multi agent
Browse files
app.py
CHANGED
|
@@ -153,8 +153,8 @@ With the right competitive research, you don’t just react to the market—you
|
|
| 153 |
btn_recommend.click(fn=bestPractice, inputs=in_verbatim, outputs=out_product)
|
| 154 |
|
| 155 |
gr.Markdown("""
|
| 156 |
-
|
| 157 |
-
|
| 158 |
Based on the provided information from both researchers and security experts, we now have a comprehensive guide on understanding and effectively using Dock
|
| 159 |
er containers in modern software development. Here's a summary:
|
| 160 |
|
|
@@ -204,31 +204,31 @@ ts.
|
|
| 204 |
If there are any specific aspects or components you'd like further details on, feel free to ask!
|
| 205 |
|
| 206 |
|
| 207 |
-
|
| 208 |
-
|
| 209 |
-
|
| 210 |
|
| 211 |
-
|
| 212 |
|
| 213 |
-
|
| 214 |
|
| 215 |
-
|
| 216 |
-
|
| 217 |
|
| 218 |
-
|
| 219 |
|
| 220 |
-
|
| 221 |
|
| 222 |
-
|
| 223 |
-
|
| 224 |
-
|
| 225 |
|
| 226 |
-
|
| 227 |
-
|
| 228 |
|
| 229 |
-
|
| 230 |
|
| 231 |
-
|
| 232 |
""")
|
| 233 |
|
| 234 |
with gr.Tab("Graphrag Marketing"):
|
|
|
|
| 153 |
btn_recommend.click(fn=bestPractice, inputs=in_verbatim, outputs=out_product)
|
| 154 |
|
| 155 |
gr.Markdown("""
|
| 156 |
+
Example Output
|
| 157 |
+
=============
|
| 158 |
Based on the provided information from both researchers and security experts, we now have a comprehensive guide on understanding and effectively using Dock
|
| 159 |
er containers in modern software development. Here's a summary:
|
| 160 |
|
|
|
|
| 204 |
If there are any specific aspects or components you'd like further details on, feel free to ask!
|
| 205 |
|
| 206 |
|
| 207 |
+
The faster we build, the higher the risk of introducing vulnerabilities—especially in applications tied to personal banking workflows, where financial fraud can directly impact customer trust.
|
| 208 |
+
=====================
|
| 209 |
+
Yet most security tools today are reactive, slow, and generic—they don't reflect specific infrastructure, threat profile, or code patterns.
|
| 210 |
|
| 211 |
+
So here’s the core question we should be asking:
|
| 212 |
|
| 213 |
+
How can we turn application security from a bottleneck into a competitive advantage—one that provides developers with fast, context-aware, and proactive feedback tailored to unique environment?
|
| 214 |
|
| 215 |
+
### ✅ Reframed Customer Need
|
| 216 |
+
- Developers want actionable feedback during the build process—not after deployment.
|
| 217 |
|
| 218 |
+
- Security teams need to detect and explain vulnerabilities in specific patterns—across containers, APIs, and legacy integrations.
|
| 219 |
|
| 220 |
+
Product & revenue teams need confidence that customer-facing banking apps will not just ship fast—but also protect users and unlock new monetization opportunities.
|
| 221 |
|
| 222 |
+
### 💡 Proposed Solution
|
| 223 |
+
A multi-agent GenAI system trained on RBC’s codebase, policy docs, and threat data—
|
| 224 |
+
that provides real-time, localized security feedback, explains why something’s a risk, and suggests secure-by-default alternatives.
|
| 225 |
|
| 226 |
+
Agents include:
|
| 227 |
+
- Code risk explainer agent: Detects common security flaws (e.g., insecure API calls) and provides context-specific impact analysis.
|
| 228 |
|
| 229 |
+
- Infrastructure policy checker agent: Validates use of containers and deployment patterns against RBC’s internal compliance standards.
|
| 230 |
|
| 231 |
+
- Refactor assistant agent: Suggests how to fix the issue, with references to existing secure modules.
|
| 232 |
""")
|
| 233 |
|
| 234 |
with gr.Tab("Graphrag Marketing"):
|