Detect indicators on webpages
Indicators of compromise — IPs, domains, URLs, hashes, CVEs — surfaced where they appear in alerts, tickets, dashboards, and reports.
Local-first IOC enrichment for analysts.
Vera5 brings indicator context directly into analyst workflows without requiring a Vera5 cloud service. Detect indicators on the page you are already on. Enrich them with the sources you choose. Keep the investigation in one place.
In active development
The friction
Analysts copy indicators between tabs, paste them into enrichment portals, switch back to the alert, re-orient, then repeat. Each lookup is small. The cumulative cost is not.
Context fragments across tools. Pivots interrupt focus. The original page — the alert, the report, the ticket — becomes one of many windows competing for attention.
What Vera5 does
Indicators of compromise — IPs, domains, URLs, hashes, CVEs — surfaced where they appear in alerts, tickets, dashboards, and reports.
Aggregate context from analyst-configured threat intelligence sources into a compact hover card. No tab-switching, no manual lookup loop.
Every enrichment field shows the source that produced it. Disagreement between sources stays visible — never collapsed into a single opaque score.
Enrichment runs from the browser using your own API keys. No required Vera5 backend, no maintainer-operated proxy, no shared quota pool.
Toggle sources, IOC types, and automatic scanning. Manual-only mode is supported. Cache behavior is visible and clearable.
Trust model
API credentials for enrichment sources stay in browser local storage. Vera5 does not proxy or pool them.
The extension operates locally. There is no Vera5-managed account, no shared backend, and no required hosted service to run enrichment.
Vera5 does not collect usage metrics, error reports, browsing history, or analyst identity by default.
Full page content is never transmitted. Only indicators an analyst chooses to enrich leave the machine.
External APIs receive only the specific indicators selected for enrichment — nothing else from the page or session.
Built for
Current status
The current focus is the browser extension scaffold, indicator detection, and the first enrichment connectors. CLI support and an optional local backend are planned for later releases.
Initial integration targets — AbuseIPDB, AlienVault OTX, URLScan, GreyNoise Community, and RDAP — are in development. Additional sources, an optional self-hosted backend, and an opt-in local LLM summary layer are part of the longer-term direction outlined in the product vision.
Public documentation and source code are being prepared alongside the extension.
Design principles
Readability and speed before visual gimmicks.
Decisions about what gets queried, cached, and shown stay with the operator.
Sources are always visible. Disagreement is surfaced, not averaged away.
Cloud dependency is opt-in, never required.
The code is auditable. The trust model is documented, not assumed.