<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Jana Stalin</title>
    <description>The latest articles on DEV Community by Jana Stalin (@jana_stalin_337bd1201261b).</description>
    <link>https://dev.to/jana_stalin_337bd1201261b</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3647746%2F16f36c26-fc57-4f25-83da-1df290ebf8ce.png</url>
      <title>DEV Community: Jana Stalin</title>
      <link>https://dev.to/jana_stalin_337bd1201261b</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/jana_stalin_337bd1201261b"/>
    <language>en</language>
    <item>
      <title>CyberGuard: The AI Agent I Built to Fight Digital Scams (My AI Agents Intensive Journey)</title>
      <dc:creator>Jana Stalin</dc:creator>
      <pubDate>Sat, 06 Dec 2025 00:00:30 +0000</pubDate>
      <link>https://dev.to/jana_stalin_337bd1201261b/cyberguard-the-ai-agent-i-built-to-fight-digital-scams-my-ai-agents-intensive-journey-4l99</link>
      <guid>https://dev.to/jana_stalin_337bd1201261b/cyberguard-the-ai-agent-i-built-to-fight-digital-scams-my-ai-agents-intensive-journey-4l99</guid>
      <description>&lt;p&gt;Hey everyone,&lt;br&gt;&lt;br&gt;
I recently completed the Google × Kaggle AI Agents Intensive (5-Day course) — and this experience genuinely changed how I look at AI systems.&lt;/p&gt;

&lt;p&gt;I joined because I kept seeing the term “AI Agents” everywhere, but honestly… I didn’t fully get it.&lt;/p&gt;

&lt;p&gt;Before:&lt;br&gt;
“Agents are basically chatbots with extra steps.”  &lt;/p&gt;

&lt;p&gt;Now:&lt;br&gt;
Agents are systems that can think, plan, take actions, and collaborate with other agents to solve a task.&lt;/p&gt;
&lt;h2&gt;
  
  
  Here’s what I learned and how I built CyberGuard — a cybersecurity-focused AI agent system.
&lt;/h2&gt;
&lt;h2&gt;
  
  
  Day 1 — My Mental Shift
&lt;/h2&gt;

&lt;p&gt;This was the biggest realization:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The LLM is the brain
&lt;/li&gt;
&lt;li&gt;Tools and services are the hands
&lt;/li&gt;
&lt;li&gt;The agent decides how to solve a task using those tools
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;It’s like working with a teammate who can:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Search&lt;/li&gt;
&lt;li&gt;Run models&lt;/li&gt;
&lt;li&gt;Make decisions&lt;/li&gt;
&lt;li&gt;Remember what happened earlier&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;
  
  
  Once that clicked, I knew what I wanted to build.
&lt;/h2&gt;
&lt;h2&gt;
  
  
  The Problem I Wanted to Solve
&lt;/h2&gt;

&lt;p&gt;Today, anyone can be tricked by:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Fake password reset emails&lt;/li&gt;
&lt;li&gt;Apps that request dangerous permissions&lt;/li&gt;
&lt;li&gt;Links pretending to be legitimate websites
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Real attackers combine these:&lt;br&gt;
Email scam leads to installing a malicious app → total account access.&lt;/p&gt;

&lt;p&gt;Traditional security tools usually detect only one of these at a time.  &lt;/p&gt;
&lt;h2&gt;
  
  
  That gap scared me enough to build something meaningful.
&lt;/h2&gt;
&lt;h2&gt;
  
  
  Introducing CyberGuard
&lt;/h2&gt;

&lt;p&gt;A multi-agent system that examines:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Component&lt;/th&gt;
&lt;th&gt;Role&lt;/th&gt;
&lt;th&gt;Detection Scope&lt;/th&gt;
&lt;th&gt;Logic / Mechanism&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Email Agent&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Phishing Analyzer&lt;/td&gt;
&lt;td&gt;
&lt;strong&gt;Content &amp;amp; Links:&lt;/strong&gt; Scans email bodies, sender metadata, and embedded URLs.&lt;/td&gt;
&lt;td&gt;Analyzes semantic patterns for social engineering cues and cross-references URLs with reputation blacklists to identify phishing vectors.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Android Agent&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Malware Scanner&lt;/td&gt;
&lt;td&gt;
&lt;strong&gt;Permissions &amp;amp; Runtime:&lt;/strong&gt; Inspects application behavior and access rights.&lt;/td&gt;
&lt;td&gt;Evaluates &lt;code&gt;AndroidManifest.xml&lt;/code&gt; for over-privileged requests (e.g., SMS/Contact access) that indicate potential malware or spyware behavior.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Root Agent&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Risk Orchestrator&lt;/td&gt;
&lt;td&gt;
&lt;strong&gt;Decision Engine:&lt;/strong&gt; Aggregates and correlates signals.&lt;/td&gt;
&lt;td&gt;Synthesizes alerts from worker agents to determine a &lt;strong&gt;Combined Risk&lt;/strong&gt; severity level, reducing false positives through cross-validation.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;It returns a clear verdict:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;SAFE&lt;/li&gt;
&lt;li&gt;HIGH RISK&lt;/li&gt;
&lt;li&gt;CRITICAL (extreme danger)&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;
  
