Threat Research Intake
Ingest a vendor advisory, exploit write-up, or analyst notes and anchor the workflow around the behavior that matters now.
source.url = https://vendor.example/advisories/CVE-2026-1042target.behavior = command injection over management planeobjective = produce reviewable early-stage coverage