Contribute
ATR is community-driven. Every contribution protects the entire ecosystem.
MIT licensed. No proprietary tooling. No CLA. Start by reporting an evasion, 15 minutes.
Report an Evasion
~15 minFound a way to bypass a rule? Every confirmed evasion triggers a rule improvement. Most impactful contribution.
Open an Issue→Report a False Positive
~20 minRule triggered on legitimate content? Help us keep 99.6% precision real.
Open an Issue→Submit a New Rule
1-2 hrWrite a detection rule for a new attack pattern. YAML format, full walkthrough available.
See the Guide→AI-Native Contribution
VariableUse Claude Code or Cursor with ATR's MCP server. The AI writes YAML, you review.
See MCP Setup→How Threat Cloud Crystallization Works
Traditional rules take weeks to write, review, and ship. Threat Cloud targets hours.
1.New attack pattern detected in the wild
|
2.LLM analyzes attack structure + intent
|
3.Auto-generates YAML rule proposal with test cases
|
4.Community reviews + precision test gate
|
5.Merged into ATR. Every downstream engine updates.