What can SARA do?

SARA is a free AI security analyst by SIRP. Ask about threats, enrich IOCs, triage alerts, manage incidents, and automate response — all from chat.

What's new

Composer

Click the + button to the left of the chat input to open the composer menu. It collapses file uploads, templates, capability toggles, and skills into one place.

The + menu New
Add files or photos
Opens the file picker. SARA accepts .eml, .pdf, .docx, .json, .csv, .txt, .html, .yaml, plus images (.png, .jpg, .gif, .webp). 5 MB per file.
Take a screenshot
Captures a window or your whole screen directly from the browser and attaches the PNG. No downloads, no third-party tools.
Alert JSON / Phishing / IOC templates
One-click to load a starter prompt for the three most common task shapes.
Skills ›
Fly-out submenu with the 4 built-in reasoning personas (see Skills).
Research
When on, SARA is instructed to consult multiple sources, contrast conflicting views, and cite each inline. Err on the side of thoroughness over brevity.
Web search
Default on. When a KB miss is detected, SARA queries the live web. Toggle off to keep the answer strictly offline (KB only).
Settings
Jumps to Settings for tenant connection, skills management, and profile.
State chips

Whatever you've turned on in the menu shows as a chip next to the + button. Click any chip to toggle it off.

Web
Web search is on (the default). Click to turn off.
Web off
Web search is off — SARA will answer from its knowledge base only.
Research
Research mode is active for the next message.
Phishing Triage
A skill is active. Every message goes through that skill's reasoning framework until you remove it.
Keyboard shortcuts
Enter
Send the current message.
Shift + Enter
New line without sending.
⌘ K / Ctrl K
Search your saved chats.
/
Jump focus back to the chat input from anywhere on the page.

Security Knowledge

No account required. Ask any cybersecurity question.

Definitions & Concepts Free
What is credential stuffing? Explain lateral movement What is a zero-day vulnerability?
Incident Response Guidance Free
How should I respond to ransomware? Steps to investigate a BEC attack Checklist for hardening Active Directory
CVE & Vulnerability Lookup Free
What is CVE-2024-3400? Tell me about Log4Shell Latest critical vulnerabilities
Threat Intelligence Free
Tell me about APT29 What TTPs does Lazarus Group use? Compare APT28 vs APT29

IOC Enrichment & Analysis

Paste IPs, hashes, domains, or URLs for instant threat intelligence from 8+ sources.

IOC Enrichment Free
Check this IP: 185.220.101.34 Analyze hash a3f9b2c847de... Is this domain malicious? evil.com
Phishing & Email Analysis Free
Is this phishing? Check this URL: https://suspicious.com/login

Paste the full email with headers. SARA runs 25+ checks: SPF/DKIM/DMARC, DKIM signing-domain mismatch, RFC 2047 encoding, invisible Unicode, Base64 URL decoding, and auto-generates a Sigma detection rule.

Alert Triage Free
Triage this SIEM alert: [paste JSON] Analyze this CEF log: [paste] Triage this CrowdStrike detection: [paste]

Supports JSON, CEF, LEEF, syslog, Windows Event Log, and Kibana/ELK formats. Auto-decodes Base64 payloads, maps MITRE ATT&CK chain, and generates Sigma rules.

Detection Engineering Free
Write a Sigma rule for PowerShell abuse Explain MITRE T1059.001 Write a KQL query for lateral movement
Auto-Generated Sigma Rules Free

When you analyze a phishing email or triage an alert, SARA auto-generates a copy-paste-ready Sigma detection rule matching the attack pattern. Validated syntax — deploy to your SIEM.

Attachments

SARA accepts uploaded files and auto-extracts their content into the next message.

Supported formats

Emails: .eml, .msg. Documents: .pdf, .docx, .doc, .html, .md. Data: .json, .csv, .yaml, .xml, .log, .txt, .conf, .ini, .cfg. Images: .png, .jpg, .jpeg, .gif, .webp. Max 5 MB per file.

How uploads work

Drag & drop or pick via the + menu. SARA extracts text, shows a chip above the textarea, and sends the content with your next message. Large files are truncated to fit the context window.

