{"id":403,"date":"2026-05-05T21:33:15","date_gmt":"2026-05-05T21:33:15","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyse201sna\/?page_id=403"},"modified":"2026-05-06T03:04:07","modified_gmt":"2026-05-06T03:04:07","slug":"ai-security-project","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/cyse201sna\/ai-security-project\/","title":{"rendered":"AI Security Project"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"583\" src=\"https:\/\/sites.wp.odu.edu\/cyse201sna\/wp-content\/uploads\/sites\/32141\/2026\/05\/Security-AI-Agent-1024x583.png\" alt=\"\" class=\"wp-image-452\" srcset=\"https:\/\/sites.wp.odu.edu\/cyse201sna\/wp-content\/uploads\/sites\/32141\/2026\/05\/Security-AI-Agent-1024x583.png 1024w, https:\/\/sites.wp.odu.edu\/cyse201sna\/wp-content\/uploads\/sites\/32141\/2026\/05\/Security-AI-Agent-300x171.png 300w, https:\/\/sites.wp.odu.edu\/cyse201sna\/wp-content\/uploads\/sites\/32141\/2026\/05\/Security-AI-Agent-768x437.png 768w, https:\/\/sites.wp.odu.edu\/cyse201sna\/wp-content\/uploads\/sites\/32141\/2026\/05\/Security-AI-Agent-1536x875.png 1536w, https:\/\/sites.wp.odu.edu\/cyse201sna\/wp-content\/uploads\/sites\/32141\/2026\/05\/Security-AI-Agent-2048x1166.png 2048w, https:\/\/sites.wp.odu.edu\/cyse201sna\/wp-content\/uploads\/sites\/32141\/2026\/05\/Security-AI-Agent-527x300.png 527w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>This project is an AI-powered security agent that reviews application code and cloud infrastructure files to automatically detect vulnerabilities, map them to industry standards like CWE and CVSS, and generate fixes that can be applied directly. What makes it different is that the results are validated by real security scanners like Semgrep and Checkov, so the output is not just AI guessing but actually verified.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This project is an AI-powered security agent that reviews application code and cloud infrastructure files to automatically detect vulnerabilities, map them to industry standards like CWE and CVSS, and generate fixes that can be applied directly. What makes it different is that the results are validated by real security scanners like Semgrep and Checkov, so&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/cyse201sna\/ai-security-project\/\">Read More<\/a><\/div>\n","protected":false},"author":25959,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201sna\/wp-json\/wp\/v2\/pages\/403"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201sna\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201sna\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201sna\/wp-json\/wp\/v2\/users\/25959"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201sna\/wp-json\/wp\/v2\/comments?post=403"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/cyse201sna\/wp-json\/wp\/v2\/pages\/403\/revisions"}],"predecessor-version":[{"id":453,"href":"https:\/\/sites.wp.odu.edu\/cyse201sna\/wp-json\/wp\/v2\/pages\/403\/revisions\/453"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201sna\/wp-json\/wp\/v2\/media?parent=403"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}