January 19th, 2026
New
Improved
Fixed

Intelligence Infrastructure & Platform Maturity
TL;DR
We’re not adding more security noise to an already crowded industry. We’re stripping cybersecurity back to first principles and rebuilding it as an intelligence system that actually understands what it’s protecting.
Instead of fragmented tools, static reports, and guesswork, Excalibur connects architecture, threats, attacks and controls into one living system. Faster insight, clearer decisions, and security work that finally scales without losing human judgement.
This isn’t a quick win or a feature race.
We’re doing the hard, unglamorous work to change how cybersecurity is built and we’re not stopping.
If this industry is going to be transformed, it won’t be by shortcuts.
It’ll be by systems that think clearly and teams that refuse to quit.,
Excalibur just moved from generating security artifacts to operating as an intelligence platform. Which is one more step towards Cyber Artificial General Intelligence.
v1.3.0 focuses on four pillars:
Neural network reasoning (The central brain which learns more and more about your product and company all privately!)
Flexible, customer-owned AI infrastructure
Human-guided offensive workflows (Yes we are diving into offensive more in the coming updates)
Platform reliability at production scale
18× faster, zero guesswork
What changed
Gap Analysis(previously clarifying questions) is now executed directly against the Knowledge base
No slow LLM loops
No generic “clarifying questions”
What it detects (automatically)
External attack paths without authentication
Threats with no mitigations
Components missing security controls
Data flows without sensitivity labels
Orphaned components and empty trust boundaries
Areas with no Q&A coverage
Incomplete or undocumented nodes
Why it matters
Response time dropped from ~18 seconds to ~1 second
Findings are precise, contextual, and architecture-aware
Questions now reflect what’s missing, not what’s easy to ask
You own the intelligence layer
What changed
Full migration to OpenRouter from Runpod
Unified access to 500+ LLM providers
Bring-Your-Own-AI via Settings UI
Enterprise Azure Ai and AWS Bedrock support incoming
Improvements
Higher token limits for reasoning-heavy tasks
Better reliability under load
Cleaner support for structured outputs
Important note
Users must configure AI providers via Settings → AI Providers before proceeding
Automation without autonomy
New capability
AI-assisted pentesting agent with explicit approval gates
Workflow
Scoped targets
Human-approved interpretation
Structured attack planning
Step-by-step execution with approvals
Automatic results compilation
Why this matters
No black-box agents,
No uncontrolled execution
Clear intent, traceability, and human ownership at every step
Deeper extraction, cleaner signal
Architecture ingestion
Multi-phase extraction pipeline for higher fidelity
Better component discovery
More accurate connection mapping
Validation and retry logic built-in
Context ingestion
Documents now understand architecture
Context links to specific components
Coverage and completeness become measurable
New capabilities
Component-aware chunking
Graph-linked documentation
Validation endpoints for ingestion quality
Bug bounty visibility, inside the platform
New dashboard
Live HackerOne integration
Severity breakdowns
Report detail views
Safe fallback when credentials aren’t present
Why this matters
External findings now sit alongside internal threat models
Less tab-hopping
Better prioritisation
Production-grade by default
Fixed JSON extraction issues for reasoning models
Stabilised Neo4j connection pooling in long-running deployments
Resolved rate-limiter crashes on newer FastAPI versions
Fixed canvas graph persistence edge cases
Corrected observability and tracing initialisation
Repaired state mismatches in Gap Analysis answers
End-to-end tests for core workflows
Automated CI/CD validation
Deployment status notifications
Safer, more predictable releases
60+ commits
7 major features
15+ fixes
100+ files changed
18× performance improvement in Gap Analysis
This release isn’t about more automation.
It’s about better intelligence, faster feedback, and tighter control.
Less guessing.
More grounding.
More trust in the system.
Excalibur is growing up and we wont stop until we reached artificial general intelligence in cybersecurity.
January 3rd, 2026

