nur

collective security intelligence

Every company is an algorithm — 20+ decisions, all starving for data. nur is the data layer that feeds them.

189 Contributions
112 Threat Signals
36 Vendors

Built from 21 IOC bundles, 91 attack maps, and 77 vendor evaluations. 30 unique vendors currently appear in contributed data.

Contribute once. Query forever. Verify every result.

nur is designed so industries can exchange signal without turning raw incident data into another product for someone else.

Contribute

Upload anonymized evals, attack maps, or IOCs. Your data is committed, aggregated, and individual values are discarded.

Query

Get vendor benchmarks, detection gaps, and remediation intel — all from aggregate histograms, never individual data.

Verify

Every aggregate comes with a cryptographic proof. Merkle trees, commitment hashes, server signatures. Math, not promises.

Your company is an algorithm.

20+ decisions run your org — vendor selection, threat triage, budget approval, compliance review. Every handoff between them is a data contract. Most of those contracts are empty today.

Vendor Selection

The “Select Vendor” diamond needs detection rates, pricing, and support data from real practitioners — not Gartner quadrants.

Threat Response

The “Accept / Mitigate / Transfer” diamond needs what peers actually did when they got hit — not a vendor whitepaper.

Every Handoff

nur fills data contracts with cryptographically verified intelligence. Each receipt is a signed data contract between your org and the collective.

CLI in four lines.

Install the client, initialize your key material locally, register your work email, then contribute an incident report.

pip install nur
nur init
nur register you@yourorg.com
nur report incident.json