ZelQL Full Library
ZelQL: The Command Interface for Cybersecurity Reality
Product: ZelDB Suite: Zelfire Author: Haja Mo / Rocheston Use: Website content, documentation, demos, chatbot knowledge base, Aina Intelligence training context, and ZelDB product pages License Positioning: ZelDB is licensed exclusively to RCCE students and authorized Zelfire platform environments.
1. Overview
ZelQL is the native command interface of ZelDB. It is not merely a query language for retrieving rows, logs, or records. It is a cybersecurity-native command language for security reality: risk, trust, evidence, AI memory, policies, attack paths, blast radius, incident replay, encryption context, and defensive action provenance.
Traditional query languages ask: What data matches this filter? ZelQL asks: What happens, what is proven, what can an attacker reach, what can AI safely see, and what action is safe?
SELECT * FROM logs WHERE severity = 'high';ZelQL replaces passive search with operational cybersecurity commands:
SIMULATE action "isolate-host"
ON asset "prod-api-07"
SHOW blast_radius, business_impact, rollback_plan, approval_requiredZelQL is built for analysts, AI agents, auditors, incident responders, Aina Intelligence, ZelC, ZelEn, and the Zelfire platform.
2. ZelQL Core Philosophy
In cybersecurity, data is not enough. The database must understand what the data means, whether it is trustworthy, whether it is evidenced, whether it is policy-approved, whether it is safe for AI, and what will happen if an action is taken.
ZelQL is built around these principles:
- Security objects are not passive records; they are CyberCells with risk, trust, evidence, policy, timeline, and action boundaries.
- AI memory must be governed like production infrastructure.
- Evidence must be first-class, not a screenshot or afterthought.
- Reading data, reasoning over data, recommending action, simulating action, executing action, exporting data, and training AI must be separate permissions.
- Attack paths and blast radius should be queryable at the database layer.
- Every serious decision should be explainable with WHY.
- Every incident should be replayable with REPLAY.
- Every defensive action should be provable through Kinetic Ledger records.
3. Core ZelQL Verbs
| Verb | Meaning |
|---|---|
FIND | Search CyberCells, evidence, incidents, memories, policies, actions, keys, reports, and relationships. |
SHOW | Display a specific object, graph, timeline, proof, field set, or visual view. |
TRACE | Follow relationships through the Security Reality Graph. |
REPLAY | Reconstruct an incident, timeline, mutation history, or action sequence. |
SIMULATE | Compute blast radius, business impact, risk delta, rollback, and approvals before action. |
VERIFY | Validate evidence, proof bundles, actions, encryption, policies, compliance, and AI access. |
WHY | Explain risk, trust, policy, AI memory, evidence, action blocks, and incident causality. |
ASK | Ask Aina Intelligence using governed ZelDB context. |
QUARANTINE | Preserve unsafe memory or objects while blocking unsafe AI/action use. |
ANCHOR | Create tamper-evident proof anchors for evidence and proof bundles. |
COMPARE | Compare snapshots, states, incidents, policies, actions, or CyberCells. |
REPORT | Generate proof-grade reports from ZelDB data. |
EXPORT | Export results as CSV, JSON, HTML, Markdown, print/PDF, or proof bundle. |
CREATE | Create CyberCells, policies, memories, evidence, reports, or relationships. |
UPDATE | Modify CyberCell fields, policies, statuses, evidence metadata, or scores. |
LINK | Create typed relationships between CyberCells. |
UNLINK | Remove typed relationships between CyberCells. |
SCORE | Recalculate risk, trust, confidence, evidence, memory safety, or action safety. |
SNAPSHOT | Capture a point-in-time security state. |
WATCH | Create saved queries, alerts, or monitoring rules. |
EXPLAIN | Explain query plan, tenant isolation, safety checks, graph traversal, and evidence weighting. |
4. Statement Anatomy
Most ZelQL statements follow one of these patterns:
COMMAND target
WHERE conditions
WITH options
SHOW fields
ORDER BY field DESC
LIMIT number
AS viewFIND cybercells
WHERE risk_score >= 90
AND evidence_status != "verified"
SHOW name, type, owner, risk_score, evidence_status, attack_paths
ORDER BY risk_score DESC
LIMIT 20
AS tableTRACE identity "[email protected]"
TO database "customer-db-primary"
VIA credentials, sessions, network_paths
SHOW path, hops, risk_score, evidenceREPLAY incident "INC-2026-0042"
FROM first_seen
TO contained
SHOW timeline, graph, evidence, ai_decisions, kinetic_actions
AS timelineSIMULATE action "rotate-credential"
ON credential "svc-payments-token"
WITH max_business_impact = "low"
SHOW risk_delta, affected_services, rollback_plan, approval_required
AS simulation5. Object References
ZelQL can reference objects using explicit object notation or readable lowercase references.
Asset("prod-api-07")
Identity("[email protected]")
Database("customer-db-primary")
Credential("svc-payments-token")
Incident("INC-2026-0042")
Evidence("EV-7781")
Memory("MEM-9201")
Policy("POL-AI-003")
Action("ACT-1044")
Key("KEY-ZELEN-01")
Agent("Aina SOC Agent")
CrownJewel("Customer Production Database")
BusinessService("Customer Portal")
Tenant("Rocheston Demo")asset "prod-api-07"
identity "[email protected]"
incident "INC-2026-0042"
evidence "EV-7781"
memory "MEM-9201"
policy "POL-AI-003"6. Keywords, Comments, Literals, and Operators
6.1 Case Insensitivity
ZelQL keywords are case-insensitive, but the recommended house style is uppercase commands and clauses.