  
  With an explanation someone can actually understand.
&lt;/h2&gt;
&lt;h2&gt;
  
  
  How I Built It (Simplified)
&lt;/h2&gt;
&lt;h3&gt;
  
  
  Phishing Detection Model
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;TF-IDF analysis + URL heuristic feature&lt;/li&gt;
&lt;li&gt;Logistic Regression&lt;/li&gt;
&lt;li&gt;Test performance: F1 Score ≈ 0.96&lt;/li&gt;
&lt;li&gt;Served via FastAPI on port 8001&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;
  
  
  Malware Behavior Model
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Random Forest Classifier on Android permission sets&lt;/li&gt;
&lt;li&gt;Test performance: F1 Score ≈ 0.95&lt;/li&gt;
&lt;li&gt;Served via FastAPI on port 8002&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Both connect to a Root Agent running Gemini through the Agent Development Kit (ADK).&lt;/p&gt;

&lt;p&gt;The Root Agent:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Calls models only when necessary&lt;/li&gt;
&lt;li&gt;Correlates results from both services&lt;/li&gt;
&lt;li&gt;Generates a Markdown “Security Audit” report with recommended actions&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Example (shortened):&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Severity: HIGH RISK  
Reason: Suspicious link in email + risky app permissions  
Recommendation: Delete the email and uninstall the app  
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;






&lt;h2&gt;
  
  
  Testing the Full System
&lt;/h2&gt;

&lt;p&gt;I tested four scenarios:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Scenario&lt;/th&gt;
&lt;th&gt;Expected&lt;/th&gt;
&lt;th&gt;Result&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Normal email + safe app&lt;/td&gt;
&lt;td&gt;Safe&lt;/td&gt;
&lt;td&gt;Safe&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Phishing email only&lt;/td&gt;
&lt;td&gt;High&lt;/td&gt;
&lt;td&gt;High&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Malware-like app only&lt;/td&gt;
&lt;td&gt;High&lt;/td&gt;
&lt;td&gt;High&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Combination attack&lt;/td&gt;
&lt;td&gt;Critical&lt;/td&gt;
&lt;td&gt;Critical&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;Everything worked end-to-end.  &lt;/p&gt;

&lt;h2&gt;
  
  
  It finally felt like a product, not just a notebook.
&lt;/h2&gt;

&lt;h2&gt;
  
  
  Challenges I Faced
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Making different microservices communicate reliably&lt;/li&gt;
&lt;li&gt;Debugging agents when their reasoning drifted&lt;/li&gt;
&lt;li&gt;Matching permissions properly across datasets&lt;/li&gt;
&lt;li&gt;Styling the UI took longer than expected&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  But every time a correct “CRITICAL” verdict appeared, it reminded me why I built this.
&lt;/h2&gt;

&lt;h2&gt;
  
  
  What’s Next
&lt;/h2&gt;

&lt;p&gt;I’d like to:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Improve permission datasets for real Android apps&lt;/li&gt;
&lt;li&gt;Integrate live threat-intelligence sources&lt;/li&gt;
&lt;li&gt;Add browser extension to catch phishing instantly&lt;/li&gt;
&lt;li&gt;Strengthen prompt security (agent safety is a real concern)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  The system works, but there’s so much room to grow.
&lt;/h2&gt;

&lt;h2&gt;
  
  
  Final Thoughts
&lt;/h2&gt;

&lt;p&gt;I started this course thinking that AI agents were too advanced or complex for me.&lt;br&gt;&lt;br&gt;
By Day 5, I had created a working cybersecurity assistant.&lt;/p&gt;

&lt;p&gt;This wasn’t just about learning — it made me feel capable of building real, impactful AI systems.&lt;/p&gt;

&lt;p&gt;If you’re curious about AI beyond chatbots:&lt;br&gt;&lt;br&gt;
Try building an agent.&lt;br&gt;&lt;br&gt;
It changes how you think.&lt;/p&gt;

&lt;p&gt;Thank you for reading.&lt;br&gt;&lt;br&gt;
Happy to share the project or answer questions anytime.&lt;/p&gt;

</description>
      <category>googleaichallenge</category>
      <category>ai</category>
      <category>agents</category>
      <category>devchallenge</category>
    </item>
  </channel>
</rss>
