensicAnalystLarger working context for multi-step response flows
INTEL_MEMORYMalwareAnalyst, ThreatIntelBest fit for enrichment-heavy and context-rich analysis
LIGHTWEIGHT_MEMORYReportGeneratorMinimal footprint for summarization and reporting
ORCHESTRATOR_MEMORYOrchestratorCoordination-focused memory for delegation and synthesis

Adding Or Changing An Agent

  1. Add or update the system prompt in aurorasoc/agents/prompts.py.
  2. Add or change the AgentSpec entry in aurorasoc/agents/factory.py.
  3. Update the MCP domain bindings in aurorasoc/agents/mcp_agent_loader.py.
  4. If the orchestrator should delegate to the agent directly, add it to SPECIALIST_NAMES in aurorasoc/agents/orchestrator/server.py.
  5. Add the deployment wiring in docker-compose.yml or scripts/run_local_agents.py with AGENT_NAME, AGENT_PORT, and AGENT_TAGS.
  6. Use aurorasoc.agents.generic_server unless the agent truly needs custom startup behavior.
  7. Update this page and the contributor reference so the runtime docs stay aligned with the code.

What To Ignore In Older Docs

If you still see any of the following, treat them as historical:

  • claims that AuroraSOC runs 17 agents
  • startup commands that use python -m aurorasoc.agents.<specialist>.server
  • standalone runtime descriptions for EndpointSecurity, UEBAAnalyst, ComplianceAnalyst, or VulnerabilityManager

The current runtime architecture is the 14-agent, factory-driven, generic-server model documented above.