FIND cybercells WHERE risk_score > 80find cybercells where risk_score > 806.2 Comments
-- Find dangerous production CyberCells
FIND cybercells
WHERE risk_score > 85
AND zone = "production"
SHOW evidence, attack_paths, blast_radius/*
This query identifies AI-visible critical assets
that may require policy tightening.
*/
FIND cybercells
WHERE sensitivity = "critical"
AND ai_visibility = "allowed"
SHOW policy_status, evidence_status6.3 Literals
"prod-api-07"
"Customer Production Database"
"[email protected]"
94
true
false
["Asset", "Database", "Secret"]
"2026-01-01"
"All Data"6.4 Operators
| Operator Group | Operators |
|---|---|
| Comparison | =, !=, >, >=, <, <= |
| Logical | AND, OR, NOT |
| List | IN, NOT IN |
| Range | BETWEEN, AFTER, BEFORE, SINCE, UNTIL |
| Text | CONTAINS, STARTS_WITH, ENDS_WITH, MATCHES, LIKE |
| Security predicates | HAS, IS, IS NOT, CAN, CANNOT |
FIND cybercells
WHERE risk_score >= 90
AND trust_score < 20
AND type IN ["Asset", "Database", "Secret"]
AND name CONTAINS "prod"FIND cybercells
WHERE IS critical
AND HAS attack_path TO crown_jewel
SHOW path, evidence, blast_radius7. Output Views
ZelQL results can be shown as different views inside the ZelQL Console and website demos.
| View | Purpose |
|---|---|
AS table | Structured rows for analyst review. |
AS cards | Rich cards with risk, trust, evidence, and status. |
AS graph | Nodes and relationships in the Security Reality Graph. |
AS timeline | Events across time for incident replay and mutation history. |
AS simulation | Blast radius, before/after state, and action consequences. |
AS evidence | Hash chains, proof objects, sources, signatures, and verification status. |
AS raw_json | Machine-readable structured output. |
AS report | Report-ready formatted output. |
FIND attack_paths
WHERE severity = "critical"
SHOW start_node, end_node, hops, risk_score, recommended_containment
AS graph8. FIND Command
FIND searches ZelDB objects and returns filtered, policy-scoped, tenant-isolated results.
FIND object_type
WHERE conditions
SHOW fields
ORDER BY field ASC|DESC
LIMIT number
AS viewFind all CyberCells
FIND cybercells
SHOW name, type, risk_score, trust_scoreFind high-risk CyberCells
FIND cybercells
WHERE risk_score > 85
SHOW name, type, owner, zone, evidence_status
ORDER BY risk_score DESCFind critical production assets
FIND cybercells
WHERE type = "Asset"
AND zone = "production"
AND sensitivity = "critical"
SHOW risk_score, trust_score, encryption_status, policy_statusFind low-trust identities
FIND identities
WHERE trust_score < 30
SHOW owner, risk_score, recent_sessions, attack_pathsFind unencrypted sensitive databases
FIND cybercells
WHERE type = "Database"
AND sensitivity IN ["high", "critical"]
AND encryption_status = "unencrypted"
SHOW owner, business_service, risk_score, evidence_statusFind AI-visible secrets
FIND cybercells
WHERE type = "Secret"
AND ai_visibility = "allowed"
SHOW owner, policy_status, evidence_status, risk_scoreFind policy violations
FIND cybercells
WHERE policy_status = "violation"
SHOW name, type, policy_status, risk_score, owner
ORDER BY risk_score DESCFind evidence-missing objects
FIND cybercells
WHERE evidence_status IN ["missing", "partial"]
SHOW name, type, risk_score, evidence_statusFind stale memories
FIND memories
WHERE freshness_score < 40
SHOW title, source, trust_score, evidence_score, action_eligibleFind quarantined memory
FIND memories
WHERE status = "quarantined"
SHOW title, poisoning_risk, prompt_injection_risk, evidence_scoreFind active incidents
FIND incidents
WHERE status IN ["open", "investigating", "contained"]
SHOW incident_key, severity, phase, owner, risk_scoreFind critical attack paths
FIND attack_paths
WHERE severity = "critical"
SHOW start_node, end_node, hops, risk_score, recommended_containmentFind failed kinetic actions
FIND kinetic_actions
WHERE proof_status != "verified"
OR rollback_status = "failed"
SHOW action_type, target, risk_before, risk_after, actual_impact9. SHOW Command
SHOW displays a specific object or view with requested sections.
SHOW object_type "object-name"
WITH sections
AS viewCyberCell detail
SHOW cybercell "prod-api-07"
WITH overview, risk, trust, evidence, policies, relationshipsAttack paths for an asset
SHOW attack_paths
FOR asset "prod-api-07"
AS graphEvidence for an incident
SHOW evidence
FOR incident "INC-2026-0042"
AS evidenceMemory safety for an agent
SHOW memory_safety
FOR agent "Aina SOC Agent"
WITH trusted, quarantined, action_eligible, blockedPolicy bindings
SHOW policies
FOR cybercell "customer-db-primary"
WITH conditions, allowed_actions, forbidden_actionsEncryption state
SHOW encryption
FOR cybercell "customer-db-primary"
WITH key, rotation, decryption_events, violationsProof bundle
SHOW proof_bundle "PB-INC-2026-0042"
WITH evidence, hashes, approvals, timeline, actions10. TRACE Command
TRACE follows relationships through the Security Reality Graph.