Injection scan

Extracted text is scanned for prompt-injection patterns. When something unusual is detected, SARA logs and tags the upload but never silently rejects it — legitimate samples (phishing emails, pen-test reports, documented prompt-attack analyses) often contain instruction-looking phrases verbatim.

Screenshots

Use Take a screenshot from the + menu. Your browser asks which window or screen to capture, then SARA attaches the PNG. No desktop app required.

Skills

A skill is a reasoning preset that customizes how SARA investigates. Pick one from the + menu's Skills › submenu; it stays active across messages until you deactivate it.

Phishing Triage Free

An 8-step NIST SP 800-61 framework: header auth checks, From/Reply-To/Return-Path mismatches, URL + domain reputation, urgency / impersonation language, new-domain flags, and cross-reference with known campaigns.

Incident Response Free

PICERL methodology (Preparation → Identification → Containment → Eradication → Recovery → Lessons). SARA structures its answer around the current phase and suggests concrete next actions.

Threat Hunting Free

Hypothesis-driven evidence assessment. SARA turns your query into a falsifiable hypothesis, maps the hunt to MITRE ATT&CK, and flags contradicting evidence.

Vulnerability Assessment Free

CVE deep dive with exploit + exposure check. CVSS vector breakdown, EPSS interpretation, KEV status, affected components, fix paths, and compensating controls.

Custom skills. Settings → Skills lets you write your own in markdown — set identity, investigation steps, output template. Custom skills show up in the same submenu alongside the built-ins.

Tenant Operations

Connect your OmniSense tenant in Settings to unlock live incident management.

Incident Management OmniSense
Show me my incidents Open P1 alerts Show me my phishing incidents Show closed cases Analyze incident 266279 Analyze case 55032 Analyze alert 100 Show me incident 266279 What happened in incident 266279?
Agent Execution OmniSense
Run enrichment on incident 266279 Classify incident 55032 Run analysis on incident 266279 Run all agents on incident 266279 Run triage on my latest incident Run triage and analysis on incident 210

Modifiers you can append to any agent command:
just show — display results in chat without writing to OmniSense.
assist mode — same as above; produces a draft analyst response you can review.
don't save — skip all tenant-side persistence (comments, attachments, status changes).

SOC Metrics & Analytics OmniSense
What's our MTTR? Show me MTTD Mean time to handle alerts Any SLA breaches? Show SLA compliance Who has the most incidents? Analyst workload Are incidents increasing? Show security trends How are we doing this week? Security posture False positive rate Weekly report
Assets OmniSense
Show me my assets Details on SERVER-DC-01 What's the risk on SERVER-DC-01?

Response Actions & Playbooks

Execute containment actions and automate response workflows.

Response Actions OmniSense
Block IP 192.168.1.100 Quarantine host WORKSTATION-05 Disable user john.doe What actions can I take? Show action catalog
SIRP Actions OmniSense
Change priority to P1 on incident 266279 Set severity to SEV1 on incident 266279 Change status to closed on incident 266279 Change state to case on incident 266279 Set disposition to false-positive on incident 266279 Change category to phishing on incident 266279 Close incident 266279 Add comment 'Confirmed benign' on incident 266279

Update any incident field directly from chat: priority, severity, status, state, disposition, category, and comments.

Playbooks OmniSense
Show my playbooks Run phishing playbook on incident 266279 Create a ransomware IR playbook Create a BEC response playbook
Custom Plugins Pro
Block IP on CrowdStrike (Create custom triggers in Settings → Plugins)
Multi-Tenant (MSSP) OmniSense
Show my tenants Switch to Rewterz

Investigation Workspace

Persistent analyst workbench with SARA as your co-analyst. Open Workspaces →

Create from Chat Registered+
Investigate incident 266279 Create workspace for alert 261282

Auto-creates a workspace with IOCs, assets, and timeline pulled from OmniSense.

Workspace features

Pin IOCs with verdict / score, build timelines, map MITRE ATT&CK, keep analyst notes, link related incidents, set verdicts (TP / FP / Ongoing), export as Markdown or HTML. Templates: Malware, Phishing, Insider Threat, Ransomware.

