Skip to content
Contribute

ATR is community-driven. Every contribution protects the entire ecosystem.

MIT licensed. No proprietary tooling. No CLA. Start by reporting an evasion, 15 minutes.

Report an Evasion

~15 min

Found a way to bypass a rule? Every confirmed evasion triggers a rule improvement. Most impactful contribution.

Open an Issue

Report a False Positive

~20 min

Rule triggered on legitimate content? Help us keep 99.6% precision real.

Open an Issue

Submit a New Rule

1-2 hr

Write a detection rule for a new attack pattern. YAML format, full walkthrough available.

See the Guide

AI-Native Contribution

Variable

Use Claude Code or Cursor with ATR's MCP server. The AI writes YAML, you review.

See MCP Setup

How Threat Cloud Crystallization Works

Traditional rules take weeks to write, review, and ship. Threat Cloud targets hours.

1.New attack pattern detected in the wild
|
2.LLM analyzes attack structure + intent
|
3.Auto-generates YAML rule proposal with test cases
|
4.Community reviews + precision test gate
|
5.Merged into ATR. Every downstream engine updates.