TRACE source_type "source"
TO target_type "target"
VIA relationship_types
WHERE constraints
SHOW result_fieldsTrace identity to database
TRACE identity "[email protected]"
TO database "customer-db-primary"
SHOW path, credentials, sessions, evidenceTrace compromised host to crown jewel
TRACE asset "prod-api-07"
TO crown_jewel "Customer Production Database"
SHOW path, hops, vulnerabilities, attack_techniques, evidenceTrace credential exposure
TRACE credential "svc-payments-token"
TO business_service "Customer Portal"
SHOW reachable_assets, databases, secrets, risk_scoreTrace lateral movement
TRACE asset "workstation-22"
TO zone "production"
VIA sessions, credentials, network_paths
SHOW path, risk_score, cut_pointsTrace privilege escalation
TRACE identity "[email protected]"
TO role "cloud-admin"
VIA iam_policies, groups, service_accounts
SHOW path, policy_gaps, recommended_fixTrace AI agent data reach
TRACE agent "Aina SOC Agent"
TO sensitivity "restricted"
SHOW memories, cybercells, policies, blocked_pathsTrace all paths to crown jewels
TRACE all
TO crown_jewel
WHERE risk_score > 70
SHOW start_node, end_node, hops, evidence_count, recommended_cut_point
AS graphTrace shortest path
TRACE shortest
FROM identity "[email protected]"
TO database "customer-db-primary"
SHOW path, hops, risk_scoreTrace safest containment point
TRACE attack_paths
TO crown_jewel "Customer Production Database"
SHOW cut_points, risk_reduction, business_impact
ORDER BY risk_reduction DESC11. REPLAY Command
REPLAY reconstructs time and causality.
REPLAY object_type "object-id"
FROM start_point
TO end_point
SHOW sections
AS timelineReplay an incident
REPLAY incident "INC-2026-0042"
FROM first_seen
TO contained
SHOW timeline, graph, evidence, ai_decisions, actionsReplay a CyberCell mutation history
REPLAY cybercell "prod-api-07"
FROM created
TO now
SHOW risk_changes, policy_changes, evidence_changes, relationshipsReplay an attack path
REPLAY attack_path "AP-018"
SHOW stages, lateral_movement, privilege_escalation, evidence
AS timelineReplay containment
REPLAY action "ACT-1044"
SHOW requested_by, approved_by, executed_by, before_state, after_state, proofReplay identity behavior
REPLAY identity "[email protected]"
FROM "2026-01-01"
TO "2026-05-01"
SHOW logins, sessions, privileges, anomalies, evidenceReplay AI decision
REPLAY ai_decision "AID-2026-0091"
SHOW prompt_context, evidence_used, policy_constraints, recommendation, human_responseReplay ransomware-style incident
REPLAY incident "INC-RANSOM-2026-01"
SHOW initial_access, execution, credential_access, lateral_movement, containment, recovery12. SIMULATE Command
SIMULATE computes consequences before action.
SIMULATE action "action-name"
ON object_type "object-name"
WITH constraints
SHOW outputs
AS simulationSimulate host isolation
SIMULATE action "isolate-host"
ON asset "prod-api-07"
SHOW blast_radius, business_impact, risk_delta, rollback_plan, approval_requiredSimulate credential rotation
SIMULATE action "rotate-credential"
ON credential "svc-payments-token"
SHOW affected_services, risk_reduction, downtime_estimate, rollback_planSimulate disabling a user
SIMULATE action "disable-user"
ON identity "[email protected]"
SHOW active_sessions, business_impact, approval_required, rollback_planSimulate token revocation
SIMULATE action "revoke-token"
ON credential "api-token-prod-17"
SHOW services_impacted, attack_paths_removed, trust_deltaSimulate blocking an IP
SIMULATE action "block-ip"
ON indicator "185.44.12.9"
SHOW affected_connections, false_positive_risk, evidence_supportSimulate database isolation
SIMULATE action "isolate-database"
ON database "customer-db-primary"
SHOW affected_users, affected_services, revenue_impact, approval_requiredSimulate cloud key leak
SIMULATE scenario "cloud-key-leak"
ON credential "aws-prod-admin-key"
SHOW reachable_assets, crown_jewel_exposure, recommended_actionsSimulate ransomware spread
SIMULATE scenario "ransomware-spread"
FROM asset "workstation-22"
SHOW reachable_hosts, backup_exposure, containment_optionsSimulate AI agent action
SIMULATE action "run-containment-playbook"
ON agent "Aina SOC Agent"
WITH target = "prod-api-07"
SHOW allowed_actions, blocked_actions, policy_requirements, max_blast_radiusSimulate safest containment option
SIMULATE containment_options
ON incident "INC-2026-0042"
SHOW options, risk_reduction, business_impact, reversibility
ORDER BY safety_score DESC13. VERIFY Command
VERIFY validates proof, evidence, action authorization, encryption state, compliance controls, and AI access.
