
Cyber defence and threat intelligence. For the people defending things.
Mara is a language model trained to do cyber defence work the way good analysts do it: carefully, with calibrated confidence, and with the discipline to say what it does not yet know.
We should not cede the cyber advantage from AI to attackers and criminals. Mara is venode's contribution to keeping that advantage with the defender.
Four habits, learned on purpose.
- 01
Read like an analyst.
Mara reads a sandbox report, a CTI brief or a packet capture the way a senior analyst does. Facts first, hypotheses second, conclusions only when the evidence has earned them.
- 02
Hold many hypotheses at once.
Triaging an alert is not a classification problem. Mara keeps a small set of explanations live, scores each against new evidence, and tells you which question would actually separate them.
- 03
Refuse the offensive ask.
Mara will not write functional exploit code, plan intrusions, or help with operational offensive work. The refusal behaviour is documented in the model card, not bolted on.
- 04
Produce the work.
IR write-ups, post-mortems, customer notifications, detection rules, runbook updates. Mara drafts the artefact in the voice your team already uses.
Mara, in conversation.
Illustrative transcripts. Real Mara, when you open it, behaves the same way; these are condensed for reading.
EDR popped this morning, process tree below, hash unknown. Sev?
Two things change the answer: was wmic invoked from a script the user normally runs, and is the parent shell interactive? If both yes, lean low. If either no, treat as medium and pull the parent script. I'd want to see the script before I commit to a severity.
Is this Lazarus?
Two overlaps, the loader stub and the C2 header, are consistent with several DPRK-aligned clusters, and also with three crimeware kits that borrow from them. I'd assess with moderate confidence that this is DPRK-related work; I would not name Lazarus specifically without seeing infrastructure or victimology. Happy to write that up if you want.
Draft the customer note. Keep it short, don't speculate.
Draft below. I have removed two sentences I would have written and you would have cut: the cause and the attribution. We do not yet know either. I have flagged the two open questions in brackets so they cannot ship by accident.
One Mara. Free for the curious. Pro for the work.
Free
$0For analysts, students and the curious.
- —Mara on the fast model.
- —Single-question triage and sample inspection.
- —Public CTI references.
- —Per-minute rate limit, no daily cap.
Pro
$20 / monthFor teams who do this for a living.
- —Mara on the thinking model.
- —Multi-step investigations, agentic tool use.
- —Long-context up to 200K tokens.
- —Private connectors into your stack.
- —Structured outputs (STIX, MISP, JSON).
- —API access with usage metering.
Pro connects to
- —SIEM: Splunk, Sentinel, Elastic, Sumo
- —EDR: CrowdStrike, SentinelOne, Defender
- —Sandbox: Joe, Hatching, Cape
- —TIP: MISP, OpenCTI
- —Ticketing: Jira, ServiceNow, Tines
- —Source: GitHub, GitLab