We used to protect people.
Now we protect agents.

0
Rules
0
Categories
0%
Precision

The open detection standard for AI agent threats. YAML rules. MIT Licensed. No lock-in.

scroll
30
MCP vulnerabilities in 60 days

AI agents now browse the web, execute code, and call external tools. Attackers trick them into leaking credentials, running reverse shells, and ignoring safety boundaries. The attack surface grows faster than any team can write rules by hand.

0rules

Across 9 threat categories. Each mapped to real CVEs and OWASP standards.

0%%

Precision on 850 adversarial samples. External PINT benchmark.

<0ms

99% of events resolve at Tier 0-2. Zero API cost.

0skills

Scanned across OpenClaw + Skills.sh. 3,255 CRITICAL. 2,656 HIGH.

0/10

OWASP Agentic Top 10 categories fully covered.

0%%

SAFE-MCP technique coverage. 78 of 85.

What ATR Detects

9 threat categories. 100 rules. Real CVEs.

Each rule links to OWASP, MITRE ATLAS, and documented exploits.

Already in production

Cisco AI Defense ships 34 ATR rules as upstream.

Their engineer submitted a PR. We reviewed it. It merged in 3 days. 1,272 additions. Then they built a --rule-packs CLI specifically to consume ATR.

OWASP Agentic Top 10
0/10
Full category coverage
SAFE-MCP (OpenSSF)
0%
78 of 85 techniques
OWASP Skills Top 10
0/10
3 are process-level gaps
PINT Benchmark
0
F1 on 850 external samples
Ecosystem

4 merged. 7 pending. 11 total PRs.

ATR spreads through PRs, not sales calls. Each merge is irreversible adoption.

Cisco AI Defensemerged

34 ATR rules merged as upstream. Built --rule-packs CLI for ATR.

View PR →
OWASP Agentic Top 10merged

ATR detection mapping merged into official OWASP project.

View PR →
precize OWASPmerged

ATR listed as detection tool in OWASP resource collection.

SAFE-MCP (OpenSSF)open

PR #187 submitted. 78/85 technique coverage mapping.

Awesome LLM Securityopen

PR #117 submitted to curated security tools list.

Awesome MCP Securityopen

PR #87 submitted to MCP security resource list.

OpenClaw Registryopen

PR #58172 submitted. Fixed and waiting review.

OWASP LLM Top 10open

PR #814 submitted for ATR integration reference.

Awesome LM-SSPmerged

PR #108 merged into LLM safety/security list.

Awesome Agentic Patternsopen

PR #58 submitted. CI config issue on their end.

Awesome MCP Serversopen

PR #3976 submitted. Needs Glama registration.

Live Scan Data
Mega Scan
0
skills scanned
Threats Found
0
flagged (11.1%)
Sources
OpenClaw: 50,285
Skills.sh: 3,115
Avg Latency
0ms
per skill scan
Why ATR

Why not write your own rules?

ATR vs alternatives. The honest comparison.

ATRWrite Your OwnSigmaMS Agent Governance
Threat modelAI agent runtime + skill supply chainYou defineSIEM logs (network/endpoint)Policy engine (allow/deny)
DetectionRegex + behavioral + LLM-as-judgeYour approachLog correlationPolicy evaluation
New attack response< 1 hour (crystallization)Depends on teamCommunity PRWrite policy yourself
MaintenanceCommunity-maintained, zero costAll on youCommunityMicrosoft-maintained
OWASP10/10 Agentic + 7/10 AST10----10/10 Agentic
Relationship----Complementary (different threat surface)Complementary (ATR detects, MS enforces)

Sigma detects SIEM logs. ATR detects AI agent runtime threats. Microsoft enforces policies. These are complementary, not competing. ATR is the detection layer — other tools consume ATR rules as upstream.

The Future

ATR rules don't have to be written by hand.

Threat Cloud crystallization turns new attacks into detection rules automatically.

1.New attack pattern detected in the wild
|
2.LLM analyzes attack structure + intent
|
3.Auto-generates YAML rule proposal
|
4.Community reviews + precision test
|
5.Merged into ATR. Every engine updates.

Other standards need committees and months of review. ATR crystallizes new rules in hours.

01
Report an Evasion

Found a bypass? File an issue. 15 minutes. Most valuable contribution.

02
Report a False Positive

Rule triggered on legit content? Help us tune precision. 20 minutes.

03
Submit a New Rule

Write a detection rule with the ATR schema. Full walkthrough. 1-2 hours.

04
AI-Native Contribution

Use Claude Code or Cursor with ATR's MCP server. The AI writes the YAML. You review it.

Add ATR to your platform.

Four paths. TypeScript, Python, raw YAML, or SIEM queries. The same path Cisco walked.

$ npm install agent-threat-rules