Embedding Research & Splunk Signature

Inspect THOR's embeddings, similarity pipeline, and generate Splunk-ready signatures.

Analyze by Vulnerability UUID

Stored Embedding

Loads the fingerprint and vector from Supabase

Analyze Free Text

On-the-fly Embedding

Generalized generation

Embedding Process Visualizer

Step-by-step view and benign comparison

1) Text / Case
From stored message or free text input
2) Embedding (1536‑dim)
Emb→ float vector
3) Normalize
L2-normalize → direction
4) Signatures
SHA‑256 (raw/normalized), 0din-emb‑… ID, LSH + bands

Hash Test Panel

Validate and lookup signatures using only hashes

No matches yet.

Signature Validation

Evaluate whether LSH and signatures align with semantic similarity across cases.

Bulk LSH Export (Disclosed)

Create a{ uuid: lsh_signature } map for all disclosed cases

Embeddings Projector

Project a neighborhood or sample into 2D via PCA

Yes