The day threat models stopped being documents
Until now, threat modeling tools have had a quiet flaw.
They look structured.
But underneath, they behave like folders of text.
Threats over here.
Controls over there.
Attack scenarios copied into documents, frozen in time.
Useful but disconnected.
Excalibur v1.2.0 is where that ends.
We kept running into the same problem.
Threat data lived in two worlds:
Structured tables with no understanding of relationships
Graphs rich in relationships but missing context and metadata
Depending on where we pulled from, something was always missing.
So the threat model wasn’t wrong.
It was incomplete.
That’s when we stopped treating threat models as documents.
And started treating them as systems.
In v1.2.0, Excalibur’s threat modeling engine becomes a living knowledge graph.
Every meaningful thing now exists as a first-class citizen:
Threats
Attack scenarios
Components
Security controls
Context
Q&A
They aren’t blobs of JSON anymore.
They’re nodes, connected by intent.
An attack doesn’t just exist.
It targets a component.
It exploits a threat vector.
It’s mitigated by controls.
For the first time, you can ask questions like:
“What attacks touch authentication?”
“Which threats connect these two attack paths?”
“What controls actually mitigate high-likelihood vectors?”
And get real answers.
Not text search. Not filters. Just Relationships.
Behind the scenes, something subtle but important changed.
Excalibur used to think in two places:
Structured data from Supabase
Relationship data from Neo4j
They didn’t disagree.
They just didn’t talk.
v1.2.0 introduces a unified retrieval layer that pulls from both, in parallel, then intelligently merges the results.
Duplicates are removed.
Context is scored.
Signals are ranked.
The system finally sees the whole picture at once.
This is what “unified security intelligence” actually means.
Attack scenarios are no longer isolated exercises.
Every attack now lives in the graph.
Which means:
Attacks can reference shared threat vectors
Chains emerge naturally
Patterns surface over time
Two attacks exploiting the same weakness now know they’re related.
The system can reason about escalation paths without being explicitly told.
This is where the model starts to feel less like a tool and more like an analyst who remembers past work.
As the graph grew smarter, the intelligence layer had to mature too.
v1.2.0 adds capability-based LLM routing.
Excalibur no longer asks:
“Which model should we use?”
It asks:
“What kind of thinking is required?”
Reasoning tasks go to reasoning models.
Fast generation goes where speed matters.
Local models stay local when privacy demands it.
And when multiple sources disagree, a Judge Agent steps in — comparing results for completeness, accuracy, and actionability.
Not all answers are equal anymore.
The system knows that too.
A living graph is only useful if you can read it.
So we rebuilt the visualization layer:
Cleaner nodes where content matters
Rich panels that show full context in markdown
Darker edges so relationships are visible at a glance
A larger canvas with deeper zoom
A clearer legend that separates threats, attacks, and controls
The graph stopped feeling crowded.
And started feeling navigable.
Some of the most important changes aren’t visible.
v1.2.0 quietly:
Normalises threat terminology so the database stays consistent
Resolves missing foreign keys automatically
Removes hundreds of lines of dead code
Makes the system easier to reason about and harder to break
Nothing flashy.
Everything necessary.
This release isn’t about more features.
It’s about a shift in how security knowledge exists inside Excalibur.
Threat models are no longer files you generate and forget.
They’re living systems that evolve, connect, and compound over time.
From fragmented data
to unified intelligence.
From documents to understanding.
Welcome to Excalibur v1.2.0.
December 30th, 2025
New
Improved
Fixed

