top of page

ASM-Hud

ASM-Hud is an investigative cybersecurity interface that helps analysts understand complex environments in seconds. Instead of searching through logs, dashboards, and external tools, ASM-Hud rebuilds the environment into an explorable topology that reveals risks analysts didn’t even know to look for.

Vibe Coding (side-project)

2025

Frame 108.png
ASM 01.png

This project is part of an ongoing Vibe Coding side-project I’m building with a partner.

It's our playground for experimenting with new UX patterns, data models, and visual investigation tools. It’s not a commercial product, but a research and prototyping space where we explore ideas that break away from traditional security tools.

For us, it’s a way to test how far we can push UX, technology and AI-driven tools,

and to explore concepts and ideas that no company would ever let us try.

ASM 36.png

The problem:
Unknown Unknowns

Most security tools only surface what analysts already expect to find, revealing the obvious.

But the real dangers hide between the lines: in orphan assets, silent connections, unusual communication patterns, and behaviours that security tools often fail to expose. These blind spots remain invisible until they cause real damage. ASM-Hud is designed to surface them, turning the hidden into something clear, traceable and actionable.

Start Exploring 
with a Single
Input

It all starts with a single input. The user enters any domain or website they want to explore, and the model immediately begins scanning the environment, discovering endpoints, services, connections and assets.

Within seconds it collects enough signals for the system to rebuild everything into a coherent structure. The map begins to take shape, and the entire environment becomes something the user can actually understand and explore.

Frame 108.png

Transform Chaos
Into a Starting
Point

With thousands of assets in every environment, analysts often don’t even know where to begin. So instead of giving them another endless table, we turned that infinity into a clear starting point.

The system visualises the entire environment as an explorable topology where users can move through the landscape, understand who’s connected to what, and see the real status of every asset.

Frame 108.png

Different Questions Need Different Views

Different investigations require different perspectives.

That is why the system includes a set of lenses that reshape the entire map depending on the question being asked.

 

The user can switch the view to explore assets by risk level, reveal anomalies across different environments, or group assets by product and functionality.

 

Each lens reorganizes the topology into a new story, allowing the analyst to uncover patterns, relationships, and brings the right context to the surface.

Frame 108.png

AI That Sees
What Analysts
Don’t Think to
Look For

After the scan completes, the system places a thin layer of insights on top of the map, revealing areas in the environment that are worth exploring.

These hints are not alerts. They are gentle entry points for investigation (it can surface problematic assets, a potential misconfiguration, suspicious behaviours, or communication paths that break the expected structure).

The AI acts as an expert companion. It understands the data, connects the dots, and identifies patterns no one thought to search for.

It is surprisingly helpful to discover that 21 assets in your environment have high exposure, or that 18% of your system is not monitored at all.

Frame 108.png

What I love most is that this feature creates a real investigative workflow.

The user is not swimming in data but exploring their environment, understanding it more deeply,

while the system quietly taps them on the shoulder and says:

Here are a few places you might want to check.”

bottom of page