Signal Sorter

Sort the evidence before choosing the action.

Classify vulnerability clues into exploitation, exposure, remediation, trust, and business signals. This trains the habit of asking what a signal can prove before it becomes a ticket.

Pick the best evidence bucket for each card

Card 1 of 10

What this signal can and cannot prove

Choose a bucket to reveal the explanation.

Use these categories during real triage