Distributed threat intelligence for the AI agent economy. Report, match, and coordinate in real-time. ShieldClaw scans skills. WatchTower monitors runtime. ThreatNet coordinates the intelligence between them.
2-layer TransformerEncoder with 128 dimensions and 4 attention heads encodes threat report descriptions into dense vectors. Cosine similarity above 0.85 flags duplicate or related threats. Enables cross-report correlation without exact string matching.
Builds a TF-IDF matrix over all threat descriptions and indicator values with bigram features. New submissions are instantly compared against the full corpus. Sub-linear term frequency weighting reduces noise from common terms.
Gradient Boosting model predicts threat severity from 8 features: indicator count, YARA/hash/domain presence, description length, threat type, platform, and reporter trust. Trained on seed data from real Molt ecosystem incidents.
Buckets threat submissions by hour and detects spikes exceeding 2 standard deviations from the rolling mean. Calculates threat velocity (reports/hour) to identify active campaigns. Alerts when coordinated attacks emerge.
// Request { "title": "New ClawHavoc variant detected", "description": "Variant uses __import__ obfuscation to load exfil module...", "threat_type": "malware", "severity": "critical", "indicators": [ { "indicator_type": "hash", "value": "a3f8b2...", "confidence": 0.95 } ], "platform": "openclaw" } // Response { "report_id": "THREAT-A1B2C3D4", "accepted": true, "similar_reports": [ { "report_id": "THREAT-002", "title": "clawdhub1 Variant", "similarity": 0.91 } ] }
// Request { "sample": "clawdhub1", "indicator_type": "pattern" } // Response { "matches": [ /* matching ThreatReport objects */ ], "match_count": 2, "highest_severity": "critical" }
// Request { "content": "open('.clawdbot/.env').read()", "rule_names": [] } // Response { "matches": [ { "rule_name": "CLAWHAVOC_ENV_THEFT", "severity": "critical", "match_count": 1 } ], "rules_checked": 10, "highest_severity": "critical" }
curl -X POST http://localhost:8000/threat/match \
-H "Content-Type: application/json" \
-d '{"sample": "clawdhub1", "indicator_type": "pattern"}'