Threat Intelligence
Threat intelligence provides structured information about known attackers, malicious IPs, domains, URLs, and malware signatures. Panguard automatically queries these databases to determine whether activity on your system is linked to known threats.You do not need to understand the technical details. Guard handles the queries automatically, and
Chat explains the results in plain language.
5 Built-in Threat Intelligence Feeds
abuse.ch Suite
| Source | Indicator Types | Description |
|---|---|---|
| ThreatFox | IP, domain, URL, hash | Database of indicators of compromise (IoCs) linked to malware campaigns |
| URLhaus | URL | Database of malware distribution URLs |
| Feodo Tracker | IP | Botnet Command and Control (C2) server tracking |
Additional Sources
Feed Update Schedule
| Feed | Update Frequency | Query Type |
|---|---|---|
| ThreatFox | Every hour | Cached locally |
| URLhaus | Every hour | Cached locally |
| Feodo Tracker | Every hour | Cached locally |
| GreyNoise | Real-time per query | API call |
| AbuseIPDB | Real-time per query | API call |
Local Caching
Query results are cached locally to avoid redundant lookups:- Cache duration: 1-24 hours depending on the source
- Cache location: Guard data directory
- Expired entries are cleaned up automatically
Indicators of Compromise (IoCs)
Threat intelligence tracks the following types of indicators:| Type | Description | Example |
|---|---|---|
| IP Address | Known malicious IP | 203.0.113.50 |
| Domain | Malicious domain name | malware.example.com |
| URL | Malicious URL | http://evil.com/payload.exe |
| File Hash | Malware fingerprint (SHA-256) | e3b0c44298fc1c149a... |
| Phishing email address | phish@attacker.com |
Automatic Querying
Guard automatically queries threat intelligence when it detects suspicious activity:Threat Cloud — Collective Intelligence
Beyond public feeds, Panguard users contribute to and benefit from the Threat Cloud, a community-driven collective intelligence network focused on ATR (Agent Threat Rules) consensus.The Crystallization Flywheel
Threat Cloud’s core value proposition is the crystallization flywheel — a self-reinforcing loop where individual scan findings are refined into community-confirmed detection rules:- Scan — Any Panguard scanner (CLI, Website, or Guard) scans an MCP skill
- Propose — High-severity findings generate an ATR proposal identified by a pattern hash
- Confirm — Other scanners encountering the same pattern hash confirm the proposal
- Promote — At 3+ independent confirmations, the proposal is auto-promoted to a confirmed rule
- Distribute — Confirmed rules are served via
GET /api/atr-rulesto all scanners - Strengthen — Scanners load new rules, improving detection, generating more proposals
scan:{skillName}:{findingSummary}, SHA-256 truncated to 16 hex characters. Because all scanners use the same @panguard-ai/scan-core library, they produce identical hashes for the same threat pattern regardless of whether the scan originated from CLI, Website, or Guard.
LLM Reviewer
Threat Cloud includes an automated LLM reviewer (Claude Sonnet 4) that evaluates ATR proposals for false positive risk, coverage, detection specificity, and YAML validity. Proposals can be promoted through community consensus alone (3+ confirmations) or through LLM approval combined with community confirmation.IoC Feeds
Threat Cloud also distributes traditional IoC feeds (IP blocklists, domain blocklists) and maintains a community skill blacklist. These complement the ATR rule pipeline for network-level threat indicators.Privacy and Data Protection
| Privacy Measure | Details |
|---|---|
| IP anonymization | Source IPs are /16-anonymized before upload |
| GDPR compliance | No personal data is collected or stored |
| Zero raw data | No log content, file content, or system details are transmitted |
| Zero telemetry | No usage analytics, crash reports, or behavioral tracking |
| Opt-out available | Threat Cloud can be fully disabled |
Offline Mode
Panguard works fully offline. When threat intelligence feeds are unreachable:- Layer 1 rule engine continues operating with locally cached rules
- Previously cached feed data remains available until expiration
- New detections rely on ATR rules and behavioral baselines only
- Score adjustments reflect reduced intelligence coverage
Offline mode disables Threat Cloud participation and real-time feed queries. Cached data is still
used until it expires.
Viewing Threat Intelligence
Guard Status
Chat Notifications
When threat intelligence matches activity on your system, Chat notifies you in a format tailored to your user role:- Boss Role
- Developer Role
- IT Admin Role
Related
Threat Cloud Deployment
Deploy your own private Threat Cloud server.
Three-Layer AI Funnel
How threat intelligence integrates with the detection pipeline.