Skip to content

The open workflow automation platform for security and IT engineers. Built on a simple YAML-based DSL for sharing integrations and response-as-code.

License

Notifications You must be signed in to change notification settings

TracecatHQ/tracecat

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
The workflow automation platform for security and IT response engineering.

Commits License Discord

Tracecat is a modern, open source workflow automation platform built for security and IT engineers. Simple YAML-based templates for integrations with a no-code UI for workflows. Executed using Temporal for scale and reliability.

We're on a mission to make security and IT automation more accessible through response-as-code. What Sigma rules did for detection and Nuclei did for vulnerability scanning, Tracecat is doing for response automation.

Getting Started

Important

Tracecat is in active development. Expect breaking changes with releases. Review the release changelog before updating.

Run Tracecat locally

Deploy a local Tracecat stack using Docker Compose. View full instructions here.

# Download Tracecat
git clone https://github.com/TracecatHQ/tracecat.git

# Setup environment variables
./env.sh

# Run Tracecat
docker compose up -d

Go to http://localhost to access the UI. Sign-up with your email and password (min 12 characters). The first user to sign-up and login will be the superadmin for the instance. The API docs is accessible at http://localhost/api/docs.

Run Tracecat on AWS Fargate

For advanced users: deploy a production-ready Tracecat stack on AWS Fargate using Terraform. View full instructions here.

# Download Terraform files
git clone https://github.com/TracecatHQ/tracecat.git
cd tracecat/deployments/aws

# Create and add encryption keys to AWS Secrets Manager
./scripts/create-aws-secrets.sh

# Run Terraform to deploy Tracecat
terraform init
terraform apply

Run Tracecat on Kubernetes

Coming soon.

Community

Have questions? Feedback? New integration ideas for the project? Join the Tracecat Community Discord and come hang out with us.

Tracecat Registry

Tracecat Registry

Tracecat Registry is a collection of integration templates for response actions. Security response actions are organized by MITRE D3FEND categories. Arguments are normalized to fit the Open Cyber Security Schema (OCSF) ontology where possible.

The templates are written in YAML which specifies a simple human-readable format to quickly define normalized integrations. We run a paid integrations bounty program for our contributors (coming soon).

Examples

Visit our documentation on Tracecat Registry for use cases and ideas. Or check out existing open source templates in our repo.

Open Source vs Enterprise

This repo is available under the AGPL-3.0 license with the exception of the ee directory. The ee directory contains paid enterprise features requiring a Tracecat Enterprise license.

Tracecat Enteprise builds on top of Tracecat OSS, optimized for mixed ETL and network workloads at enterprise scale. Powered by serverless workflow execution (AWS Lambda and Knative) and S3-compatible object storage.

If you are interested in Tracecat's Enterprise self-hosted or managed Cloud offering, check out our website or book a meeting with us.

Security

SSO, audit logs, and IaaC deployments (Terraform, Kubernetes / Helm) will always be free and available. We're working on a comprehensive list of Tracecat's threat model, security features, and hardening recommendations. For immediate answers to these questions, please reach to us on Discord.

Please report any security issues to [email protected] and include tracecat in the subject line.

Contributors

Thank you all our amazing contributors for contributing code, integrations, and support. Open source is only possible because of you. ❤️



Tracecat is distributed under AGPL-3.0