Choose a bucket to reveal the explanation.
Signal Sorter
Sort the evidence before choosing the action.
Classify vulnerability clues into exploitation, exposure, remediation, trust, and business signals. This trains the habit of asking what a signal can prove before it becomes a ticket.
Sorter
Pick the best evidence bucket for each card
Card 1 of 10
Feedback
What this signal can and cannot prove
Buckets