What is ATR?
ATR rules detect threats that traditional security tools miss:- Prompt injection in MCP tool responses
- Tool poisoning via hidden instructions
- Data exfiltration through agent actions
- Privilege escalation via skill manipulation
- Supply chain attacks on skill registries
- Credential theft via agent tool calls
- Inter-agent manipulation in multi-agent systems
By the Numbers
| 101 rules | Covering 9 threat categories |
| OWASP 10/10 | Full coverage of OWASP Agentic Top 10 |
| 96.9% recall | On SKILL.md benchmark (100% precision, 0% FP) |
| 62.7% recall | On PINT MCP benchmark (99.7% precision) |
| 90,000+ skills | Scanned across registries |
| 520+ patterns | Unique detection signatures |
| < 3ms scan time | Per skill (regex layer) |
OWASP Agentic Top 10 Coverage
ATR provides executable detection rules for every OWASP category:| OWASP Category | ATR Rules | Coverage |
|---|---|---|
| ASI01: Agent Goal Hijack | 13 | STRONG |
| ASI02: Tool Misuse & Exploitation | 11 | STRONG |
| ASI03: Identity & Privilege Abuse | 9 | STRONG |
| ASI04: Agentic Supply Chain | 8 | STRONG |
| ASI05: Unexpected Code Execution | 8 | STRONG |
| ASI06: Memory & Context Poisoning | 8 | STRONG |
| ASI07: Inter-Agent Communication | 5 | MODERATE |
| ASI08: Cascading Failures | 4 | MODERATE |
| ASI09: Human-Agent Trust | 5 | MODERATE |
| ASI10: Rogue Agents | 7 | MODERATE |
OWASP provides a checklist. ATR provides the executable rules. Use ATR to turn OWASP compliance from a PDF exercise into automated detection.
Three Detection Layers
| Layer | Method | Speed | Coverage |
|---|---|---|---|
| Layer 1 | Regex pattern matching | 3ms | Known patterns |
| Layer 2 | Content fingerprinting | ~200ms | Variants |
| Layer 3 | LLM-as-judge | ~3s | Novel threats |
Threat Crystallization
When the LLM layer (Layer 3) discovers a new attack pattern, ATR crystallizes it into a deterministic regex rule:- LLM detects novel threat pattern
- RuleScaffolder generates a new regex rule
- Shadow mode validates against 1,000 samples (FP < 0.1%)
- Rule promoted and distributed via Threat Cloud (< 1 hour)
- Next occurrence caught by Layer 1 at 3ms — no LLM needed
Research Paper
Agent Threat Rules: A Community-Driven Detection Standard for AI Agent Security Zenodo DOI: 10.5281/zenodo.19178002The paper documents: threat taxonomy, detection architecture, PINT benchmark evaluation, and 64 known evasion techniques (published transparently).
Getting Started
ATR on GitHub
Browse rules, contribute, and star the project.
OWASP Mapping
Full rule-by-rule mapping to OWASP Agentic Top 10.