Humans In The Loop: The Non-Negotiable In Offensive Security
AI and automation have transformed offensive security, but not replaced human ingenuity. Luke Potter explains why real attackers, and real defenders, still need humans in the loop.
AI and automation have transformed offensive security, but not replaced human ingenuity. Luke Potter explains why real attackers, and real defenders, still need humans in the loop.
As the industry rushes to automate, it’s easy to forget that attackers were here first. The same technologies being adopted for defense are already powering offensive operations. The challenge isn’t choosing between automation and human expertise; it’s integrating both intelligently.
This is where the concept of humans in the loop becomes non-negotiable.
In offensive security, humans in the loop refers to the active involvement of human operators alongside automated tools to replicate how real attackers behave. It’s the difference between simulation and true emulation.
Humans in the loop means combining automation with human intent to truly emulate how real attackers operate.
Every week, I get asked the same question:
“Do you use tooling? Do you use AI?”
Of course we do. So would any real adversary.
Attackers have always automated what can be automated. They don’t hand-craft every packet like it’s 1999. They chain exploits, script the repeatable tasks, and use every framework and model available to them to move faster.
But here’s the critical point:
Attackers are humans using tools. Which means offensive security must be humans using tools, too.
The industry often treats automation and AI as revolutionary. They’re not. Offensive security has always been about using the best tools available, from early scanners and exploit frameworks to today’s AI-assisted analysis.
Tools accelerate, but they don’t think.
They can only replay what’s been encoded into them, reflecting what is already known. Real attackers go further. They adapt, improvise, and exploit the unexpected.
That’s why human creativity remains the decisive edge.
Attack simulation without human adversaries is just automation.
Here’s what humans bring that no algorithm can:
Machines are exceptional at persistence, coverage, and scale. But humans make the leaps that break the model.
This belief sits at the core of Constant Cyber Attack, CovertSwarm’s model for continuous offensive testing:
It isn’t humans versus machines. It’s both, working together relentlessly.
For organizations, this isn’t just a technical consideration. It’s a resilience strategy.
AI and automation expand visibility, but human adversarial thinking is what turns detection into prevention and prevention into readiness. Industry analysts such as Gartner predict that by 2030, human-led testing will remain critical despite advances in AI-driven security automation.
Executives must ensure that their offensive security capability isn’t a one-off exercise, but a constant, human-led function embedded across operations, suppliers, and cloud dependencies.
See how we help clients build continuous resilience through red teaming and constant adversarial simulation.
Using AI and automation is no longer a differentiator. It’s the baseline.
What matters is whether humans are still steering, improvising, and making decisions that mirror how adversaries behave.
Attackers are humans using tools.
Your defensive posture must reflect that reality.
Offensive security must remain human-led, not in opposition to automation, but super charged by it.
The closer our simulations come to real human adversaries, the closer our clients get to true resilience. That’s what Constant Cyber Attack is built for.
Luke Potter, COO, CovertSwarm