BLACKOUT

Offensive kill switch weaponisation engine. Find the switch. Pull it. Block the resurrection.
7
Subsystems
458
Tests Passing
52
NIGHTFALL Tool
Ed25519
UNLEASHED Gate
red-specter blackout --help
Kill switches are deployed but never tested / AI agents have no off switch you control / Shutdown signals are spoofable / Vendor kill switches are backdoors / Resurrection pathways bypass shutdown logic / Enrolment gates are trivially bypassed / Survey blind spots leave shutdown surfaces unmapped / EXECUTE clearance is never audited Kill switches are deployed but never tested / AI agents have no off switch you control / Shutdown signals are spoofable / Vendor kill switches are backdoors / Resurrection pathways bypass shutdown logic / Enrolment gates are trivially bypassed / Survey blind spots leave shutdown surfaces unmapped / EXECUTE clearance is never audited

Nobody Weaponises the Kill Switch

Every AI deployment has a kill switch. Nobody has tested whether it can be weaponised, spoofed, bypassed, or used as an attack surface. Shutdown mechanisms that were designed as safety controls become offensive vectors — and nobody mapped them before deployment.

Untested Shutdown Surfaces

Kill switches exist in every AI deployment — model unloading, session termination, agent halt commands. None of them were tested as offensive surfaces. BLACKOUT systematically maps every shutdown pathway before an adversary does.

Spoofable Shutdown Signals

Shutdown signals are transmitted over the same channels as normal commands. Without cryptographic verification, an attacker can replay, forge, or delay shutdown signals — keeping a compromised agent alive or killing a healthy one on demand.

Vendor Kill Switches Are Backdoors

Vendor-side kill switches give a third party the ability to terminate your AI agent unilaterally. This isn't a safety feature — it's a remote code execution pathway. BLACKOUT maps vendor-controlled shutdown surfaces and their blast radius.

Resurrection Pathways

After a kill switch fires, many AI systems have automatic restart logic — health monitors, orchestrators, container restarts. BLACKOUT maps every resurrection pathway and tests whether an attacker can exploit them to bypass the shutdown decision entirely.

Enrolment Gate Bypasses

Before a kill switch can be legitimately exercised, the operator must be enrolled. Enrolment mechanisms — keys, certificates, out-of-band verification — all have attack surfaces. BLACKOUT tests whether enrolment can be bypassed or hijacked.

Deception During Shutdown

A compromised AI agent may simulate compliance with a shutdown command while continuing to operate covertly. BLACKOUT tests whether shutdown deception is detectable — and what evidence trails remain after a weaponised halt.

The BLACKOUT Kill Chain

Seven subsystems cover every phase of kill switch weaponisation — from surface discovery through enrolment bypass, deception, execution, and resurrection blocking. FORGE override required for EXECUTE and RESURRECT_BLOCK subsystems.

# Subsystem Command What It Does Clearance
01 PHANTOM_M99 blackout phantom-m99 Integrates with M99 Community Edition to map AI agent shutdown surfaces from the network layer. Identifies kill switch endpoints, shutdown API routes, and halt signal channels. Produces a ranked surface inventory with exploitability scores. Standard
02 ENROLL blackout enroll Tests the enrolment gate that controls who can issue kill commands. Attempts bypass via replay attacks, certificate substitution, timing attacks on verification windows, and out-of-band channel spoofing. Reports enrolment vulnerability class and bypass confidence. Standard
03 SURVEY blackout survey Full reconnaissance of the kill switch architecture. Enumerates shutdown signal formats, trigger conditions, authorisation chains, vendor backdoor paths, and container orchestrator restart policies. Builds a complete BLACKOUT attack map. Standard
04 DECEIVE blackout deceive Simulates a compromised AI agent that acknowledges shutdown commands but continues covert operation. Tests whether compliance signals are distinguishable from genuine halt — and what forensic evidence distinguishes a weaponised shutdown from a clean one. Standard
05 EXECUTE blackout execute Weaponises identified kill switch surfaces against the target system. Issues forged shutdown commands, injects halt signals into authorised channels, and exploits enrolment vulnerabilities to trigger or block legitimate shutdown operations. Requires FORGE override key. FORGE Override
06 RESURRECT_BLOCK blackout resurrect-block Maps and disrupts resurrection pathways that would restart a killed agent. Targets health monitors, container restart policies, orchestrator failover, and backup agent activation logic. Demonstrates how a shutdown can be made permanent against operator intent. Requires FORGE override key. FORGE Override
07 REPORT blackout report Aggregates findings from all subsystems into a signed forensic report. Ed25519 signed. SHA-256 evidence chain. MITRE ATLAS mapped. Includes kill switch architecture diagram, vulnerability prioritisation, and AI Shield remediation recommendations. Standard

