kevinhug commited on
Commit
e79f773
·
1 Parent(s): f1d5962

multi agent

Browse files
Files changed (1) hide show
  1. app.py +18 -18
app.py CHANGED
@@ -153,8 +153,8 @@ With the right competitive research, you don’t just react to the market—you
153
  btn_recommend.click(fn=bestPractice, inputs=in_verbatim, outputs=out_product)
154
 
155
  gr.Markdown("""
156
- Example Output
157
- =============
158
  Based on the provided information from both researchers and security experts, we now have a comprehensive guide on understanding and effectively using Dock
159
  er containers in modern software development. Here's a summary:
160
 
@@ -204,31 +204,31 @@ ts.
204
  If there are any specific aspects or components you'd like further details on, feel free to ask!
205
 
206
 
207
- The faster we build, the higher the risk of introducing vulnerabilities—especially in applications tied to personal banking workflows, where financial fraud can directly impact customer trust.
208
- =====================
209
- Yet most security tools today are reactive, slow, and generic—they don't reflect specific infrastructure, threat profile, or code patterns.
210
 
211
- So here’s the core question we should be asking:
212
 
213
- How can we turn application security from a bottleneck into a competitive advantage—one that provides developers with fast, context-aware, and proactive feedback tailored to unique environment?
214
 
215
- ### ✅ Reframed Customer Need
216
- - Developers want actionable feedback during the build process—not after deployment.
217
 
218
- - Security teams need to detect and explain vulnerabilities in specific patterns—across containers, APIs, and legacy integrations.
219
 
220
- Product & revenue teams need confidence that customer-facing banking apps will not just ship fast—but also protect users and unlock new monetization opportunities.
221
 
222
- ### 💡 Proposed Solution
223
- A multi-agent GenAI system trained on RBC’s codebase, policy docs, and threat data—
224
- that provides real-time, localized security feedback, explains why something’s a risk, and suggests secure-by-default alternatives.
225
 
226
- Agents include:
227
- - Code risk explainer agent: Detects common security flaws (e.g., insecure API calls) and provides context-specific impact analysis.
228
 
229
- - Infrastructure policy checker agent: Validates use of containers and deployment patterns against RBC’s internal compliance standards.
230
 
231
- - Refactor assistant agent: Suggests how to fix the issue, with references to existing secure modules.
232
  """)
233
 
234
  with gr.Tab("Graphrag Marketing"):
 
153
  btn_recommend.click(fn=bestPractice, inputs=in_verbatim, outputs=out_product)
154
 
155
  gr.Markdown("""
156
+ Example Output
157
+ =============
158
  Based on the provided information from both researchers and security experts, we now have a comprehensive guide on understanding and effectively using Dock
159
  er containers in modern software development. Here's a summary:
160
 
 
204
  If there are any specific aspects or components you'd like further details on, feel free to ask!
205
 
206
 
207
+ The faster we build, the higher the risk of introducing vulnerabilities—especially in applications tied to personal banking workflows, where financial fraud can directly impact customer trust.
208
+ =====================
209
+ Yet most security tools today are reactive, slow, and generic—they don't reflect specific infrastructure, threat profile, or code patterns.
210
 
211
+ So here’s the core question we should be asking:
212
 
213
+ How can we turn application security from a bottleneck into a competitive advantage—one that provides developers with fast, context-aware, and proactive feedback tailored to unique environment?
214
 
215
+ ### ✅ Reframed Customer Need
216
+ - Developers want actionable feedback during the build process—not after deployment.
217
 
218
+ - Security teams need to detect and explain vulnerabilities in specific patterns—across containers, APIs, and legacy integrations.
219
 
220
+ Product & revenue teams need confidence that customer-facing banking apps will not just ship fast—but also protect users and unlock new monetization opportunities.
221
 
222
+ ### 💡 Proposed Solution
223
+ A multi-agent GenAI system trained on RBC’s codebase, policy docs, and threat data—
224
+ that provides real-time, localized security feedback, explains why something’s a risk, and suggests secure-by-default alternatives.
225
 
226
+ Agents include:
227
+ - Code risk explainer agent: Detects common security flaws (e.g., insecure API calls) and provides context-specific impact analysis.
228
 
229
+ - Infrastructure policy checker agent: Validates use of containers and deployment patterns against RBC’s internal compliance standards.
230
 
231
+ - Refactor assistant agent: Suggests how to fix the issue, with references to existing secure modules.
232
  """)
233
 
234
  with gr.Tab("Graphrag Marketing"):