Inspiration
- MongoDB is the most popular NoSQL database, yet most security tools ignore it entirely — they're built for SQL
- After reading about breaches where attackers silently exfiltrated millions of records from unmonitored MongoDB instances, we asked: what if the database could defend itself?
- We wanted three things no existing tool combines: real-time detection, AI-powered explanation, and tamper-proof blockchain evidence
What it does
- Monitors multiple MongoDB databases in real time for suspicious activity (brute-force, privilege escalation, PII exfiltration, mass deletion, unauthorized access)
- 7 rule-based detectors flag events instantly and assign severity levels
- Snowflake Cortex AI (Mistral-large2) analyzes each flagged event and explains why it's dangerous in plain English
- SHA-256 hashes every piece of evidence and anchors proofs on Solana devnet — creating an immutable audit trail no one can tamper with
- Groups events into incidents with timelines, executive summaries, remediation checklists, and actor risk scores
- Live dashboard with source filtering, severity charts, and one-click attack simulation
How we built it
- Backend: Python / Flask with 7 modular blueprints (events, incidents, audit, sources, actors, scanner, live monitoring)
- Frontend: React 19 + Vite + Tailwind CSS v4 — dark theme, responsive dashboard
- Database: MongoDB 7.0 — also the thing we're protecting (meta!)
- AI: Snowflake Cortex REST API →
mistral-large2model for threat analysis - Blockchain: Solana Web3 SDK on devnet for evidence anchoring
- Deployment: Ubuntu VPS with nginx reverse proxy, systemd service, production seeded with 53,000+ documents across 8 collections
Challenges we ran into
- Multi-source event routing — making the event generator, detector, and incident engine all properly tag and filter events from multiple independent MongoDB instances
- Snowflake Cortex integration — the REST API required specific SQL-over-HTTP formatting with session parameters; took significant debugging to get
mistral-large2responding correctly - Solana transaction timing — blockchain confirmations added latency to the event pipeline; had to make proof anchoring async so the UI stays responsive
- Incident grouping logic — correlating events across different actors, databases, and time windows into coherent incidents without false groupings
Accomplishments that we're proud of
- 3-tier verification pipeline that no other MongoDB security tool has: Rule Engine → Snowflake AI → Solana Blockchain
- Tamper test feature — we built a way to prove evidence integrity by attempting modification and showing it gets caught
- Every flagged event gets a plain-English AI explanation a non-technical executive can understand
- Production-scale demo with 53,250 seeded documents across 8 collections including PII vaults, API keys, and financial transactions
- The whole system works end-to-end: detect → classify → explain → prove → remediate
What we learned
- How to integrate Snowflake Cortex AI as a real-time analysis engine via their SQL-over-HTTP REST API
- How to use Solana devnet for non-financial blockchain use cases (evidence anchoring / proof-of-integrity)
- Building a multi-source monitoring architecture where one platform watches multiple independent databases
- The importance of incident correlation — individual events are noise; grouped incidents with timelines tell a story
What's next for VaultWatch
- MongoDB Change Streams for true zero-latency detection (replacing profiler polling)
- Solana mainnet deployment for production-grade immutable evidence
- Slack / PagerDuty alerting when critical incidents are detected
- Custom rule builder — let security teams define their own detection patterns
- Multi-cloud support — monitor Atlas, DocumentDB, and Cosmos DB from one dashboard
- Compliance reporting — auto-generate GDPR/HIPAA/SOC2 audit reports from the blockchain-backed evidence chain
Log in or sign up for Devpost to join the conversation.