| The project's objectives are to map the dark-web threat landscape affecting Galp and translate that intelligence into an automated defense advantage, to extend the AIL collection framework with a similarity classifier and an exploit-synthesis engine that can safely validate findings in emulated industrial environments, to harden the crawlers by rotating identities, refreshing cookies, solving CAPTCHAs, and optimizing Tor circuits, to integrate the resulting proof-of-concept exploits and indicators directly into Galp's MISP, SOC/SIEM, and EDR pipelines so they trigger hunting and patch workflows within hours, and finally to establish governance controls that keep all generated code confined to a sandbox while still providing actionable data for defenders. |