Cyber security

Tracecat – Revolutionizing Security Automation With Open Source Excellence

Tracecat is currently in public alpha. If you’d like to use Tracecat in production, please reach out to us on Discord or founders@tracecat.com! Want to take Tracecat for a spin? Try out our tutorials with Tracecat Cloud or self-hosted.

Tracecat is an open source automation platform for security teams. We’re building the features of Tines / Splunk SOAR with:

It’s designed to be simple but powerful. Security automation should be accessible to everyone, including especially understaffed small-to-mid sized teams.

Check out our quickstart and build your first AI workflow in 15 minutes. The easiest way to get started is to sign-up for Tracecat Cloud. We also support self-hosted Tracecat.

Features

Build AI-assisted workflows, enrich alerts, and close cases fast.

  • Workflows
    • Drag-and-drop builder
    • Core primitives (webhook, HTTP, if-else, send email, etc.)
    • AI Actions (label, summarize, enrich etc.)
    • Secrets
    • Batch-stream data transforms (expected April 2024)
    • Formulas (expected May 2024)
    • Versioning (expected June 2024)
  • Case management
  • Event logs
    • Unlimited logs storage
    • Logs search
    • Visual detection rules
    • Piped query language
  • Data validation
    • Pydantic V2 for fast data model and input / output validation in the backend
    • Zod for fast form and input / output validation in the frontend
  • Teams
    • Collaboration
    • Tenants
  • AI infrastructure
    • Vector database for RAG
    • LLM evaluation and security
    • Bring-your-own LLM (OpenAI, Mistral, Anthropic etc.)

Tracecat is not a 1-to-1 mapping of Tines / Splunk SOAR. Our aim is to give technical teams a Tines-like experience, but with a focus on open source and AI features. What do we mean by AI-native?.

For more information click here.

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

SpyAI : Intelligent Malware With Advanced Capabilities

SpyAI is a sophisticated form of malware that leverages advanced technologies to capture and analyze…

14 hours ago

Proxmark3 : The Ultimate Tool For RFID Security And Analysis

The Proxmark3 is a versatile, open-source tool designed for radio-frequency identification (RFID) security analysis, research,…

14 hours ago

Awesome Solana Security : Enhancing Program Development

The "Awesome Solana Security" collection is a comprehensive resource designed to help developers build more…

14 hours ago

IngressNightmare-POCs : Understanding The Vulnerability Exploitation Flow

The "IngressNightmare" vulnerabilities, disclosed in March 2025, represent a critical set of security issues affecting…

15 hours ago

AdaptixC2 : Enhancing Penetration Testing With Advanced Framework Capabilities

AdaptixC2 is an advanced post-exploitation and adversarial emulation framework designed specifically for penetration testers. It…

15 hours ago

Bincrypter : Enhancing Linux Binary Security through Runtime Encryption And Obfuscation

Bincrypter is a powerful Linux binary runtime crypter written in BASH. It is designed to…

15 hours ago