Detection Engine
Security Rule Taxonomy
177 detection rules across 17 threat categories and 67 sub-categories. Every rule is backed by OWASP, MITRE ATLAS, or real-world CVEs. No LLMs. Deterministic.
PIPrompt Injection
14TPTool Poisoning
8CICode Injection
9DEData Exfiltration
9PVPrivilege & Permissions
9ICInsecure Config
14DVDependency Vulns
7SCSupply Chain
5ATAuthentication
6AIAdversarial AI
8CGCompliance & Governance
14SASupply Chain Advanced
15MRAI Runtime Exploitation
9PEProtocol Edge Cases
15DPData Privacy Attacks
10IRInfrastructure Runtime
10CECross-Ecosystem Emergent
15177Rules
17Categories
67Sub-categories
9Frameworks
4Handler Types
Security Category Deep Dive
Select a category to explore sub-categories, findings, and compliance coverage.