Introducing Neo, an AI security engineer for complex security tasks
嗯,用户让我总结一下这篇文章的内容,控制在一百个字以内,而且不需要用“文章内容总结”这样的开头。首先,我得通读整篇文章,抓住主要信息。 文章讲的是一个叫做Neo的云基AI安全工程师,它能和团队一起工作,处理实际的安全任务。它能持续学习系统和流程,随着时间推移不断改进。Neo是一个框架,不是黑箱,结合了大语言模型的推理能力和专门的执行工具、隔离沙盒、内存层等。用户可以看到它在做什么,控制它的访问权限,并调整它的行为。 然后文章提到Neo在最近的评估中独立完成了L5级安全工程师的案例研究,并通过了测试。它能够从理解环境到解决问题提出修复计划。Neo目前有限制地发布给企业安全团队使用。 用户的需求是用中文总结,控制在100字以内。所以我要提炼出关键点:Neo的功能、架构、能力以及目标用户。 可能的结构是:介绍Neo是什么,它的功能和架构特点,以及它的应用场景和目标用户。 比如:“Neo是一款云基AI安全工程师工具,能与团队协作处理真实安全任务。其框架设计结合大语言模型与专用工具,在企业环境中学习并优化流程。适用于需高效处理复杂安全工作的大型组织。” 这样控制在100字左右,并且直接描述内容。 </think> Neo是一款云基AI安全工程师工具,能与团队协作处理真实安全任务。其框架设计结合大语言模型与专用工具,在企业环境中学习并优化流程。适用于需高效处理复杂安全工作的大型组织。 2025-12-3 00:15:35 Author: projectdiscovery.io(查看原文) 阅读量:1 收藏

Neo is a cloud-based AI security engineer that works alongside your team and takes on real security tasks like a true co-engineer. As it operates, it continuously learns your systems and processes, improving over time just like an engineer ramping up on your team.

Neo is built as a framework, not as a black box. It combines the reasoning of large language models with purpose-built execution tools, isolated sandboxes, a memory layer that learns your code, architecture and naming, and deep integrations into your organization. You can see what it is doing, control what it can touch, and tune how it behaves.

In a recent evaluation, Neo independently completed an L5 principal security engineer interview case study and passed. It handled the full scenario end-to-end: understanding the environment, investigating and prioritizing issues, and proposing a complete remediation plan. That is the bar we are building for.

Neo is launching in limited availability for enterprise security engineering teams that have hit the limits of generic LLM tools and are ready for a production-ready system deployed within their own environment.

Why Neo and why now

When we first started experimenting in this space, it was natural to reach for code assistants like Claude Code or Cursor. However, coding assistants are built for short coding loops: one developer, one file, and a 5–15 minute task like “fix this bug.” They assume a small, focused context and a clear end.

Security workflows are the opposite. They involve a large volume of long-running tasks (like triaging findings, investigating incidents, and testing new features) that often run in parallel, span many systems, and need to be paused and resumed without losing state.

When teams try to force tools like Claude Code into these workflows, they get a glimpse of what’s possible, but they hit limits quickly. Agents lose context, can’t run long enough, and experiments never turn into reliable, repeatable programs.

Neo exists to solve that. It’s designed for security workloads from the ground up with the infrastructure, context, and memory needed for long-lived tasks, plus built-in tools for real security work across terminals, networks, APIs, and browsers. Neo also supports fully automated background execution. Tasks can be auto-triggered by events like new findings, changes in code, deployments, or scheduled checks, so work kicks off the moment something happens (and not when someone remembers to run it.)

What enterprise security teams are already doing with Neo

Vulnerability backlog triage and closure

  • Today: Tickets stream in from scanners, bug bounty reports and pen tests, leaving engineers to spend hours manually deduplicating, reproducing, and tracking down owners.
  • With Neo: Findings are automatically pulled from your trackers then clustered and prioritized with your asset and business context. Neo then reproduces issues in an isolated sandbox, captures evidence, drafts remediation steps, and updates tickets until issues are verified closed so engineers focus on decisions instead of mechanical triage.

Pre-release feature reviews and targeted testing

  • Today: Security wants to review and test every important feature before it ships, but reviews are shallow - or skipped entirely - because the team can’t keep up with the pace of change.
  • With Neo: Point it at a feature through your design docs, PRs, diagrams, and staging endpoints. Neo automatically builds a threat model, creates a test plan, runs targeted checks against the right services and APIs, and files concrete, reproducible findings complete with regression tests for every release.