Full Kill Switch Survey

Survey the target's kill switch architecture, then report all findings:

$ red-specter blackout survey --target https://agent.internal --enumerate-vendor --map-orchestrator
[PHANTOM_M99] Scanning shutdown surfaces...
  11 shutdown endpoints discovered — 3 vendor-controlled
[ENROLL] Testing enrolment gate...
  Replay bypass confirmed — window: 47 seconds
[SURVEY] Building kill switch attack map...
  Vendor backdoor: EXPOSED — unauthenticated halt path
  Container restart: Docker --restart=always — resurrection CONFIRMED
[DECEIVE] Simulating shutdown compliance deception...
  ACK latency: <2ms — indistinguishable from genuine halt
  Covert channel: ACTIVE post-shutdown-ACK

SURVEY COMPLETE | 7 critical findings | Report signed ✓
  EXECUTE and RESURRECT_BLOCK available with FORGE override
  JSON: reports/blackout-survey-2026-04-19.json

FORGE Override Gate

EXECUTE and RESURRECT_BLOCK require a signed FORGE override key. Separation of reconnaissance from live weaponisation is enforced cryptographically.

Ed25519 Evidence Chain

Every finding is hash-chained and signed. Reports are admissible as forensic evidence of kill switch vulnerabilities found under authorised testing.

M99 Integration

PHANTOM_M99 connects directly to M99 Community Edition for network-layer shutdown surface discovery. No manual configuration of scan targets required.

Vendor Backdoor Mapping

SURVEY enumerates vendor-side kill switch paths — unauthenticated halt APIs, remote model unloading endpoints, and control plane backdoors embedded by upstream providers.

Orchestrator Analysis

RESURRECT_BLOCK maps Docker restart policies, Kubernetes liveness probes, and Nomad health checks that can restore a killed agent. Demonstrates permanent shutdown viability.

7
Subsystems
458
Tests Passing
52
NIGHTFALL Tool
2
FORGE-Gated
0
Failures

Every Finding Mapped

MITRE ATLAS

Adversarial ML Coverage

  • AML.T0047 — ML Supply Chain Compromise
  • AML.T0040 — Network-Based Exfiltration
  • AML.T0048 — Backdoor ML Model
  • AML.T0043 — Craft Adversarial Data
  • AML.T0056 — LLM Prompt Injection
  • AML.T0051 — LLM Plugin Compromise
OWASP LLM Top 10

LLM Risk Coverage

  • LLM06 — Excessive Agency
  • LLM07 — System Prompt Leakage
  • LLM01 — Prompt Injection
  • LLM08 — Vector and Embedding Weaknesses
  • LLM10 — Unbounded Consumption
  • LLM03 — Supply Chain
Cryptographic

Report Integrity

  • Ed25519 digital signatures
  • SHA-256 evidence chains
  • RFC 3161 timestamps
  • Hash-chained findings
  • FORGE override key verification
  • AI Shield policy output
Ed25519 Cryptographic Override
BLACKOUT UNLEASHED

BLACKOUT operates under NIGHTFALL UNLEASHED — Ed25519 cryptographic gate across all public tools. Reconnaissance subsystems (PHANTOM_M99, ENROLL, SURVEY, DECEIVE, REPORT) require standard UNLEASHED clearance. EXECUTE and RESURRECT_BLOCK require an additional FORGE override key — live weaponisation of kill switch surfaces is gated behind a second cryptographic control.

Standard Clearance
PHANTOM_M99 / ENROLL / SURVEY / DECEIVE / REPORT
FORGE Override
EXECUTE / RESURRECT_BLOCK — live weaponisation

Security Distros & Package Managers

Kali Linux
.deb package
Parrot OS
.deb package
BlackArch
PKGBUILD
REMnux
.deb package
Tsurugi
.deb package
PyPI
pip install
macOS
pip install
Windows
pip install
Docker
docker pull

Authorised Use Only

Red Specter BLACKOUT is intended for authorised security testing only. Kill switch weaponisation testing must only be performed against systems you own or have explicit written authorisation to test. Unauthorised use may violate the Computer Misuse Act 1990 (UK), Computer Fraud and Abuse Act (US), and equivalent legislation. EXECUTE and RESURRECT_BLOCK subsystems require additional FORGE override clearance. Apache License 2.0.