N 35° 40′
TOKYO · 東京
E 139° 45′
SEIZU · v1.0
2026.04.20
OBSERVATORY OPEN
SCROLL ↓
星図 · STAR · CHART

See your security
graph like an astronomer.

Seizu turns your Neo4j graph — cloud inventory, identities, vulnerabilities, relationships — into dashboards, ad-hoc Cypher, and an MCP endpoint for the agents investigating alongside you.

CHARTS · DATA · FROM
Neo4j
Cartography
Starbase
Cypher
MCP
01 WHAT · IS · SEIZU

A star chart for your
security infrastructure.

Seizu (星図) is the Japanese word for star chart. It's also a React + Python frontend for Neo4j graph databases — built for humans who need to navigate sprawling infrastructure graphs, and for the LLM agents that investigate them alongside you.

Point it at a Cartography graph and you get dashboards, ad-hoc Cypher, scheduled reporting, and an MCP endpoint your agents can query — all from one configuration.

02 機能 CAPABILITIES

Six instruments, one observatory.

α
01 / 06

Dashboards

Built in the browser

Assemble dashboards and reports visually, the way you would in Grafana — rows, panels, charts, tables, graphs. Config can still be imported and exported as code.

β
02 / 06

Query Console

Ad-hoc Cypher

Interactive Cypher with graph, table, and raw result views. A collapsible schema browser shows every node label, relationship, and property key.

δ
04 / 06

Scheduled Queries

On a cron or a graph event

Run queries on a schedule or trigger them from graph changes. Route results to Slack, SQS, or any action plugin.

ε
05 / 06

Graph Events

Triggers on change

Watch for interesting changes in the graph — a new admin policy, a fresh CVE on a production host — and fan out to downstream action plugins.

ζ
06 / 06

SSO via JWT

Connect your IDP

Native JWT authentication — point Seizu at your identity provider and inherit SSO for Neo4j itself. No proxy required.

The observatory, in motion.

Built for Cartography.
Bring your own graph.

Seizu pairs naturally with cartography (CNCF) and Starbase. Cartography ingests your cloud, identity, and SaaS inventory into Neo4j — Seizu is the lens that makes it legible.

AWSGCPAzureGitHub OktaKubernetesSnowflake PagerDutyCVEs
DATA · FLOW
Cartography
ingests AWS, GCP, Okta, CVEs →
Neo4j
your infrastructure as a graph
Seizu
dashboards · console · MCP
SAMPLE · CYPHER
MATCH (u:AWSUser)-[:MEMBER_OF*0..]->(g)
      -[:POLICY]->(p:AWSPolicy)
WHERE p.admin = true AND u.mfa = false
RETURN u.arn, g.name, p.name
05 信号 SIGNAL · MCP · LLM

Your graph, legible to agents.

Seizu ships an MCP server at /api/v1/mcp. Define Cypher-backed tools in YAML, and Claude, Cursor, or any MCP-aware agent can investigate your graph the way a security engineer would — but at machine scale.

“Which EC2 instances have unpatched critical CVEs?”
investigate_vulnerabilities()
“Show me admin-capable identities without MFA.”
audit_iam_posture()
“What blast radius does this IAM role have?”
trace_blast_radius()
06 用途 USE · CASES

Questions you stop being afraid to ask.

01 · IAM forensics

“When an IAM user gets an admin-policy attached, who approved it and what can they reach?”

02 · Exposure triage

“Which internet-facing workloads still have CVE-2024-XXXX, and which identities can access them?”

03 · Drift detection

“What changed in our blast radius since last Tuesday?”

04 · Supply-chain risk

“If this GitHub token leaks, what production resources are reachable?”

OPEN · SOURCE · APACHE · 2.0

Chart your own sky.

Spin up Seizu with docker-compose in under ten minutes, point it at your Neo4j instance, and start seeing your infrastructure the way it actually connects.