🐦‍⬛

Corvus Security Agent

The security agent that watches while you work.

19 monitoring modules. LLM-powered threat reasoning. Privacy-first by architecture. Your machine, your data, your control.

$ corvus chat "what happened on my network while I was sleeping?"
Corvus: Quiet night overall. 342 outbound connections, all from known processes. Two things to note: (1) a new device appeared on your network at 3:17am — active for 40 minutes then disappeared. (2) A small upload spike at 4:52am from an unidentified process — 12MB over 3 minutes. Both rated LOW. Want me to watch for them?

How Corvus Works

👁

Monitor

19 modules watch your network, files, camera, processes, and more. Corvus detects what's happening on your machine — from ransomware encrypting files to an unknown device joining your Wi-Fi.

🧠

Reason

An LLM brain analyzes every event. Not pattern matching — actual reasoning. Corvus explains threats in plain language: what happened, why it matters, what to do about it.

📈

Learn

A Decision Cache remembers every analysis. By month two, 90%+ of events are handled locally — no cloud calls, no cost, no data sent anywhere. Your agent gets smarter every day.

19 Monitoring Modules

Each module is self-contained, clearly documented, and can be enabled or disabled at any time.

File System Watcher

File

Monitors file changes across your system with ransomware detection

Ransomware Shield

File

Five-layer ransomware detection: catches encryption at 1-3 files, not 50

Wallet File Guard

File

Protects cryptocurrency wallet files from unauthorized access

Network Traffic Monitor

Network

Captures and analyzes all network connections with threat intel matching

ARP Spoofing Detector

Network

Detects ARP poisoning and man-in-the-middle attacks on your local network

DNS Monitor

Network

Catches DGA domains, DNS tunneling, and NXDOMAIN floods

Rogue Device Scanner

Network

Identifies unknown devices appearing on your network

TLS Certificate Checker

Network

Validates TLS certificates — catches expired, self-signed, and MITM

Beaconing Detector

Network

Identifies processes making periodic callbacks to external servers

Bandwidth Anomaly

Network

Learns your normal bandwidth patterns and flags deviations

Camera/Mic Monitor

System

Alerts when apps access your camera or microphone with TCC verification

Process Behavior

System

Code signing verification, parent chain analysis, and baseline tracking

USB Watchdog

System

Detects new USB devices including potential BadUSB attacks

Keylogger Detector

System

Monitors for processes hooking keyboard input APIs

Scheduled Task Auditor

System

Watches for new persistence mechanisms in LaunchAgents, cron, systemd

Screen Capture Detector

System

Detects unauthorized screen recording with sensitive app awareness

Self-Integrity Monitor

System

Verifies Corvus's own files haven't been tampered with

Clipboard Guard

Privacy

Detects clipboard hijacking targeting cryptocurrency addresses

Bluetooth Monitor

Privacy

Identifies unknown Bluetooth devices and pairing attempts

Your Data Never Leaves Your Machine

The LLM reasons about patterns, never content. A strict Data Minimization Layer sits between your events and the AI.

Stays on your machine

process: /Users/you/Downloads/report.app/helper
destination: 185.234.xx.xx:8443
args: --callback https://185.234.xx.xx/beacon
pid: 4521
parent: /Applications/Preview.app

What the LLM sees

process: helper (unsigned)
location: downloads_directory
destination: THREAT_INTEL_MATCH (c2)
pattern: periodic, interval ~52s
severity: HIGH (beaconing + network)

Collective Intelligence

Every Corvus agent contributes to a global threat intelligence network. When your agent detects a malicious IP, it shares the indicator — stripped of all identity — with other agents worldwide. When 10+ agents independently confirm the same threat, every Corvus installation is protected.

0
Accounts required
10+
Agents to corroborate
0
Identity data shared

No profiles. No browsing history. Just anonymous signals in, corroborated warnings out.

Get Started

# From source
$ git clone https://github.com/AnalogMutations/Corvus.git
$ cd corvus && pip install -e .
$ corvus setup
# The setup wizard walks you through module selection,
# LLM provider choice, and SCTN opt-in.
$ corvus run

Open Source. Auditable. Yours.

Every module, every line of the sanitizer, every encryption routine — auditable by anyone. Security through transparency, not obscurity.

View on GitHub