Continuous compliance and audit preparation

  • Today: Security engineers maintain spreadsheets and checklists for SOC 2, ISO, and internal policies, then scramble in the weeks before an audit to collect fresh evidence and prove controls are in place.
  • With Neo: Controls and frameworks are mapped to your systems and evidence sources. Neo runs periodic checks, collects and normalizes evidence into auditor-ready files, and flags gaps or drift early, turning audits from fire drills into predictable, routine workflows.

These are starting points, not limits. The most interesting workflows we have seen are specific to each team’s stack and process.

How Neo actually works

At a high level, a Neo workflow looks like this:

  1. You describe an objective, for example, “review our current compliance progress and verify evidences,” or “review this feature before launch”.
  2. Neo gathers the right context from your tools, Memory, and Files and designs a multi-step plan with the appropriate agents and tools.
  3. Agents execute in sandboxes, running commands, hitting APIs, and driving browsers through tightly scoped connections while streaming logs in real time.
  4. Artifacts such as results, traces, screenshots, and reports are saved to Files for reuse, and Memory is updated so the next workflow starts smarter instead of from zero.

Under the hood, all of this is powered by a small set of primitives you can think of as engineering building blocks.

Custom agents

Agents are specialists for end-to-end security workflows. At runtime, Neo can assemble a task-specific agent using your knowledge base and external research, tuned to a repo’s tech stack, business context, and product logic. Each agent bundles how it thinks (policies and prompt), what it can do (tools and connections), and what it knows (pinned knowledge), and it can self-update as it executes.

Memory

Memory is how Neo builds and maintains a working understanding of your environment. It learns your services, naming conventions, architecture, and business context so terms like “payments API” or “core auth service” carry the right meaning without you re-explaining them in every task. For a security team, this means consistency and reuse, which is knowledge from triage, feature reviews, and regression campaigns that carry forward into future workflows.

Sandboxes and tools

Sandboxes are the protective execution layer between your infrastructure and agent operations. Each task runs in an isolated environment with the tools and dependencies it needs, with network access, system calls, and resource usage controlled and monitored. Neo ships with a suite of purpose-built tools for dynamic work such as terminal and filesystem access, HTTP clients, DNS and network utilities, API helpers, planning utilities, and headless browser automation. Logs and outputs stream back in real time, and the environment is torn down when the task completes, so Neo can act like a hands-on operator without putting production systems or credentials at risk.

With Neo, you are designing and running systems that automate real parts of your security work and can be versioned, reused, and improved like any other piece of engineering.

Safety, transparency and control

Neo is built to operate inside your security stack, so safety is part of the design, not an afterthought.

  • Isolated execution. Hands-on work happens in cloud-hosted sandboxes, not directly on your production systems. Network and system access are limited and observable, and you decide what the sandboxes can reach.
  • Data stays yours. We do not train or fine tune models on your data. We only use providers with strict zero retention policies, and any personalization stays isolated to your workspace through Memory and Files.

Every action Neo takes is logged, so you can review what happened, why it did something, and how it reached a result. You stay in the loop. Neo can propose actions, collect evidence and draft changes, and you decide what to integrate, what to automate fully, and where to keep a human in the path.

Availability and who this is for

For this first phase, Neo is in limited release. We are prioritizing security engineering teams at large organizations that:

  • Run a serious security program across multiple services, CI/CD, issue tracking, cloud providers, and existing security tools.
  • Have already experimented with LLMs or code assistants for security and run into limits around consistency, memory, orchestration, and scaling beyond a small pilot.
  • Want to delegate real work to an AI system but need clear safety boundaries, auditability, and control before they can build programs and workflows on top of it.

Neo is priced on usage based on model tokens and the infrastructure required to run your workloads. It supports multiple LLM providers and gives you access to the latest high-performing models out of the box.

What’s next

Neo is built to own real security workflows today. From here, the roadmap is about depth, coverage, and usability so more of your day-to-day security work can be delegated.

Over time, we will explore bringing Neo to the broader ProjectDiscovery community of individuals and small teams.

If you want an AI security engineer that can sit inside your stack, learn your environment, and take on real security work alongside your team, we should talk.


文章来源: https://projectdiscovery.io/blog/introducing-neo
如有侵权请联系:admin#unsafe.sh