Dashboard

๐Ÿ‘ค
Admin
๐Ÿ•’ --:--:--
๐Ÿ”” Alerts
TOTAL VENDORS 0
LOW RISK 0
MEDIUM RISK 0
HIGH RISK 0

Risk Distribution

Live Vendor Monitor

Loading vendors...
ID Name Verification Criticality Score Actions
No vendors found.

Real-time alerts triggered by intelligent risk evaluation.

No active high-risk alerts.

Immutable ledger of all vendor state changes and system events.

# Timestamp Vendor Action Details
๐Ÿ”‘

Vendor Logins

Manage authentication credentials and user accounts.

Username Password Name Role Linked ID Actions
๐Ÿš€

How CRAG Works

Understanding the Cognitive Resilience and Automated Governance framework

๐Ÿง 

How It Was Developed

CRAG was developed as a Phase-1 prototype to validate continuous, automated third-party vendor risk monitoring. The system uses a FastAPI + SQLAlchemy backend with SQLite for data persistence, and a vanilla HTML/CSS/JS frontend with Chart.js for visualization.

The risk engine employs a weighted random-walk algorithm with mean-reversion to simulate realistic AI-driven risk scoring every 10 seconds. This approach validates the CRAG concept before integrating real ML models in Phase-2.

๐Ÿ“‹

How to Use

  • 1. Onboard Vendors โ€” Go to the Vendors page, fill in vendor name, category, criticality, and status, then click "+ Add Vendor".
  • 2. Monitor Dashboard โ€” The Dashboard shows live risk scores, KPI cards, and a doughnut chart updated every 5 seconds.
  • 3. View Details โ€” Click any vendor card or table row to open a detailed popup with risk gauge, analysis, alerts, and audit trail.
  • 4. Check Alerts โ€” The Alerts page shows all high-risk events (score > 70) with timestamps.
  • 5. Review Audit Log โ€” Every action is recorded in the append-only audit trail for governance compliance.
โš™๏ธ

Architecture

Backend Python ยท FastAPI ยท SQLAlchemy ยท APScheduler
Frontend HTML5 ยท CSS3 ยท JavaScript ยท Chart.js
Database SQLite (append-only audit design)
Engine Weighted random-walk + mean-reversion simulation
๐Ÿ—บ๏ธ

Roadmap

Phase 1 โ€” Functional Prototype
Vendor onboarding, risk simulation, dashboard, alerts, audit log โœ…
Phase 2 โ€” AI Integration
Trained ML models, NLP-based threat intelligence, advanced analytics
Phase 3 โ€” Blockchain Audit
Immutable audit trail, smart contract governance, multi-org federation
๐Ÿ›ก๏ธ

About CRAG

Cognitive Resilience and Automated Governance

Our Mission

CRAG (Cognitive Resilience and Automated Governance) is a research-driven initiative to transform how organizations manage third-party vendor cybersecurity risk. Traditional TPRM processes are periodic, manual, and reactive โ€” CRAG makes them continuous, automated, and intelligence-driven.

Our system continuously monitors vendor risk posture using AI-powered scoring engines, providing real-time dashboards, automated alerting, and tamper-resistant audit trails โ€” enabling proactive risk governance instead of after-the-fact compliance checks.

๐ŸŽฏ

Vision

To create an industry-standard framework for automated third-party risk monitoring that combines artificial intelligence, real-time analytics, and blockchain-backed governance for complete supply chain cyber resilience.

๐Ÿ’ก

Innovation

CRAG bridges the gap between traditional periodic assessments and the need for continuous intelligence. By simulating vendor risk dynamics in real-time, security teams gain predictive visibility into their vendor ecosystem.

๐Ÿ—๏ธ

Key Capabilities

  • Centralized vendor registry with dynamic categorization
  • Continuous AI-simulated risk scoring (0โ€“100 scale)
  • Real-time executive dashboard with live analytics
  • Automated high-risk alerting and notification
  • Append-only audit trail for regulatory compliance
๐Ÿ“Š

Impact Metrics

10sRisk Update Cycle
100%Automation Coverage
24/7Continuous Monitoring
0Manual Intervention
โœ‰๏ธ

Contact Us

Get in touch with the CRAG team

Send a Message

Contact Information

๐Ÿ“ง
Email
crag.monitor@gmail.com
๐ŸŒ
๐Ÿ“
Location
Hyderabad, India
โฐ
Response Time
Within 24 hours
๐Ÿ“„

Terms & Privacy Policy

Legal information and data handling practices

๐Ÿ‘จโ€๐Ÿ’ป

Developer

Meet the mind behind CRAG

PG

P Ganesh Krishna Reddy

Full-Stack Developer & Cybersecurity Researcher

Passionate about building intelligent systems at the intersection of cybersecurity and AI. The CRAG prototype is part of ongoing research into automated third-party risk management and governance frameworks.

