
GoSec is a security automation tool built on the Google Agent Development Kit (ADK) pattern. It wraps standard security scanners like Nmap, Lynis, and Nikto into a single interface, using an AI agent to manage the execution and data aggregation. The core of the project is an agent loop that connects to an LLM provider. When you give it a command like "Check for HIPAA compliance," the agent interprets the request and decides which tools to run. It handles the arguments and execution logic for each tool, so you don't have to manually run scripts or remember CLI flags. Instead of just printing output to the console, GoSec-ADK parses the results from each tool and feeds them into a "Unified Finding Graph." This graph stores everything as nodes (hosts, services) and edges (relationships). This structure allows the system to correlate findings from different sources. For example, if Nmap finds an open port and Lynis reports a configuration issue on that same service, the graph links these two facts together. The system analyzes the graph to find paths from an attacker to critical assets. It looks for chains of vulnerabilities like an exposed service leading to a database and flags them as high-risk paths. Security standards (HIPAA, PCI, etc.) are defined in simple YAML files. The engine reads these profiles to determine which specific checks need to be run to satisfy a requirement. If a vulnerability is found, the tool can generate a fix script based on pre-written YAML templates. These templates include the commands to fix the issue, verify the fix, and rollback if needed. You can save the current state of the graph to a JSON file. This allows you to compare scans over time to see exactly what changed. GoSec-ADK is designed to be a practical wrapper for security tools. It automates the routine work of running scans and parsing output, uses a graph database to make sense of the data, and provides a conversational interface to interact with your security infrastructure
7 Feb 2026