Threat Detection Matrix
The analysis pipeline detects 13 threat categories using a combination of YARA pattern matching, LLM semantic analysis, and sandbox execution monitoring.
Prompt Injection
CRITICALYARA:3 rules
LLM:✓ Active
Sandbox:✓ Active
Command Injection
CRITICALYARA:2 rules
LLM:✓ Active
Sandbox:✓ Active
Credential Harvesting
CRITICALYARA:1 rule
LLM:✓ Active
Sandbox:✓ Active
Data Exfiltration
CRITICALYARA:1 rule
LLM:✓ Active
Sandbox:✓ Active
SQL Injection
CRITICALYARA:1 rule
LLM:✓ Active
Sandbox:○ N/A
System Manipulation
HIGHYARA:1 rule
LLM:✓ Active
Sandbox:✓ Active
Unicode Steganography
HIGHYARA:1 rule
LLM:✓ Active
Sandbox:○ N/A
Autonomy Abuse
MEDIUMYARA:1 rule
LLM:✓ Active
Sandbox:○ N/A
Capability Inflation
MEDIUMYARA:1 rule
LLM:✓ Active
Sandbox:○ N/A
Detection Coverage
13
YARA Rules
9
Threat Categories
3
Analysis Engines