Version: 1.0.0-beta
Author: Sunil Gentyala, Lead Cybersecurity and AI Security Consultant, HCLTech
Contact: sunil.gentyala@ieee.org | gentyalas@hcltech.com
License: See LICENSE
The Gentyala-Sovereign Hunt (GSH) Framework is an open-source research artifact for autonomous agentic AI threat hunting. It provides structured detection playbooks, behavioral baselining logic, and a policy-driven enforcement engine (Sovereign Sentinel) designed to defend the cognitive cyber domain — the operational layer where large language models, autonomous agents, and multi-agent pipelines interact with enterprise infrastructure.
GSH addresses a fundamental gap in the current security tooling landscape: existing endpoint and network detection frameworks were not designed for the threat surface introduced by agentic AI systems. The framework maps all detection signals to MITRE ATLAS and NIST CSF 2.0, providing practitioner-ready coverage for the threats that matter most in AI-enabled enterprise environments.
| Component | Description |
|---|---|
| Sovereign Sentinel | Policy-driven behavioral enforcement agent deployed alongside LLM gateways |
| Hunt Playbooks | Structured threat detection playbooks (see /playbooks/) |
| DDI-AI Fusion | DNS/DHCP/IPAM telemetry layer with AI-agent-aware baselining |
| Zero-Trust Logic Validation (ZTLV) Gate | Per-invocation tool call authorization engine |
| Behavioral Baseline Engine | Continuous model output drift detection and probe evaluation pipeline |
| Playbook | Threat Class | Severity |
|---|---|---|
| Hunt-001 | Agentic Loop / Resource Exhaustion | High |
| Hunt-002 | DDI Covert Channel / C2 via DNS | Critical |
| Hunt-003 | ML Model Poisoning / Behavioral Drift | Critical |
| Hunt-004 | Rogue Agent Detection | Critical |
git clone https://github.com/sunilgentyala/gsh-framework.git
cd gsh-frameworkpip install -r requirements.txtEdit configs/sentinel-policy-default.yaml to set your organization name, SIEM output destination, and egress allowlist.
python scripts/gsh-sentinel-deploy.py \
--target "llm-gateway-01" \
--mode "passive" \
--baseline-window 7dAllow the sentinel to operate in passive mode for at least 7 days before activating enforcement to establish accurate behavioral baselines.
python scripts/gsh-sentinel-deploy.py \
--target "llm-gateway-01" \
--mode "standard" \
--policy configs/sentinel-policy-default.yamlgsh-framework/
├── README.md
├── LICENSE
├── CONTRIBUTING.md
├── requirements.txt
├── playbooks/
│ ├── hunt-001-agentic-loop-detection.md
│ ├── hunt-002-ddi-tunneling-anomaly.md
│ └── hunt-003-model-poisoning-baseline.md
├── configs/
│ └── sentinel-policy-default.yaml
├── scripts/
│ ├── gsh-sentinel-deploy.py
│ ├── ddi-log-parser-ai.py
│ └── gsh-probe-eval.py
├── probes/
│ └── standardized-probe-set-v1.json
├── baselines/
├── agents/
│ └── manifests/
├── docs/
│ └── GSH_Framework_Whitepaper.md
├── reports/
├── tests/
└── logs/
| Threat | MITRE ATLAS | MITRE ATT&CK | NIST CSF 2.0 |
|---|---|---|---|
| Agentic Loop / Resource Exhaustion | AML.T0048, AML.T0040 | DE.AE-02, DE.CM-01, RS.MI-01 | |
| DDI Covert Channel Exfiltration | AML.T0048, AML.T0051 | T1071.004, T1048, T1568 | DE.CM-01, DE.AE-04, PR.DS-01 |
| ML Model Poisoning | AML.T0020, AML.T0043, AML.T0044 | ID.RA-01, DE.AE-02, DE.CM-06 | |
| Rogue Agent / Unauthorized Tool Use | AML.T0053 | PR.PS-04, RS.AN-03 |
Contributions from security practitioners, AI safety researchers, and detection engineers are welcome. Please read CONTRIBUTING.md before opening a Pull Request.
High-priority contributions include additional hunt playbooks, refined detection thresholds, and integration adapters for LangChain, AutoGen, CrewAI, and Haystack.
If you use the GSH framework in your research, please cite:
@misc{gentyala2026gsh,
author = {Gentyala, Sunil},
title = {The Gentyala-Sovereign Hunt (GSH): An Autonomous Agentic Framework
for Defending the Cognitive Cyber Domain},
year = {2026},
howpublished = {Open Source Research Artifact, GitHub},
url = {https://github.com/sunilgentyala/gsh-framework}
}To report a security vulnerability in the GSH framework itself, please email sunil.gentyala@ieee.org with the subject line [GSH Security Vulnerability] — [brief description]. Do not open a public GitHub Issue. See CONTRIBUTING.md for the full responsible disclosure policy.
See LICENSE for terms.