Zing Forum

Reading

AI-IR: AI-Driven Incident Response Analysis Toolset for Extracting Security Knowledge from Slack Logs

A tool specifically designed to analyze Slack conversation records from security incident responses, capable of automatically generating incident summaries, activity reports, role inferences, and reusable investigative tactical knowledge, with support for multilingual translation and local Web UI viewing.

安全事件响应Slack分析事件摘要知识提取SOC网络安全事件复盘RAG知识库多语言翻译IoC脱敏
Published 2026-04-06 19:45Recent activity 2026-04-06 19:53Estimated read 7 min
AI-IR: AI-Driven Incident Response Analysis Toolset for Extracting Security Knowledge from Slack Logs
1

Section 01

AI-IR Toolset Guide: An AI Solution for Extracting Security Knowledge from Slack Conversations

AI-IR is an AI-driven toolset specifically designed to analyze Slack conversation records from security incident responses. It aims to solve the documentation challenges in incident response by automatically generating incident summaries, activity reports, role inferences, and reusable investigative tactical knowledge. It supports multilingual translation and local Web UI viewing, helping to transform valuable knowledge scattered in chat records into structured, inheritable organizational assets.

2

Section 02

Documentation Challenges in Security Incident Response (Background)

In cybersecurity incident response, teams often coordinate via Slack, but conversation records face issues such as information loss (buried in historical messages), knowledge silos (no systematic knowledge accumulation mechanism), difficulty in post-incident review (time-consuming and error-prone manual browsing), and lack of structure (hard to convert into training or audit documents). The AI-IR project is designed to address these problems.

3

Section 03

AI-IR Core Functional Modules

Event Summary Generation

Auto-generates reports including timeline reconstruction, root cause analysis, and executive summaries

Activity Analysis Report

Records participants' methods/tools, discovery summaries, time distribution, supporting team evaluation

Role Inference

Automatically identifies roles such as incident commander, subject matter expert, analyst, communication liaison, and their collaboration relationships

Knowledge Extraction and Precipitation

Extracts tactical knowledge (in YAML format) like investigation methods, tool usage, decision rules, and IoC patterns from conversations; can be exported as Markdown for RAG knowledge bases

Process Quality Evaluation

Analyzes response phase time consumption, communication quality, role clarity, and provides improvement suggestions

Multilingual Support

Built-in multilingual translation for Japanese/Chinese/Korean, retaining original English technical terms

Local Web UI

Launch a local read-only server to view reports via uv run aiir serve

4

Section 04

AI-IR Workflow and Usage

Data Preparation

Use stail/scat tools to export Slack channel data (example command: stail export -c "#incident-response" --output incident.json)

Preprocessing

Execute uv run aiir ingest for IoC desensitization, prompt injection detection, and XML tag wrapping

Analysis Execution

Supports direct processing, pipeline mode, or multiple analyses after preprocessing (e.g., generating summary/activity/role reports)

Report Generation

Generates complete JSON/Markdown reports; can extract tactical knowledge (using --knowledge-only parameter)

Translation and Localization

Convert reports to multilingual versions via uv run aiir translate

Process Evaluation

Generate response process quality evaluation reports

Knowledge Base Export

Convert tactical YAML to Markdown for RAG systems

5

Section 05

AI-IR Security Design Considerations

  • No External Transmission: Only transmits data to configured LLM endpoints; parsing and preprocessing are executed locally
  • IoC Desensitization: Desensitizes sensitive information like IPs/URLs/hashes to reduce leakage risks
  • Prompt Injection Protection: Wraps messages with XML tags and scans for injection patterns
  • Local Processing Priority: Reduces LLM dependency, improves efficiency, and minimizes data exposure surface
6

Section 06

AI-IR Application Scenarios and Value

  • SOC Teams: Automates report generation, freeing analysts to focus on threat hunting
  • Enterprise Security Teams: Establishes incident knowledge bases to avoid knowledge loss
  • Security Consulting Services: Quickly organizes client data to generate professional reports
  • Security Training and Drills: Uses real incident knowledge for red-blue exercises and new employee training
7

Section 07

AI-IR Summary

AI-IR solves the long-standing documentation and knowledge accumulation challenges faced by security teams. Through automated analysis, it transforms chat records into manageable, searchable, and inheritable organizational assets. Its open-source nature allows users to customize and extend it, making it a practical tool for organizations that value security operation maturity and knowledge management.