MISP / CIRCL
已上線CIRCL (Computer Incident Response Center Luxembourg) · 自 2026-05-10 · reference
ATR rule-ID taxonomy + threat-intel galaxy merged into MISP's core distribution
證據連結 →ADOPTERS.md 是這份清單的單一來源。社群採用者自行提 PR 加入,維護者不預先審核;只要 schema 對、有公開可驗證的證據連結就 merge。
共計: 20 個採用者 · ADOPTERS.md →
其本身就是公共財互操作性產出的採用者:由中立機構發佈的分類、規範對應、schema。
CIRCL (Computer Incident Response Center Luxembourg) · 自 2026-05-10 · reference
ATR rule-ID taxonomy + threat-intel galaxy merged into MISP's core distribution
證據連結 →OWASP Foundation · 自 2026-05-11 · reference
ATR rule corpus referenced as the canonical agent-threat detection ruleset in the project's threat catalogue
證據連結 →ATR maintainers (community contribution; NOT a NIST publication) · 自 2026-05-10 (community catalog published; PR opened 2026-05-21) · reference
Community-authored OSCAL catalog covering NIST AI RMF (72 controls + 31 cross-reference links), CC0-licensed, self-published at Agent-Threat-Rule/ai-rmf-oscal-catalog. The catalog has been submitted to the NIST OSCAL team as PR usnistgov/oscal-content#333; the PR is OPEN, the NIST OSCAL maintainer has flagged that scope alignment needs rework, and the ATR maintainers are awaiting NIST direction. Listed here for transparency about the submission, NOT as evidence of NIST endorsement.
證據連結 →CNCF / OpenTelemetry GenAI SIG · 自 2026-05-17 · reference
Proposal for `agent.threat.detection.*` semantic-convention attributes (which ATR populates on agent spans) is in review
證據連結 →在公開、面向客戶的產品中部署 ATR 的採用者。
Cisco · 自 2026-04-22 · rule-import
ATR rule corpus consumed by the AI Defense skill-scanner; matches surface in the Cisco product UI as detection findings
證據連結 →Microsoft · 自 2026-04-26 · rule-import
287-rule ATR expansion auto-synced weekly into the Agent Governance Toolkit detection layer
證據連結 →Gen Digital (Norton / Avast / LifeLock parent) · 自 2026-05-11 · rule-import
Full ATR rule pack integrated into the Sage agentic-AI risk-scoring layer
證據連結 →整合 ATR 的開源開發者工具、框架、SDK。
BerriAI · 自 2026-05-16 · sidecar-proxy
ATR guardrail integration as a LiteLLM proxy callback; scans LLM input + output against the rule corpus at the proxy layer
證據連結 →Promptfoo · 自 2026-04-08 · rule-import
MCP red-team output scanning consumes ATR rules to flag adversarial responses in evaluation runs
證據連結 →NVIDIA · 自 2026-05-20 · rule-import
ATR detector plugin for the garak red-teaming framework
證據連結 →IBM · 自 2026-05-09 · sidecar-proxy
ATR threat-detection plugin for the MCP context-forge proxy
證據連結 →Portkey AI · 自 2026-05-16 · sidecar-proxy
ATR detection plugin in the Portkey gateway plugin architecture
證據連結 →Semgrep Inc. (community contribution) · 自 2026-05-10 · adapter
YAML rule-format adapter that translates Semgrep rule conventions to ATR conformance for skill-manifest + MCP-tool security
證據連結 →AAIF (block/goose) · 自 2026-05-19 · sidecar-proxy
PreToolUse hook denial integrates ATR rule evaluation at the tool-call boundary
證據連結 →SigmaHQ · 自 2026-05-09 · adapter
Cross-listing in the Sigma tools directory; agent-threat-rules listed as a sibling detection-rule format
證據連結 →在公開目錄、awesome-list、文件索引中引用 ATR 的採用者。
Otto Sulin (independent) · 自 2026-05-20 · reference
ATR listed in the MCP Security section
證據連結 →E2B · 自 2026-05-16 · reference
ATR listed in the AI agents awesome-list
證據連結 →E2B · 自 2026-05-16 · reference
ATR listed in the AI SDKs awesome-list
證據連結 →Puliczek (independent) · 自 2026-04-21 · reference
ATR listed in MCP threat-detection tools
證據連結 →提供商業支援、託管引擎、或圍繞 ATR 提供企業 SLA 的供應商。
Panguard AI, Inc.
Hosted ATR engine + enterprise SLAs, compliance evidence module, and runtime guardrails
前往 →需要 spec walkthrough、design review、sample code,或想討論你的整合形狀,就走這條。維護者七天內回覆。
開 issue →整合已經公開可驗證,直接走這條。Schema 對、有 evidence link 就 merge — 維護者不預先審核採用者。
ADOPTERS.md →你的專案使用 ATR?加上這個徽章。