Python FastAPI JavaScript (ES6+) SQLAlchemy Cybersecurity Machine Learning Vercel Deployment TPRM
๐Ÿ—๏ธ

Development Phases

  • Phase 1: Prototype โ€” AI risk simulation & live dashboards (Current).
  • Phase 2: MVP โ€” Data integrations, multi-tenancy & reporting.
  • Phase 3: Enterprise โ€” Blockchain auditing & predictive analytics.
๐Ÿง 

Risk Scoring Logic

  • Baseline โ€” Derived from Criticality & Category weights.
  • Dynamic โ€” Real-time recalculation using AI-simulated walks.
  • Thresholds โ€” Automated alerts when risk > 70 (Critical).
๐Ÿ—๏ธ

CRAG System Architecture

End-to-end architecture of the AI-driven vendor risk monitoring platform

๐ŸŒ CLIENT LAYER
๐ŸŒ CRAG Dashboard (UI)
HTML5 / CSS3 / JS
Chart.js Visualization
โ†“ REST API โ†“
โš™ API / APPLICATION LAYER
โš™๏ธ FastAPI Backend
Authentication Routes
Vendor Management API
Alerts & Audit API
โ†“
๐Ÿง  PROCESSING LAYER
๐Ÿง  Risk Simulation Engine
Weighted Risk Algorithm
APScheduler (10s cycle)
Vendor Monitoring Logic
โ†“
๐Ÿ—„ DATA LAYER
๐Ÿ—„๏ธ SQLite Database
Vendor Registry
Append-Only Audit Logs
Alerts Storage

๐Ÿ›ก๏ธ Security Layer

  • Firebase Authentication
  • Role-Based Access Control
  • Secure REST APIs
  • Immutable Audit Trail

Technology Stack

Frontend: HTML5, CSS3, JavaScript, Chart.js
Backend: Python FastAPI
Scheduler: APScheduler
Database: SQLite
Authentication: Firebase Auth

๐Ÿ“Š System Metrics

Risk Engine Cycle: 10 seconds
Vendors Monitored: ...
Alerts Generated: ...
Audit Log Entries: ...

Data Flow Explanation

Vendor data is submitted through the dashboard interface. The FastAPI backend processes the request and stores vendor information in the database. A scheduled risk simulation engine periodically evaluates vendor risk scores and updates the dashboard while generating alerts and append-only audit logs.

"CRAG implements a layered architecture enabling continuous vendor risk monitoring through automated scoring, real-time alerting, and secure audit logging."

๐Ÿ“ˆ

Implementation & Progress

A comprehensive look at our development journey and future roadmap

๐Ÿ—๏ธ What We Have Developed

We have successfully built a real-time third-party vendor risk monitoring platform (Phase 1 Prototype). Our implementation includes a Centralized Vendor Registry for seamless onboarding, a Dynamic Live Dashboard for risk visibility, and a robust Role-Based Access Control system that isolates Vendor views from System Administrator visibility. We also implemented an Append-Only Audit Log to track all major events and ensure governance compliance over time.

๐Ÿ› ๏ธ Why This App & Tools?

The Problem: Traditional vendor risk assessments are sluggish, relying on point-in-time spreadsheets that leave organizations blind to sudden security threats.

Our Choice of Tools: We selected an AI-driven approach powered by FastAPI / Node and Firebase because they provide unparalleled speed, real-time data synchronization, and scalability. The frontend utilizes Glassmorphism UI and Chart.js to ensure that complex risk data is easily digestible and beautiful for stakeholders.

๐Ÿง  How the Risk Score is Calculated

Currently, the risk engine calculates scores using a Weighted Random-Walk Simulation combined with mean-reversion algorithms. Every 10-15 seconds, the engine factors in the vendor's Criticality Weight and applies a stochastic anomaly drift. If a score crosses the threshold of 70, it automatically triggers a High-Risk Alert and executes an immutable log entry.

๐Ÿ”ฎ What We Will Add in the Future

In Phases 2 and 3, CRAG will evolve from simulated risk scoring to incorporating Live OSINT external threat intelligence feeds via REST APIs. We will integrate powerful Machine Learning models for predictive breach forecasting and Natural Language Processing to scan security policies. Finally, we plan to implement a Blockchain-Backed Ledger to make our compliance auditing fully distributed and cryptographically secure.