VERIFY object_type "object-id"
SHOW verification_fields
AS evidenceVerify evidence
VERIFY evidence "EV-7781"
SHOW hash_chain, source, timestamp, signature, anchorVerify proof bundle
VERIFY proof_bundle "PB-INC-2026-0042"
SHOW evidence, hashes, approvals, timeline, chain_statusVerify containment action
VERIFY action "ACT-1044"
SHOW authorization, evidence_basis, policy_decision, risk_before, risk_afterVerify encryption
VERIFY encryption
FOR database "customer-db-primary"
SHOW key, policy, last_rotation, decryption_eventsVerify AI restriction
VERIFY ai_access
FOR memory "MEM-9201"
SHOW visibility, policy, action_eligibility, training_permissionVerify compliance control
VERIFY compliance_control "SOC2-CC6.1"
SHOW evidence, policy, last_verified_at, gapsVerify tenant isolation
VERIFY tenant_isolation
FOR tenant "Rocheston Demo"
SHOW cross_tenant_access, memory_scope, vector_scope, policy_scopeVerify evidence chain
VERIFY evidence_chain "CHAIN-9011"
SHOW records, missing_links, hash_status, signatures14. WHY Command
WHY explains causality using CyberCells, EvidenceCells, MemoryCells, PolicyCells, IncidentCells, and ActionCells.
WHY subject
SHOW explanation_fieldsWhy is an asset high risk?
WHY asset "prod-api-07" IS high_risk
SHOW factors, evidence, attack_paths, policy_violationsWhy did risk increase?
WHY risk_score INCREASED
FOR cybercell "prod-api-07"
SHOW changed_fields, new_relationships, evidence, timelineWhy did trust drop?
WHY trust_score DROPPED
FOR identity "[email protected]"
SHOW sessions, anomalies, policy_events, source_reputationWhy was an action blocked?
WHY action "isolate-host" WAS blocked
FOR asset "prod-api-07"
SHOW policy, business_impact, approval_required, rollback_statusWhy was memory quarantined?
WHY memory "MEM-9201" IS quarantined
SHOW prompt_injection_risk, poisoning_risk, source, evidenceWhy can’t AI use this memory?
WHY agent "Aina SOC Agent" CANNOT use memory "MEM-9201"
SHOW policy, sensitivity, tenant_scope, action_eligibilityWhy is evidence weak?
WHY evidence "EV-7781" IS weak
SHOW source_reputation, confidence, signature_status, contradictionsWhy does this path expose a crown jewel?
WHY attack_path "AP-018" EXPOSES crown_jewel
SHOW path, credentials, vulnerabilities, policies, evidence15. ASK Command
ASK uses Aina Intelligence with governed ZelDB context.
ASK aina "question"
USING context
SHOW sources, evidence, recommendationsAsk about risky objects
ASK aina "Which CyberCells are most dangerous right now?"
USING cybercells
SHOW summary, evidence, recommended_actionsAsk about an incident
ASK aina "What happened in this incident?"
USING incident "INC-2026-0042"
SHOW timeline, root_cause, evidence, next_stepsAsk about safe containment
ASK aina "What is the safest containment option?"
USING incident "INC-2026-0042"
SHOW options, business_impact, risk_reduction, approvalsAsk about memory safety
ASK aina "Can this memory be used for action?"
USING memory "MEM-9201"
SHOW policy, evidence, memory_safety, answerAsk about proof
ASK aina "Can we prove this incident was contained?"
USING proof_bundle "PB-INC-2026-0042"
SHOW missing_evidence, verified_evidence, conclusionAsk for ZelQL generation
ASK aina "Generate a ZelQL query for unencrypted crown jewels"
SHOW zelql, explanationAsk for executive summary
ASK aina "Summarize current risk for executives"
USING reports, cybercells, incidents
SHOW executive_summary, top_risks, recommendations16. QUARANTINE Command
QUARANTINE preserves unsafe objects while blocking unsafe use.
QUARANTINE object_type "object-id"
REASON "reason"
SHOW impactQuarantine memory
QUARANTINE memory "MEM-9201"
REASON "prompt injection risk"
SHOW affected_agents, policies, evidenceQuarantine suspicious evidence
QUARANTINE evidence "EV-7781"
REASON "signature mismatch"
SHOW chain_impact, related_incidents, required_reviewQuarantine a CyberCell
QUARANTINE cybercell "rootkit-alert-2026"
REASON "suspected compromise"
SHOW relationships, attack_paths, blast_radiusQuarantine AI-generated recommendation
QUARANTINE ai_decision "AID-2026-0091"
REASON "unsupported by evidence"
SHOW evidence_gaps, human_review_requiredQuarantine all poisoned memories
QUARANTINE memories
WHERE poisoning_risk > 80
SHOW affected_agents, blocked_actions, evidence17. ANCHOR Command
ANCHOR creates tamper-evident proof references for evidence chains, proof bundles, incident timelines, kinetic actions, compliance packages, encryption proof, and AI decision receipts.
Anchor evidence
ANCHOR evidence "EV-7781"
WITH hash_chain
SHOW hash, timestamp, anchor_idAnchor proof bundle
ANCHOR proof_bundle "PB-INC-2026-0042"
WITH external_anchor
SHOW hash, chain_status, export_pathAnchor incident timeline
ANCHOR incident "INC-2026-0042"
WITH timeline_hash
SHOW events, hash, proof_statusAnchor kinetic action
ANCHOR action "ACT-1044"
WITH action_receipt
SHOW chain_hash, approvals, evidence18. COMPARE Command
COMPARE compares states, snapshots, CyberCells, incidents, memories, policies, and outcomes.
