Open source

Threat intelligence that
cuts through the noise

IVAR pulls from public feeds across the US, EU, and global threat landscape, filters signals against your declared tech stack, and surfaces what actually requires your attention. Add your own RSS or JSON feeds for any source. No commercial platform required.

View live demo View on GitHub
IVAR dashboard showing threat signals, feed status, and 7-day activity chart
Built-in feeds — US, EU, and global
NVD + EPSS GitHub Advisory CERT-EU CERT-FR / ANSSI NCSC-UK Exploit-DB SANS ISC Securelist CISA KEV + custom RSS / JSON
What it does
[ stack ]
Stack-aware filtering

Declare your tech stack once. IVAR matches every incoming signal against it and auto-dismisses what is not relevant. Your queue stays small and actionable.

[ ai ]
AI triage

Optional. Claude, OpenAI, or Ollama for fully local inference. Each signal gets a plain-English summary and confidence score. Catches what rules miss.

[ log ]
Audit trail

Every signal review action is logged with timestamp and reviewer. Exportable as CSV. Useful as compliance evidence for ISO 27001, SOC 2, NIS2, and DORA.

[ flash ]
Flash signals

Confirmed active exploitation always surfaces immediately regardless of stack match. Flash severity means something is being used in the wild right now.

[ private ]
Privacy first

No telemetry, no phone-home, no third-party analytics. Run on EU infrastructure with Ollama and nothing leaves your environment.

[ open ]
Open source

AGPL-3.0 licensed. Self-host on any Linux server or local machine. Full source on GitHub. No vendor lock-in, no usage limits, no account required.

Supports compliance with
ISO 27001 Control 5.7 NIS2 Article 21 DORA Article 13 SOC 2 CRA