File size: 3,119 Bytes
50cb8a1
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
ae0b7f2
 
 
 
 
 
 
 
 
 
 
50cb8a1
ae0b7f2
50cb8a1
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
ae0b7f2
b1fb527
9cd4e94
 
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
from aeo_ex_generator.aeo_example_generator import ExampleGenerator

import openai
import os
import streamlit as st

import streamlit as st 

st.subheader("This space will autognerate the plans and the personas")

OpenAI_Key = st.text_input(" Please enter your OpenAI key here to continue")
# only continue if the key is given
if OpenAI_Key:
    st.write("Please wait, it will take a while to generate. ")
    os.environ['OPENAI_API_KEY'] = OpenAI_Key
    openai.api_key =os.environ['OPENAI_API_KEY'] 

    

    ex = ExampleGenerator() #declare the instance
    example= """ You are part of a small business called MineralRUs Inc., which is a small, yet critical mining company in New Hampshire specializing in rare earth elements.
    Your main clients are from particular sectors of technology and defense industries, and are considered to be critical infrastructure. Therefore, your business and its operation is essential to the integrity of supply chains enabling those critical infrastructure.
    MineralRUs Inc. maintains paper-based record of their key intellectual property and operational procedures, which are stored in a physical safe. This fact is known by only a select few in the company.
    Your business has a small, unorganized computer network with only generic security infrastructure, and the company does not have the resources to employ an in-house information security team. Instead, a very small team is tasked with maintaining Operational Technology (OT) systems on the network.
    Your company has recently received an advisory from federal authorities, warning businesses in your industry about the rapidly growing threat of cyber espionage by state-sponsored Advanced Persistent Threats (APTs). In response, your company decides to engage an external cybersecurity provider to assist with timely incident response and prevention. The external provider recommends the employment of active adversary engagement plans, and asks you to develop a high-level deception and denial strategy.
    """
    context_prompt_input = st.text_area("Enter your example here:", example,height=500)
    keywords = st.text_area("Enter keywords to keep in the plan","breadcrumbtrail")
    nkeywords= st.text_area("You can pass keywords to exclude from the example generation", "honeypot")
    e = ex.auto_generate(planSize=5, keywords=keywords,nkeywords=nkeywords, contextPrompt= context_prompt_input)  
    # e = ex.auto_generate(contextPrompt=context_prompt_input)
    
    st.subheader("Plan")
    st.write(ex.description) #the description is cached in this variable 
 
    st.subheader('Prefix Namespaces')
    st.write(e['@context']) #here are the prefix namespaces mentioned in the example



    result = [i for i in e['@graph']]
    st.subheader('Full example:')
    try:
        st.json(result)
    except:
        st.text_area("", result, height=400)

    if result:
        st.subheader("Auto generate specific plan")

        st.subheader("Persona based on the existing description provided in the deception plan")
        _ = ex.generate_personas() 
        st.write( ex.persona_descriptions )