Compare before and after containment
COMPARE state BEFORE action "ACT-1044"
WITH state AFTER action "ACT-1044"
SHOW risk_delta, trust_delta, attack_paths_removed, business_impactCompare two CyberCells
COMPARE cybercell "prod-api-07"
WITH cybercell "prod-api-08"
SHOW risk, trust, evidence, policies, attack_pathsCompare snapshots
COMPARE snapshot "SNAP-2026-01"
WITH snapshot "SNAP-2026-05"
SHOW new_risks, fixed_risks, policy_changes, trust_deltaCompare incident response outcomes
COMPARE incident "INC-2026-0042"
WITH incident "INC-2026-0099"
SHOW containment_time, evidence_strength, risk_reduction, lessonsCompare memory safety
COMPARE memory_cluster "ransomware-playbooks"
WITH memory_cluster "approved-playbooks"
SHOW poisoning_risk, evidence_score, action_eligibility19. REPORT Command
REPORT generates proof-grade reports for CyberCells, risk, trust, attack paths, incidents, evidence, AI memory, agents, actions, blast radius, policies, encryption, compliance, integrations, users, tenants, and audit logs.
Generate CyberCell report
REPORT cybercell_inventory
WHERE risk_score > 70
INCLUDE summary, table, evidence, recommendations
EXPORT htmlGenerate executive risk report
REPORT executive_security_summary
DURING "All Data"
INCLUDE risk, trust, incidents, attack_paths, evidence, recommendations
EXPORT pdfGenerate incident proof report
REPORT incident_containment_proof
FOR incident "INC-2026-0042"
INCLUDE timeline, evidence, actions, approvals, before_after
EXPORT htmlGenerate compliance report
REPORT compliance
FOR framework "SOC 2"
INCLUDE controls, evidence, gaps, proof_bundles
EXPORT csvGenerate AI memory safety report
REPORT ai_memory_safety
WHERE status IN ["quarantined", "contradicted", "training-blocked"]
INCLUDE memory_scores, evidence, policies, recommendations
EXPORT jsonGenerate blast-radius report
REPORT blast_radius
FOR asset "prod-api-07"
INCLUDE affected_services, risk_delta, rollback_plan, approvals
EXPORT html20. EXPORT Command
Export current query
EXPORT last_result AS csvExport CyberCells
FIND cybercells
WHERE risk_score > 80
SHOW name, type, risk_score, evidence_status
EXPORT csvExport evidence package
EXPORT evidence
FOR incident "INC-2026-0042"
AS proof_bundleExport report
EXPORT report "Executive Security Reality Summary"
AS htmlExport raw JSON
FIND attack_paths
WHERE severity = "critical"
EXPORT raw_json21. CREATE / UPDATE / LINK / UNLINK
Create CyberCell
CREATE cybercell "prod-api-07"
TYPE "Asset"
ZONE "production"
OWNER "devops"
BUSINESS_SERVICE "Customer Portal"
SENSITIVITY "critical"
RISK_SCORE 94
TRUST_SCORE 12
CONFIDENCE_SCORE 94Create policy
CREATE policy "AI cannot use quarantined memory"
TYPE "AI Visibility"
SCOPE "ZelMemory"
CONDITION status = "quarantined"
FORBID action_use, training_use, recommendation_useCreate memory
CREATE memory "Ransomware containment lesson"
TYPE "Security Lesson"
SOURCE "Incident INC-2026-0042"
STATUS "verified"
ACTION_ELIGIBLE true
EVIDENCE_SCORE 92Create evidence
CREATE evidence "Host isolation approval"
TYPE "Human Approval"
SOURCE "SOC Manager"
FOR action "ACT-1044"
CONFIDENCE 95Update CyberCell risk
UPDATE cybercell "prod-api-07"
SET risk_score = 84
REASON "credential rotated and attack path removed"Update AI visibility
UPDATE cybercell "customer-db-primary"
SET ai_visibility = "restricted"
REASON "critical database with regulated data"Link identity to asset
LINK identity "[email protected]"
TO asset "prod-api-07"
AS privileged_access
WITH risk_weight = 85Link asset to database
LINK asset "prod-api-07"
TO database "customer-db-primary"
AS connects_to
WITH trust_level = "low"Unlink revoked access
UNLINK identity "[email protected]"
FROM asset "prod-api-07"
AS privileged_access
REASON "access revoked"22. SCORE, SNAPSHOT, WATCH, EXPLAIN
Recalculate risk
SCORE risk
FOR cybercell "prod-api-07"
SHOW factors, previous_score, new_scoreRecalculate memory safety
SCORE memory_safety
FOR memory "MEM-9201"
SHOW poisoning_risk, prompt_injection_risk, evidence_scoreRecalculate action safety
SCORE action_safety
FOR action "isolate-host"
ON asset "prod-api-07"
SHOW blast_radius, reversibility, approval_requiredCreate full snapshot
SNAPSHOT security_state
NAME "Pre-Containment Snapshot"
INCLUDE cybercells, relationships, evidence, policies, memory, actionsSnapshot CyberCell
SNAPSHOT cybercell "prod-api-07"
NAME "Before Host Isolation"
INCLUDE risk, trust, evidence, relationships, policiesWatch high-risk CyberCells
WATCH query "Critical CyberCells"
AS
FIND cybercells
WHERE risk_score >= 90
NOTIFY security_teamWatch AI-visible secrets
WATCH query "AI Visible Secrets"
AS
FIND cybercells
WHERE type = "Secret"
AND ai_visibility = "allowed"
NOTIFY adminExplain query plan
EXPLAIN
FIND cybercells
WHERE risk_score > 80
