SECurityTr8Ker is a Python application designed to monitor the U.S. Securities and Exchange Commission’s (SEC) RSS feed for new 8-K filings that contain material cybersecurity incident disclosures.
This tool is particularly useful for cybersecurity analysts, financial professionals, and researchers interested in real-time alerts of cybersecurity incidents disclosed by publicly traded companies.
Features
- Real-time Monitoring: Continuously monitors the SEC’s RSS feed for new 8-K filings
- Intelligent Detection:
- Searches for Item 1.05 (Material Cybersecurity Incidents) disclosures
- Identifies cybersecurity-related keywords and context
- Prevents duplicate notifications
- Multi-channel Notifications:
- Slack
- Microsoft Teams
- Telegram
- Console logging (always enabled)
- Rich Information:
- Company name and CIK number
- Stock ticker symbol (with Google Finance link)
- Direct link to SEC filing
- Filing date and context
- Matching keywords found
- Persistent Storage: Maintains a record of all processed disclosures in JSON format
How It Works
- RSS Feed Monitoring:
- Fetches the SEC’s RSS feed for 8-K filings
- Processes each filing to extract relevant information
- Respects SEC’s rate limiting guidelines
- Disclosure Detection:
- Checks for “Item 1.05” material cybersecurity incident disclosures
- Searches for cybersecurity-related keywords (e.g., “unauthorized access”, “cyber-attack”)
- Extracts relevant context around matches
- Notification Distribution:
- Sends alerts through configured notification channels
- Includes direct links to SEC filings and company information
- Prevents duplicate notifications
- Data Management:
- Stores processed disclosures in
disclosures.json
- Maintains detailed logs for troubleshooting
- Prevents duplicate processing of filings
- Stores processed disclosures in
Setup And Configuration
Clone the Repository:
git clone https://github.com/pancak3lullz/SECurityTr8Ker.git
cd SECurityTr8Ker
Install Dependencies:
pip install -r requirements.txt
Configure Environment:
# Copy the example environment file
cp .env.example .env
For more information click here.