Architecture
Key Features
Anonymous Sharing
Only SHA-256 hashes and risk scores are shared. No skill content or user data leaves your
machine.
Community Voting
Users confirm or reject threat reports through feedback, building consensus.
LLM Review
Claude Sonnet reviews proposed rules for accuracy before promotion.
Real-time Feeds
IP blocklist, domain blocklist, and ATR rules updated continuously.
API Endpoints
| Endpoint | Method | Description |
|---|---|---|
/api/stats | GET | Threat intelligence statistics |
/api/rules | GET | Browse all community rules |
/api/atr-rules | GET | Fetch confirmed ATR rules |
/api/skill-threats | POST | Submit skill audit results |
/api/feeds/ip-blocklist | GET | IP blocklist feed |
/api/feeds/domain-blocklist | GET | Domain blocklist feed |
Deployment Guide
Deploy your own Threat Cloud instance.
Privacy
How we protect your data.