YARA Rules
Built-in detection rule library
vibeware.yarDetects known vibeware signatures and packed PE patterns. Targets strings, byte sequences, and import hash combinations commonly observed in LLM-assisted dropper samples.
entropy.yarFlags high-entropy sections indicative of packing, encryption, or embedded shellcode. Uses section-level entropy calculations to surface obfuscated payloads that evade static signature matching.
Custom Rules
You can extend the built-in rule library by mounting your own .yar files into the container at /app/rules/custom/. All files in that directory are compiled at startup and applied during the first pipeline stage.
Rules can also be synced dynamically via the YARA Rule Sync integration, which exposes a hot-reload endpoint that recompiles the rule set without restarting the service.
Community-contributed rules are reviewed and merged periodically. To submit a rule, open a pull request or visit the Community page.