Plan / Edit / Auto modes

Plan — SARA proposes an investigation plan you approve step-by-step. Edit — SARA drafts changes; you review before they apply. Auto — SARA executes investigation steps directly, flagging high-risk actions for confirmation.

SARA co-analyst

Chat panel with full workspace context. Ask "Enrich all IOCs", "Analyze attack pattern", "Summarize investigation", or "What's missing?" IOCs SARA finds auto-pin to the canvas.

Threat Pulse

Live threat intelligence dashboard. Open Pulse →

Briefing

Shift-change summary pulling together CISA KEV additions, NVD criticals (CVSS ≥ 9), EPSS movers, and live headlines from 20+ configured feeds.

Threats

Trending IOCs (24h), active ransomware groups (feeds ransomware.live + abuse.ch), community spotlight (SANS ISC + advisories), and a rotating "detection rule of the day".

Detections

MITRE ATT&CK technique trends, Sigma rule corpus, and KEV-to-technique mapping.

News & Advisories

Auto-classified security headlines, CVE advisories, and vendor PSIRT bulletins. Sidebar tracks new KEV additions and top EPSS movers in real time.

Features

Export & Share

Export any chat as PDF report or Markdown. Share a read-only link to any conversation. PDF includes branded header, styled tables, verdict badges, and Sigma rules.

Sessions & Projects

All chats save automatically to the sidebar. Group related sessions into Projects (Pro+) and rename any session on the fly.

Saved templates

Save frequently-used prompts as reusable templates. Click "Save" on any message, give it a name, and it appears as a pill above the composer.

Voice input

Click the microphone button to dictate queries. Uses the browser's built-in speech recognition — no data sent to third parties.

Streaming controls

Stop, regenerate, or copy any response mid-stream. Cancelled messages are clearly marked so you always know where you left off.

Dark & Light theme

Toggle via the moon icon in the top bar. Follows your system preference by default.

API access Pro

Integrate SARA into your SOAR or SIEM. OpenAI-compatible endpoints. API docs →

Feedback

Thumbs up / down on any response. Add an optional comment for context — it goes straight into SARA's quality-review pipeline.

Multi-turn conversations work! Ask "Analyze incident 266279", then follow up with "Run enrichment on it" or "Run all agents on it" — SARA remembers the incident from context. You can also say "Show me incident 266279" for details only, or "Analyze" for the full pipeline (enrichment → classification → analysis → remediation).

Privacy & Security

How SARA handles your data, and what we do on the back end to keep responses honest.

Cloud toggle

Flip save_to_cloud off in the request body (or via the OmniSense embed's Cloud switch) to keep message content out of our trace logs. The query text is redacted to a sentinel so we still record latency / mode but never the raw input.

PII redaction

When Cloud is off, emails / IPs / hostnames are redacted before being sent to the LLM and fully masked in our audit trail.

Prompt-injection defense

A three-class prefilter (instruction extraction, raw attack payload, off-topic) short-circuits unsafe prompts before the LLM is called. Uploaded attachments are also scanned, tagged, and logged — but never silently rejected.

Output review

Every SARA response is scored against a gold-standard format contract (sections, MITRE pills, sigma rules, citations). Low-scoring responses surface in the admin dashboard for review.

Rate limits

Per-hour quotas by plan (see Plans). Anonymous users get a shared global budget; signed-in users get their own.

No third-party LLMs by default

SARA Open routes simple queries through its own fine-tuned Llama-4 deployment and complex reasoning through Anthropic Claude. No OpenAI, no Google — see Privacy for the full list.

Plans

Free

10 messages / hr. Basic IOC enrichment. 7-day chat history. No account required.

Registered sign in with Google

50 messages / hr. Web search. 7-day history. Sign in with a company email for a free 7-day Pro trial.

Pro $29/mo

200 messages / hr. Full enrichment. OmniSense tenant connect. Custom plugins (5). API keys (3). Unlimited history.

Team $79/mo

500 messages / hr, per seat. Up to 5 seats per team. Everything in Pro. Custom plugins (20). API keys (10).

SARA — Free AI Security Analyst by SIRP  ·  Terms  ·  Privacy  ·  Feedback