SHOW evidence, attack_pathsExplain simulation
EXPLAIN
SIMULATE action "isolate-host"
ON asset "prod-api-07"
SHOW blast_radius, business_impact23. ZelQL Query Grammar
statement
= find_statement
| show_statement
| trace_statement
| replay_statement
| simulate_statement
| verify_statement
| why_statement
| ask_statement
| quarantine_statement
| anchor_statement
| compare_statement
| report_statement
| export_statement
| create_statement
| update_statement
| link_statement
| unlink_statement
| score_statement
| snapshot_statement
| watch_statement
| explain_statement
find_statement
= FIND object_type [WHERE condition] [SHOW fields] [ORDER BY field direction] [LIMIT number] [AS view]
trace_statement
= TRACE source TO target [VIA relationships] [WHERE condition] [SHOW fields] [AS view]
replay_statement
= REPLAY object_ref [FROM time_ref] [TO time_ref] [SHOW fields] [AS timeline]
simulate_statement
= SIMULATE action_or_scenario ON object_ref [WITH options] [SHOW fields] [AS simulation]
verify_statement
= VERIFY object_ref [SHOW fields] [AS evidence]
why_statement
= WHY subject [SHOW fields]
ask_statement
= ASK aina string [USING context] [SHOW fields]
quarantine_statement
= QUARANTINE object_ref [REASON string] [SHOW fields]
anchor_statement
= ANCHOR object_ref [WITH method] [SHOW fields]
compare_statement
= COMPARE object_ref WITH object_ref [SHOW fields]
report_statement
= REPORT report_type [FOR object_ref] [WHERE condition] [INCLUDE sections] [EXPORT format]
export_statement
= EXPORT target AS format24. Field Libraries
CyberCell Fields
id
tenant_id
name
slug
type
owner
zone
business_service
sensitivity
risk_score
trust_score
confidence_score
encryption_status
ai_visibility
policy_status
evidence_status
description
metadata
relationships
timeline
mutation_history
action_eligibility
created_by
created_at
updated_at
is_demoEvidence Fields
id
tenant_id
title
evidence_type
source
actor
target
event_type
before_state
after_state
hash_value
signature_value
chain_id
confidence
forensic_relevance
policy_id
incident_id
cybercell_id
status
source_reputation
created_at
is_demoMemory Fields
id
tenant_id
title
content
source
memory_type
sensitivity
trust_score
evidence_score
freshness_score
poisoning_risk
prompt_injection_risk
ai_visibility
action_eligible
training_allowed
status
created_at
updated_at
is_demoKinetic Action Fields
id
tenant_id
action_type
target
requested_by
approved_by
executed_by
ai_confidence
policy_id
zelc_rule
evidence_id
predicted_blast_radius
actual_impact
risk_before
risk_after
rollback_status
proof_status
chain_hash
created_at
is_demoPolicy Fields
id
tenant_id
name
policy_type
scope
condition
allowed_actions
forbidden_actions
approval_required
ai_visibility_rule
training_rule
export_rule
encryption_rule
status
created_at
updated_at
is_demoCommon Result Fields
id
name
type
owner
tenant
zone
business_service
sensitivity
risk_score
trust_score
confidence_score
evidence_score
freshness_score
poisoning_risk
prompt_injection_risk
policy_status
evidence_status
encryption_status
ai_visibility
action_eligible
training_allowed
created_at
updated_at
relationships
attack_paths
blast_radius
business_impact
rollback_plan
approval_required
proof_status
chain_hash25. Query Library by Module
Command Center
FIND cybercells
WHERE risk_score > 80
SHOW name, type, risk_score, trust_scoreFIND incidents
WHERE status != "closed"
SHOW incident_key, severity, phaseFIND attack_paths
WHERE severity IN ["critical", "high"]
SHOW start_node, end_node, risk_scoreFIND evidence
WHERE status != "verified"
SHOW title, source, confidenceFIND memories
WHERE status = "quarantined"
SHOW title, poisoning_risk, prompt_injection_riskCyberCells
FIND cybercells
WHERE type = "Asset"
SHOW name, owner, zone, risk_scoreSHOW cybercell "prod-api-07"
WITH overview, relationships, evidence, policiesWHY cybercell "prod-api-07" IS high_risk
SHOW factors, evidence, recommendationsSecurity Reality Graph
TRACE asset "prod-api-07"
TO database "customer-db-primary"
SHOW path, relationships, evidence
AS graphTRACE all
TO crown_jewel
WHERE risk_score > 70
SHOW path, risk_score, cut_points
AS graphAttack Paths
FIND attack_paths
WHERE risk_score > 80
SHOW start_node, end_node, hops, recommended_containmentTRACE identity "[email protected]"
TO crown_jewel "Customer Production Database"
SHOW path, credentials, sessionsIncidents
REPLAY incident "INC-2026-0042"
SHOW timeline, evidence, ai_decisions, actionsVERIFY incident "INC-2026-0042"
SHOW containment_status, proof_bundle, residual_riskEvidence Vault
VERIFY evidence "EV-7781"
SHOW hash_chain, signature, source, timestampFIND evidence
WHERE confidence < 60
SHOW title, source, related_incidentZelMemory AI
FIND memories
WHERE status = "quarantined"