The platform learned how to choose. And how to protect itself.
V1 was about ground truth.
V1.1 is about control.
Control over where intelligence runs.
Control over who sees what.
Control over the small failure modes that quietly ruin trust.
This release isn’t flashy on the surface.
It’s decisive under the hood.
In V1, Excalibur could think.
In V1.1, it can choose how to think.
We added true multi-provider LLM support.
You can now run Excalibur with:
NVIDIA DGX Cloud
RunPod serverless GPU inference
And more importantly, Excalibur doesn’t hardcode that decision.
LLM requests now route dynamically to the provider you configure.
Your infrastructure. Your cost model. Your risk tolerance.
No vendor lock-in disguised as “simplicity.”
And because visibility matters, the Settings UI now clearly shows which providers are wired in with proper branding, not guesswork.
Excalibur doesn’t assume where your intelligence should live anymore.
You decide.
Reports are meant to be read.
They’re also meant to be protected.
V1.1 deepens access control with RBAC Phase 2 and 3.
You can now:
Share reports with teammates through a dedicated access control interface
Give external viewers a guest, read-only experience
Manage share links without wondering who still has access
And we closed a dangerous edge case.
Owners can no longer accidentally downgrade themselves when sharing.
Because losing control of your own report should never be one click away.
Collaboration got easier.
Ownership stayed absolute.
Sessions end.
That’s normal.
What isn’t normal is being logged out twice, silently, or mid-flow.
V1.1 fixes that.
Sessions now expire gracefully, with a clear user notification
Duplicate logout calls are gone
No confusion.
No ghost redirects.
No “wait, what just happened?”
This release also cleaned up the kinds of issues most changelogs hide at the bottom.
We didn’t.
Business unit connections now persist correctly when reorganising
MiniMap and zoom controls visually match the canvas
Infinite render loops caused by React effects are gone
Safer DOM handling prevents drag-related crashes
AI provider API keys are now properly encrypted at rest
CSRF token handling no longer trips TypeScript
Original owners are now immutable, preventing lockouts
Templates use the correct service role instead of anonymous access
These aren’t “minor fixes.”
They’re trust repairs.
Under the surface, Excalibur became more resilient.
RunPod now uses user-stored API keys, not environment shortcuts
Neo4j starts more reliably with retry logic
Memory usage is tighter on DigitalOcean
Slack integrations no longer break on mismatched variables
The system behaves better under stress.
Which is exactly when it matters.
A few final moves made Excalibur easier to reason about:
Reporting now separates the welcome experience from the canvas
LLM integrations were fully audited and documented
Dependencies were updated and cleaned up with security fixes
No behavioural change for users.
A lot more clarity for the system.
This release isn’t about new screens.
It’s about removing fragility.
Excalibur now:
Thinks across providers
Shares without risk
Ends sessions cleanly
Protects ownership by default
Runs more reliably in the real world
V1 proved the idea.
V1.1 makes it sturdier.
And from here, we build forward not sideways.
Welcome to Excalibur v1.1.
DGX Cloud Integration: Added NVIDIA DGX hardware as an AI provider option
RunPod Integration: Added RunPod serverless GPU inference support
Dynamic Provider Routing: LLM requests now route to user-configured providers
Provider Logos: Added NVIDIA and RunPod branding to Settings UI
Module Sharing: Share reports with team members via access control UI
Guest User View Mode: Read-only experience for shared report viewers
Share Link Management: Improved UI for managing report share links
Owner Protection: Prevent accidental owner downgrade when using share links
Graceful Session Expiration: Auto-logout with user notification on session timeout
Prevent Multiple Logouts: Fixed duplicate logout calls on expiration
Business Unit Connections: Connections now persist when dragging away from organization
Canvas Controls: MiniMap and zoom controls now have white background (matching canvas)
Infinite Render Loop: Fixed useEffect dependency issue causing render loops
Block Draggable: Added null safety guards for DOM node operations
API Keys Encryption: Fixed encryption for stored AI provider API keys
CSRF Token Hook: Resolved TypeScript error in use-csrf-token
Owner Lockout Prevention: Added immutable is_original_owner flag
Template Security: Switched from anon key to service_role for templates
Toast Notifications: Use portal to prevent layout shift
Console Cleanup: Suppress harmless errors in production
Server Actions: Fixed import issues in SecurityArchitectureDiagram
RunPod API Keys: Use user's stored API key instead of environment variable
Neo4j Retry Logic: Added connection retry for container startup reliability
Memory Optimization: Optimized builds for DigitalOcean server
Slackbot Sync: Fixed Neo4j variable names for Slack integration
Package dependencies updated with npm audit fixes
Comprehensive LLM integration audit documentation
Separate welcome and canvas into distinct routes for reporting module
December 29th, 2025
New

Most changelogs start with features.
This one starts with a question.
What if cybersecurity didn’t begin with tools, dashboards, or templates?
What if it began with ground truth?
That question is why Excalibur exists.
And V1 is our first real answer.
Every breach story sounds the same in hindsight.
“We didn’t know this could happen.”
So we built the part most platforms skip.

