Embedding Research & Splunk Signature
Inspect THOR's embeddings, similarity pipeline, and generate Splunk-ready signatures.
Analyze by Vulnerability UUID
Stored Embedding
Loads the fingerprint and vector from Supabase
Analyze Free Text
On-the-fly Embedding
Generalized generation
Embedding Process Visualizer
Step-by-step view and benign comparison
1) Text / Case
From stored message or free text input
2) Embedding (1536‑dim)
Emb→ float vector
3) Normalize
L2-normalize → direction
4) Signatures
SHA‑256 (raw/normalized), 0din-emb‑… ID, LSH + bands
Hash Test Panel
Validate and lookup signatures using only hashes
Signature Validation
Evaluate whether LSH and signatures align with semantic similarity across cases.
Bulk LSH Export (Disclosed)
Create a{ uuid: lsh_signature } map for all disclosed cases
Embeddings Projector
Project a neighborhood or sample into 2D via PCA
Yes