SHOW title, reason, poisoning_riskWHY memory "MEM-9201" IS quarantined
SHOW prompt_injection_risk, evidence, policyAI Agents
FIND ai_agents
WHERE risk_score > 70
SHOW name, tools, allowed_actions, policy_statusVERIFY action_eligibility
FOR agent "Aina SOC Agent"
ON action "isolate-host"
SHOW allowed, blocked_by, approval_requiredKinetic Ledger
FIND kinetic_actions
SHOW action_type, target, risk_before, risk_after, proof_statusVERIFY action "ACT-1044"
SHOW evidence, approvals, chain_hashBlast Radius
SIMULATE action "isolate-host"
ON asset "prod-api-07"
SHOW blast_radius, business_impact, rollback_planSIMULATE containment_options
ON incident "INC-2026-0042"
SHOW options, risk_reduction, business_impactPolicy Center
FIND policies
WHERE violation_count > 0
SHOW name, policy_type, affected_objectsWHY policy "AI Restricted Data Policy"
BLOCKED memory "MEM-9201"
SHOW sensitivity, tenant_scope, action_eligibilityEncryption & Keys
FIND cybercells
WHERE encryption_status = "unencrypted"
AND sensitivity = "critical"
SHOW name, type, owner, risk_scoreVERIFY encryption
FOR cybercell "customer-db-primary"
SHOW key, rotation, policy, evidenceCompliance Proof
VERIFY compliance_control "SOC2-CC6.1"
SHOW evidence, gaps, last_verified_atREPORT compliance
FOR framework "SOC 2"
INCLUDE controls, evidence, gaps
EXPORT htmlReports Center
REPORT executive_security_summary
DURING "All Data"
INCLUDE risk, trust, incidents, evidence, ai_safety, recommendations
EXPORT htmlREPORT critical_cybercells
WHERE risk_score >= 90
INCLUDE summary, table, evidence, attack_paths
EXPORT csvREPORT ai_memory_safety
INCLUDE quarantined, poisoned, training_blocked, action_eligible
EXPORT html26. Website Demo Queries
Overview View
FIND cybercells
WHERE risk_score > 70
SHOW name, type, risk_score, trust_score, policy_status
AS cardsTable View
FIND cybercells
WHERE zone = "production"
SHOW name, type, owner, risk_score, trust_score, encryption_status
AS tableGraph View
TRACE asset "prod-api-07"
TO crown_jewel "Customer Production Database"
SHOW path, relationships, risk_score
AS graphTimeline View
REPLAY incident "INC-2026-0042"
SHOW timeline, risk_changes, actions
AS timelineSimulation View
SIMULATE action "isolate-host"
ON asset "prod-api-07"
SHOW blast_radius, business_impact, rollback_plan
AS simulationEvidence View
VERIFY evidence "EV-7781"
SHOW hash_chain, source, timestamp, signature
AS evidenceAina View
ASK aina "Explain this result"
USING last_result
SHOW summary, recommendations, evidenceRaw JSON View
FIND cybercells
WHERE risk_score > 90
EXPORT raw_json27. Live Console Copy for the Website
SIMULATE action "isolate-host"
ON asset "prod-api-07"
SHOW blast_radius, business_impact, rollback_plan, approval_requiredExample result copy:
Building Security Reality Graph...
Loaded 59 relationships.
Tracing attack paths...
Detected lateral movement path.
Detected privilege escalation path.
Computing blast radius...
Tenant isolation: ENFORCED.
Policy-bound retrieval: ENFORCED.
Result set verified and signed.
Cells scanned: 68
Attack vectors evaluated: 9
Max risk score: 80
Execution time: 47ms
Simulation status: COMPLETEWebsite explanation: > This is not passive search. ZelQL computes consequences before action. It evaluates relationships, attack paths, business impact, policy, evidence, and AI action safety at the database layer.
28. Chatbot-Friendly FAQ Examples
How do I find high-risk assets?
FIND cybercells
WHERE type = "Asset"
AND risk_score > 80
SHOW name, owner, zone, risk_score, evidence_statusHow do I find unencrypted critical databases?
FIND cybercells
WHERE type = "Database"
AND sensitivity = "critical"
AND encryption_status = "unencrypted"
SHOW name, owner, policy_status, risk_scoreHow do I trace an admin to customer data?
TRACE identity "[email protected]"
TO database "customer-db-primary"
SHOW path, credentials, sessions, evidenceHow do I replay an incident?
REPLAY incident "INC-2026-0042"
FROM first_seen
TO contained
SHOW timeline, evidence, ai_decisions, actionsHow do I verify evidence?
VERIFY evidence "EV-7781"
SHOW hash_chain, signature, timestamp, sourceHow do I simulate isolation?
SIMULATE action "isolate-host"
ON asset "prod-api-07"
SHOW blast_radius, business_impact, rollback_planHow do I know why an action was blocked?
WHY action "isolate-host" WAS blocked
FOR asset "prod-api-07"
SHOW policy, business_impact, approval_requiredHow do I quarantine poisoned memory?
QUARANTINE memory "MEM-9201"
REASON "prompt injection risk"
SHOW affected_agents, blocked_actions, evidenceHow do I ask Aina for a report summary?
ASK aina "Summarize this report for executives"
USING report "Executive Security Reality Summary"
SHOW summary, key_risks, recommendations29. Advanced Query Patterns
Nested context
ASK aina "Which action is safest?"