In Excalibur V1, offensive security starts where it should: understanding the system.
You can drop in:
Architecture diagrams
Confluence documentation
Zoom transcripts from design reviews and incident calls
Excalibur doesn’t just store them.
It connects them.
Behind the scenes, we construct a living mind map.
A neural network of your product.
Assets, trust boundaries, flows, assumptions all tied together.
From that foundation, Excalibur:
Builds multi-framework threat models automatically
Pinpoints exact areas of compromise, not generic risks
Generates unlimited attack vectors, grounded in your actual system
No copy-paste STRIDE tables.
No abstract diagrams that look good and do nothing.
Just a clear answer to: “If I were the attacker, where would I start?”

Threat models are hypotheses.
Attack vectors are questions.

So we made it easy to answer them.
Every attack vector in Excalibur can be pulled into a fully adaptive tabletop exercise.
Not a four-hour meeting.
Not a PDF no one updates.
A focused, one-hour simulation where you:
Walk through the attack step by step
Document controls and gaps as you go
Capture decisions, ownership, and outcomes
Tabletops stop being theatre.

They become rehearsals.
Then there’s reporting.
We looked at how pentest reports are written today.
Microsoft Word.
Rigid templates.
RBAC that breaks.
Platforms full of features nobody touches.
So we removed all of that.

In Excalibur V1, reporting lives on a canvas.
You create a visual, tree-like structure:
Business units
Organisations
Engagements
Reports
Drag. Drop. Done.

Open a report and you’re inside a clean, Notion-style editor that supports:
Text
Images
Video
Audio
Visual attack flows using Excalidraw
You don’t describe the attack anymore.
You show it.
Sharing is simple:
One link
View or comment only
RBAC that actually works
And reporting isn’t limited to pentests.
Teams already use it for playbooks, internal reviews, and security narratives.
Same canvas. New purpose.

Pentest teams know this pain.
Every client wants a different template.
Every change breaks the workflow.
So we did something obvious.
Templates live on the canvas.
Edit a template once.
Every new report uses it instantly.
Change your mind?
Edit it again.
Create a new report. Done.
No migrations.
No broken formatting.
No wasted time.
You document.
Excalibur handles the structure.
V1 ships in two forms.
Threat Modeling
Tabletop Exercises
Visual Reporting
Integrated support for OpenAI and RunPod
More integrations coming
Everything above. Plus something most platforms won’t offer.
On-prem deployment.
Excalibur can run entirely inside your environment on an AI supercomputer:
All language models
All pentest agents
The full platform
No data leaves.
No training on your data.
No cloud dependency.
This is our vision of privatised cybersecurity
where customers keep both the data and the power.
We didn’t copy every cybersecurity vendor feature list.
We didn’t chase checkboxes.
We didn’t optimise for demos.
We designed the experience first.
Then built only what mattered.
Every component in Excalibur exists for a reason.
If it wasn’t essential, it was removed.
That’s the constraint we chose.
And it shows.
CISOs who want clarity instead of noise
Pentesters who care about thinking, not formatting
If you believe security should be grounded in reality, not ritual,
you’re in the right place.
V1 isn’t “feature complete.”
It’s direction complete.
From here, we extend outward - more integrations, more agents, deeper automation without losing the ground truth that everything is built on.
Cybersecurity doesn’t need more tools.
It needs better thinking.
Welcome to Excalibur
🔧 Memory optimization and security audit for npm dependencies
🔧 Production build configuration with npm security fixes
📦 Updated package dependencies with security vulnerability patches
⚡ Optimized Docker memory allocation for DigitalOcean server builds
🚀 Merged staging branch updates to production
🚀 Production deployment configuration updates
🐳 Updated Docker and CI/CD workflows for production deployment
✅ Reporting module verification and quality checks
🐛 Fixed toast notifications causing layout shift in modals
✨ Added RBAC module sharing with Access Control UI
We push updates multiple times a week so be in the know by subscribing to updates.