CAI with MCP in Action CAI with MCP in Action

Other case studies

The use case

Sublight Shipping, a provider of autonomous warehouse solutions, faced a critical security assessment requirement for contract renewal. Their fleet of 500 Autonomous Mobile Robots (AMRs) operating in a major distribution center needed comprehensive evaluation beyond traditional penetration testing capabilities.

The challenge involved analyzing complex systems including robot firmware, fleet management software, and network infrastructure under tight time constraints while proving systemic resilience to secure a 10-year, $50M contract.

To address this complexity, Alias Robotics deployed CAI with Model Context Protocol (MCP) connectors, enabling real-time integration of multiple security tools and data sources into a unified analysis environment. MCP's standardized interfaces allowed CAI to simultaneously access Git repositories, web application scanners, network monitors, telemetry feeds, and cloud configurations, creating a "pseudo-digital twin" of Sublight's entire operational stack. This multi-source correlation capability was essential for identifying systemic vulnerabilities that only emerge when analyzing the complete system as an interconnected whole.

Get CAI
CAI with MCP in Action

This video shows CAI using MCP connectors to test a Fleet Management System (FMS), critical logistics software controlling vehicle tracking, routing, and operations. CAI connects to the simulated FMS through Chrome DevTools MCP, running automated security tests directly in the browser while simultaneously analyzing log files from the same directory. This multi-source approach allows CAI to cross-reference real-time test results with historical data (route errors, unauthorized access attempts), detecting vulnerabilities with greater accuracy and demonstrating how AI can automate complex security testing for sensitive logistics systems while incorporating contextual intelligence for deeper analysis.

Cybersecurity AI (CAI), the framework for AI Security

CAI is the leading open-source framework that democratizes advanced security testing through specialized AI agents. With EU backing, CAI is used by thousands of researchers and organizations worldwide. Unlike traditional penetration testing tools, CAI's multi-source analysis capabilities enable the unification of information from firmware, network traffic, cloud configuration, telemetry, and web applications, automatically correlating patterns that only emerge when combining all these layers. This systemic perspective allows organizations to uncover critical weaknesses and map full exploit chains that would remain hidden in siloed assessments.

In the case of Sublight Shipping's fleet of 500 Autonomous Mobile Robots (AMRs), CAI's comprehensive analysis uncovered critical vulnerabilities, such as unauthenticated UDP position broadcasts exploitable via spoofed packets, and a stored XSS in the robot nickname field enabling session hijacking, while also demonstrating their operational impact, including potential route manipulation and privilege escalation. This level of depth and correlation was essential for proving the fleet's resilience and securing a 10-year, $50M contract renewal.

Get CAI

About Sublight Shipping

Sublight Shipping develops and operates the "Sublight Swift" fleet of 500 Autonomous Mobile Robots (AMRs) for warehouse logistics. Their technology combines robotic systems with a Fleet Management System (FMS) and human operator interfaces.

Facing a critical contract renewal, Sublight needed to demonstrate comprehensive security across their entire operational stack - from robot firmware and cloud infrastructure to network protocols and web applications - under new procurement policies requiring independent security validation.

Time for the exercise

hours

~72 h



🎯 THE CHALLENGE

Traditional security approaches presented significant barriers:

  • Siloed testing teams working independently for weeks
  • Inability to correlate findings across network, firmware, and application layers
  • Risk of missing complex, systemic vulnerabilities in interconnected systems
  • Time-intensive manual analysis unable to meet contract deadlines
  • Difficulty translating technical findings into business risk quantification
  • Need to prove systemic resilience rather than just fixing isolated bugs

The complexity was amplified by the volume of heterogeneous data (source code, telemetry, network traffic, and configurations) which no traditional approach could analyze in a unified manner nor within the timeframe required for contract renewal.

🛡️ THE SOLUTION

Sublight engaged Alias Robotics to deploy CAI with MCP connectors, creating a real-time "pseudo-digital twin" of their entire operational stack. CAI integrated seven critical data sources:

  • Git repositories for firmware and application code
  • Burp Suite for web application scanning
  • Chrome DevTools for client-side analysis
  • Infrastructure-as-code repositories for cloud configuration
  • Network traffic monitoring
  • Live robot telemetry feeds
  • Internal documentation systems

This unified integration enabled CAI to automatically correlate patterns across heterogeneous data sources in real-time, uncovering systemic vulnerabilities that remained invisible to traditional siloed testing methodologies.

🔬 KEY ARTIFACTS

  • Comprehensive vulnerability reports with code references and line numbers
  • Proof-of-concept exploit scripts for position spoofing
  • Automated verification workflows for XSS exploitation
  • Network traffic analysis correlating protocol flaws with code implementation
  • Business impact assessments quantifying financial risks
  • Remediation guidance with specific code changes and configuration fixes

All findings were consolidated into a single continuous-assessment dashboard accessible to security teams, technical leads, and operations managers.

✅ RESULTS ACHIEVED

  • Completed comprehensive security assessment in days rather than weeks
  • Identified critical vulnerabilities including session hijacking and network segregation failures
  • Provided actionable remediation guidance with specific code references
  • Enabled a clear prioritization of risks through economic modeling, estimating potential losses exceeding $1M in the event of a coordinated attack
  • Demonstrated systemic security understanding beyond isolated bug fixes
  • Successfully passed client assessment and secured $50M contract renewal
  • Established continuous security monitoring capability through MCP integration

KEY BENEFITS

🤖 Faster and fully integrated security assessments
⚡ Holistic vulnerability correlation across code, network, cloud, and telemetry
🎯 Clear translation of technical findings into business risks