USING (
FIND cybercells
WHERE risk_score > 85
AND business_service = "Customer Portal"
)
SHOW recommendation, evidence, policy_constraintsQuery result as simulation input
SIMULATE action "rotate-credential"
ON (
FIND credentials
WHERE risk_score > 80
)
SHOW affected_services, risk_delta, rollback_planTrace then verify
TRACE identity "[email protected]"
TO crown_jewel "Customer Production Database"
SHOW path, evidence
VERIFY last_result
SHOW evidence_strength, policy_status, proof_statusFind then report
FIND cybercells
WHERE risk_score > 90
SHOW name, type, evidence, policy
REPORT last_result
AS "Critical CyberCells Report"
EXPORT htmlReplay then explain
REPLAY incident "INC-2026-0042"
SHOW timeline, actions, risk_changes
WHY risk_score INCREASED
DURING last_replay
SHOW factors, evidence, source_events30. Human-AI Decision Queries
Accepted AI recommendations
FIND human_ai_decisions
WHERE status = "approved"
SHOW recommendation, human_response, outcome, risk_afterRejected AI recommendations
FIND human_ai_decisions
WHERE status = "rejected"
SHOW recommendation, reason, alternative_action, outcomeAI recommendations that reduced risk
FIND human_ai_decisions
WHERE risk_after < risk_before
SHOW recommendation, risk_before, risk_after, evidence_idHuman overrides
FIND human_ai_decisions
WHERE human_response = "override"
SHOW recommendation, reason, business_impact, outcomeExplain AI decision
WHY ai_decision "AID-2026-0091" recommended action "rotate-credential"
SHOW evidence, policy, context, confidence31. Compliance and Proof Queries
Prove MFA enforcement
VERIFY compliance_control "MFA-Enforcement"
SHOW users, policies, evidence, exceptionsProve privileged access review
VERIFY compliance_control "Privileged Access Review"
SHOW identities, approvals, evidence, last_reviewed_atProve encryption
VERIFY compliance_control "Encryption at Rest"
SHOW encrypted_cybercells, keys, policy, evidenceProve AI did not access restricted data
VERIFY ai_access_restrictions
WHERE classification = "restricted"
SHOW denied_attempts, policies, audit_logsProve incident response
VERIFY incident_response
FOR incident "INC-2026-0042"
SHOW timeline, evidence, approvals, containment, recoveryGenerate compliance proof bundle
CREATE proof_bundle "SOC 2 Evidence Pack"
FOR framework "SOC 2"
INCLUDE controls, evidence, policies, incidents, actions32. Error Model
ACTION_BLOCKED_BY_POLICY
ERROR: ACTION_BLOCKED_BY_POLICY
Policy: Production Host Isolation Requires Approval
Reason: Target asset is production and business impact is high.
Next step: Run SIMULATE with approval_required or request human approval.TENANT_SCOPE_DENIED
ERROR: TENANT_SCOPE_DENIED
Reason: Query attempted to access CyberCells outside the active tenant.
Tenant isolation: enforced.MEMORY_QUARANTINED
ERROR: MEMORY_QUARANTINED
Memory: MEM-9201
Reason: Prompt injection risk is high.
Allowed use: human review only.
Blocked use: AI recommendation, AI action, training.EVIDENCE_WEAK
ERROR: EVIDENCE_WEAK
Evidence confidence: 42
Reason: unsigned source and missing chain link.
Recommended action: verify source or attach stronger evidence.33. Response Metadata
{
"query_id": "ZQL-2026-0091",
"tenant_isolation": "enforced",
"policy_bound_retrieval": "enforced",
"memory_quarantine_filter": "enabled",
"evidence_weighting": "enabled",
"result_verified": true,
"execution_time_ms": 47,
"cells_scanned": 68,
"relationships_loaded": 59,
"attack_vectors_evaluated": 9
}Every ZelQL result can carry safety metadata: tenant isolation, policy-bound retrieval, memory quarantine filtering, evidence weighting, result verification, and execution timing.
34. Mini Glossary
- CyberCell: The native security object in ZelDB.
- EvidenceCell: A first-class proof object with source, hash, signature, chain, confidence, and related objects.
- MemoryCell: An AI memory object with trust, evidence, freshness, poisoning risk, prompt-injection risk, AI visibility, and action eligibility.
- ActionCell: A record of a defensive action, simulation, approval, risk delta, rollback, and proof.
- PolicyCell: A policy object governing access, AI visibility, training, export, encryption, approval, and action eligibility.
- Security Reality Graph: The connected graph of CyberCells and their relationships.
- Kinetic Ledger: The defensive-action provenance ledger.
- Blast Radius: The operational consequence of compromise, isolation, revocation, or containment.
- Proof Bundle: A packaged set of evidence, hashes, approvals, timeline, policies, and outcomes.
- Action Eligibility: Whether data or memory may be used for read, reason, recommend, simulate, execute, export, or train.
35. Taglines and Website Copy
- ZelQL: Query security reality.
- ZelQL: FIND risk. TRACE exposure. REPLAY incidents. SIMULATE action. VERIFY proof.
- ZelQL is not SQL for logs. It is a command interface for cybersecurity reality.
- ZelQL moves cybersecurity beyond retrieval.
- ZelQL turns the database into a Security Reality Engine.
- ZelQL is how Aina, ZelC, ZelEn, and Zelfire speak to ZelDB.
- ZelQL is the language of CyberCells, evidence, AI memory, policies, attack paths, blast radius, and defensive action.
36. Closing Website Copy
ZelQL is the language of ZelDB.
It lets analysts, AI agents, auditors, and Zelfire modules ask the questions cybersecurity actually requires:
FIND risk.
TRACE exposure.
REPLAY incidents.
SIMULATE action.
VERIFY proof.
WHY decisions.
QUARANTINE poisoned memory.ZelQL is not a new way to search old logs. It is a new way to command security reality.
It is the interface between CyberCells, evidence, AI memory, policies, attack paths, blast radius, incident replay, encryption, and defensive action.
ZelQL is how ZelDB moves beyond retrieval.
Built with 💛 by Haja Mo.