Skip to content

Humans In The Loop: The Non-Negotiable In Offensive Security

AI and automation have transformed offensive security, but not replaced human ingenuity. Luke Potter explains why real attackers, and real defenders, still need humans in the loop.

Abstract image of people walking with long shadows on a city street, symbolising human presence guiding automation in offensive security.

As the industry rushes to automate, it’s easy to forget that attackers were here first. The same technologies being adopted for defense are already powering offensive operations. The challenge isn’t choosing between automation and human expertise; it’s integrating both intelligently.

This is where the concept of humans in the loop becomes non-negotiable.

What “humans in the loop” means in offensive security

In offensive security, humans in the loop refers to the active involvement of human operators alongside automated tools to replicate how real attackers behave. It’s the difference between simulation and true emulation.

Humans in the loop means combining automation with human intent to truly emulate how real attackers operate.

Every week, I get asked the same question:

“Do you use tooling? Do you use AI?”

Of course we do. So would any real adversary.

Attackers have always automated what can be automated. They don’t hand-craft every packet like it’s 1999. They chain exploits, script the repeatable tasks, and use every framework and model available to them to move faster.

But here’s the critical point:
Attackers are humans using tools. Which means offensive security must be humans using tools, too.

Tools are the baseline. Humans are the advantage.

The industry often treats automation and AI as revolutionary. They’re not. Offensive security has always been about using the best tools available, from early scanners and exploit frameworks to today’s AI-assisted analysis.

Tools accelerate, but they don’t think.
They can only replay what’s been encoded into them, reflecting what is already known. Real attackers go further. They adapt, improvise, and exploit the unexpected.

That’s why human creativity remains the decisive edge.

Why humans in the loop matter

Attack simulation without human adversaries is just automation.

Here’s what humans bring that no algorithm can:

      • Creativity. Humans improvise, combining fragments of opportunity into unique attack chains no tool could predict.
      • Context. Humans understand which systems, suppliers, and assets truly matter to the business, and prioritise their attacks accordingly.
      • Deception. Humans manipulate, phish, and exploit trust in ways AI still cannot convincingly replicate.

Machines are exceptional at persistence, coverage, and scale. But humans make the leaps that break the model.

Why we built constant cyber attack

This belief sits at the core of Constant Cyber Attack, CovertSwarm’s model for continuous offensive testing:

  • Constant, unlimited scope attacks because adversaries don’t wait for your next scheduled test.
  • Human ingenuity, enhanced by automation to scale creativity without losing critical thinking.
  • Realistic threat emulation that connects people, technology, and third parties, just as adversaries operate in the wild.

It isn’t humans versus machines. It’s both, working together relentlessly.

The business imperative

For organizations, this isn’t just a technical consideration. It’s a resilience strategy.

AI and automation expand visibility, but human adversarial thinking is what turns detection into prevention and prevention into readiness. Industry analysts such as Gartner predict that by 2030, human-led testing will remain critical despite advances in AI-driven security automation.

Executives must ensure that their offensive security capability isn’t a one-off exercise, but a constant, human-led function embedded across operations, suppliers, and cloud dependencies.

See how we help clients build continuous resilience through red teaming and constant adversarial simulation.

The takeaway

Using AI and automation is no longer a differentiator. It’s the baseline.

What matters is whether humans are still steering, improvising, and making decisions that mirror how adversaries behave.

Attackers are humans using tools.
Your defensive posture must reflect that reality.

Offensive security must remain human-led, not in opposition to automation, but super charged by it.

The closer our simulations come to real human adversaries, the closer our clients get to true resilience. That’s what Constant Cyber Attack is built for.

Luke Potter, COO, CovertSwarm