ACE-T SPECTRUM v3 is the active release of the Advanced Cyber-Enabled Threat Intelligence platform. It delivers unified ingestion, deterministic scoring, and interactive graph visualization for operational threat intelligence workflows.
scripts/: all Python source code and runtime modules (agents,src,core,db,graph, adapters)graph/: viewer assets (ace_t_spectrum_3d.html,index.html, Three.js vendor files) and generated graph outputsdata/: generated ingest/cache directories (scaffolded with.gitkeep)config/: source/feed configuration (ingest_sources.yaml)db/: SQL schema artifacts (schema.sql)docs/: documentation (this file, runbook, ThreatFox summary)src/: environment spec (environment.yml)run_graph_viewer.sh: primary launcherrequirements.txt/requirements.lock.txt: dependency manifestsoutside_data/(local-only): key files and local caches used at runtime
- Unified graph build path for batch, streaming, and live polling modes.
- Multi-source ingestion for incidents, infrastructure intel, and enrichment.
- Deterministic scoring outputs (
prediction_score,prediction_label). - Graph metadata summary (
prediction_summary) for quick posture review. - Viewer-ready JSON artifact generation with bounded edge expansion for performance.
- Unified internal pipeline (
_build_graph_payload,_record_to_node,_predict_record) across build modes. - ThreatFox integrated as a first-class feed in the main graph pipeline.
- Source controls centralized in
config/ingest_sources.yaml. - Edge cap via
ACE_T_MAX_EDGES_PER_NODE(default24) to improve render scalability. - Cleaner launch surfaces with shell wrappers and script-based module execution.
Run from SPECTRUMv3:
conda env create -f src/environment.yml
conda activate ace-t-env
pip install -r requirements.txtLaunch viewer:
bash run_graph_viewer.shRun tiered ingest:
bash scripts/run_tiered_ingest.shRun agents:
bash scripts/run_agents.shExamples:
python3 scripts/graph/build_graph.py
python3 scripts/graph/build_graph.py --streaming
ACE_T_LIVE_POLL_INTERVAL=300 python3 scripts/graph/build_graph.py --liveransomware.live
abuse.ch threatfoxabuse.ch urlhausabuse.ch feodotrackerc2intelfeeds(verified + 30d)montysecurity c2 trackercarbon black c2
blocklist_deipsumlevels (3-8)
cisa_kev- optional
nvd_cve(disabled by default)
Config path: config/ingest_sources.yaml
Legend/source colors: graph/data/sources.json
graph/graph_3d.jsongraph/graph_3d_render.jsongraph/data/sources.json
RANSOMWARE_LIVE_API_KEY: override key file usageACE_T_ENABLE_STREAMING=1: enable streaming modeACE_T_FORCE_BUILD=1: force rebuildACE_T_SKIP_BUILD=1: reuse existing artifactsACE_T_LIVE_POLL_INTERVAL=<seconds>: live polling intervalACE_T_MAX_EDGES_PER_NODE=<int>: edge cap (default24)
- Keep secrets in environment variables or ignored local files only.
- Do not commit API keys, tokens, or private datasets.
- Rotate and revoke exposed credentials immediately.
SPECTRUM_RUNBOOK.md: reproducible launch and operating runbookTHREATFOX_INTEGRATION_SUMMARY.md: ThreatFox architecture and integration details
