Four paths. Same destination.
427 rules, ready to integrate. The same path Cisco walked.
Try it in 30 seconds
No signup, no API key. One command scans your SKILL.md or MCP config.
427 rules · 8 threat categories · < 5ms latency · zero dependencies · MIT license
TypeScript / Node.js
Docs→import { ATREngine } from 'agent-threat-rules';
const engine = new ATREngine();
const matches = engine.evaluate({
type: 'tool_response',
content: toolOutput,
timestamp: new Date().toISOString(),
});
if (matches.length > 0) {
// Threat detected — block or alert
}Python (pyATR)
Docs→from pyatr import ATREngine
engine = ATREngine()
result = engine.evaluate(event={
"type": "llm_input",
"content": user_message,
})
if result.outcome == "deny":
# Block the requestRaw YAML (any language)
Docs→# Point your scanner at rules/ directory # Each .yaml file follows ATR-SPEC-v1 schema # Parse with any YAML library # Schema: spec/atr-schema.yaml rules/ prompt-injection/ tool-poisoning/ agent-manipulation/ ... (8 categories)
GitHub Action (CI/CD)
Docs→name: ATR Scan
on: [push, pull_request]
jobs:
scan:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
- uses: Agent-Threat-Rule/agent-threat-rules@main
with:
path: '.' # Scan entire repo
severity: 'medium' # Minimum severity
fail-on-finding: 'true'
upload-sarif: 'true' # Results in GitHub Security tabSIEM Integration
Docs→# Convert ATR rules to SIEM query language atr convert splunk # Output SPL queries atr convert elastic # Output Elasticsearch Query DSL atr convert sarif # Output SARIF v2.1.0 for CI/CD
GitHub Action Adopters
Wire ATR into any GitHub repo's CI. Results write to SARIF and surface in the repo's GitHub Security tab — same place as CodeQL and dependabot.
# .github/workflows/atr-scan.yml
on: [push, pull_request]
jobs:
scan:
runs-on: ubuntu-latest
permissions:
security-events: write # for SARIF upload
steps:
- uses: actions/checkout@v4
- uses: Agent-Threat-Rule/agent-threat-rules@main
with:
severity: medium
fail-on-finding: trueNo public adopters tracked yet. If your repo uses the ATR Action, let us know via a GitHub issue and we'll list it here.
Adoption forms vary — Cisco AI Defense (PR #79 PoC + PR #99 production) integrates the full rule pack via a rule-packs CLI; Microsoft AGT (PR #908 PoC + PR #1277 production) integrates 287 rules as PolicyDocument with a weekly auto-sync workflow; Gen Digital Sage (PR #33) ships the rule pack inside the agentic-AI risk-scoring layer. These three count as upstream adoption, separate from Action usage.
Schema Stability Guarantee
If you depend on ATR as upstream, you need to know the format won't break. Here's our commitment:
Published and stable. All new fields are optional additions. No existing field will be removed or renamed without a major version bump.
Breaking changes only happen on major version transitions (v1 → v2). We provide migration guides and a minimum 6-month overlap period where both versions are supported.
New rules are added continuously (avg 2-5 per week during active periods). Every rule passes CI validation + precision test before merge. Subscribe to GitHub Releases for changelogs.
npm install — semver, lockfile controls version
GitHub Action — CI scans with latest rules automatically
Why ATR Instead of Writing Your Own?
License & Legal
Use commercially, modify, distribute, sublicense. No restrictions.
No Contributor License Agreement. Contributions are MIT-licensed and belong to the community.
ATR is not owned by any company. It is a community-governed open standard.
Full ATR rule pack · skill-scanner production (PR #99)
8 threat categories
6 registries · 751 malware
11 merged · 19 under review
Report Threats — Turn Your Endpoints Into Global Sensors
Your scanner found a new threat? Report it to Threat Cloud. ATR crystallizes it into a detection rule, reviews it, and distributes it globally. Your discovery protects everyone.
Case Study: How Cisco Did It
Cisco's AI Defense team integrated ATR rules as an upstream dependency. The first PR #79 (2026-04-03) merged a 34-rule PoC in three days. Follow-up PR #80 built the --rule-packs CLI to consume ATR as a first-class rule source. Production PR #99 (2026-04-22) landed the full ATR rule pack inside Cisco AI Defense's skill-scanner.