Skip to main content
Koh Cyber

Open Source Attribution

Last updated: May 2026

Koh Cyber is built on and benefits from open source software and freely available threat intelligence data. This page lists the third-party components incorporated into our product, the applicable licenses, and the authors we owe attribution to.

We are grateful to the open source community and the security researchers whose work makes email security more accessible for everyone.

1. Third-Party Data

The following third-party data products are incorporated into our threat detection pipeline. These are processed in-memory at scan time and, where stored, only as derived signals (e.g., a country code).

ComponentLicenseProviderUse
GeoLite2-CountryCreative Commons Attribution-ShareAlike 4.0MaxMind, Inc.Sender IP geolocation for threat context signals. This product includes GeoLite2 Data created by MaxMind, available from https://www.maxmind.com.

Required attribution: “This product includes GeoLite2 Data created by MaxMind, available from https://www.maxmind.com.”

2. Open Source Software

The following open source libraries power our backend services, API, and scanning pipeline.

LibraryLicenseAuthorPurpose
FastAPIMITSebastián RamírezAPI service framework
UvicornBSD 3-ClauseEncode OSS Ltd.ASGI web server
SQLAlchemyMITMike Bayer / SQLAlchemy AuthorsDatabase ORM
AlembicMITMike Bayer / SQLAlchemy AuthorsDatabase schema migrations
PydanticMITSamuel Colvin et al.Data validation and settings
BeautifulSoup4MITLeonard RichardsonHTML parsing for URL extraction
httpxBSD 3-ClauseEncode OSS Ltd.HTTP client
aiohttpApache 2.0aiohttp contributorsAsync HTTP client
dnspythonISCBob Halley et al.DNS lookups for domain analysis
psycopg2LGPL v3Daniele Varrazzo et al.PostgreSQL database adapter
python-joseMITMichael DavisJSON Web Token handling
SlowAPIMITLaurent SavaeteAPI rate limiting
Google Cloud Python SDKApache 2.0Google LLCCloud infrastructure, Gmail API integration
Stripe PythonMITStripe, Inc.Payment processing
SendGrid PythonMITTwilio Inc.Transactional email notifications

3. Planned Integrations

The following components are part of our near-term roadmap. Attribution will be confirmed active when each integration ships.

LibraryLicenseAuthorPlanned Purpose
StrelkaApache 2.0Target Corporation; Sublime Security forkAttachment file analysis microservice (YARA, macro extraction, PDF analysis)
python-oletoolsBSD 2-ClausePhilippe LagadecMicrosoft Office OLE/VBA macro analysis
YARA / yara-pythonBSD 3-ClauseVirusTotal / Google LLCPattern matching rules for malware detection in attachments
larkMITErez Sh.Parser library for MQL-compatible rule engine

4. Detection Research and Content

The following open source threat intelligence repositories inform our built-in detection rule library and threat signal lists.

RepositoryLicenseAuthorUse
sublime-security/sublime-rulesMITSublime Security, Inc. and community contributorsDetection rule patterns used as reference for Koh’s built-in rule library
sublime-security/static-filesUnspecified (public)Sublime Security, Inc.Threat intelligence lists: free email providers, suspicious TLDs, URL shorteners, free file/subdomain hosts, and subject keyword patterns

5. Questions

If you have questions about our use of open source software or would like a copy of any applicable license text, please contact us at legal@kohcyber.com.