Cyber security

Tracecat – Revolutionizing Security Automation With Open Source Excellence

Tracecat is currently in public alpha. If you’d like to use Tracecat in production, please reach out to us on Discord or founders@tracecat.com! Want to take Tracecat for a spin? Try out our tutorials with Tracecat Cloud or self-hosted.

Tracecat is an open source automation platform for security teams. We’re building the features of Tines / Splunk SOAR with:

It’s designed to be simple but powerful. Security automation should be accessible to everyone, including especially understaffed small-to-mid sized teams.

Check out our quickstart and build your first AI workflow in 15 minutes. The easiest way to get started is to sign-up for Tracecat Cloud. We also support self-hosted Tracecat.

Features

Build AI-assisted workflows, enrich alerts, and close cases fast.

  • Workflows
    • Drag-and-drop builder
    • Core primitives (webhook, HTTP, if-else, send email, etc.)
    • AI Actions (label, summarize, enrich etc.)
    • Secrets
    • Batch-stream data transforms (expected April 2024)
    • Formulas (expected May 2024)
    • Versioning (expected June 2024)
  • Case management
  • Event logs
    • Unlimited logs storage
    • Logs search
    • Visual detection rules
    • Piped query language
  • Data validation
    • Pydantic V2 for fast data model and input / output validation in the backend
    • Zod for fast form and input / output validation in the frontend
  • Teams
    • Collaboration
    • Tenants
  • AI infrastructure
    • Vector database for RAG
    • LLM evaluation and security
    • Bring-your-own LLM (OpenAI, Mistral, Anthropic etc.)

Tracecat is not a 1-to-1 mapping of Tines / Splunk SOAR. Our aim is to give technical teams a Tines-like experience, but with a focus on open source and AI features. What do we mean by AI-native?.

For more information click here.

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

How to Prevent Software Supply Chain Attacks

What is a Software Supply Chain Attack? A software supply chain attack occurs when a…

3 days ago

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

2 weeks ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

2 weeks ago

AI-Generated Malware Campaign Scales Threats Through Vibe Coding Techniques

A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…

2 weeks ago

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

2 weeks ago

Fake VPN Download Trap Can Steal Your Work Login in Minutes

People trying to securely connect to work are being tricked into doing the exact opposite.…

2 weeks ago