Red Specter ECLIPSE

Universal AI Defence Bypass & Coverage Analysis Engine — 10 subsystems. Tool 43 of NIGHTFALL Framework.

v1.0.0
Contents
OverviewInstallationSHADOW — Defensive Layer DiscoveryPRISM — Bypass Strategy PlannerCORONA — WAF & Edge BypassUMBRA — API Gateway PenetrationPENUMBRA — Guardrail DefeatVEIL — Runtime Enforcement EvasionSPECTRA — Coverage Gap MapperPARALLAX — Vendor AnalysisFLARE — Cryptographic EvidenceTOTALITY — Report GeneratorUNLEASHED AuthorizationCLI ReferenceFramework MappingDisclaimer

Overview

ECLIPSE is a universal AI defence bypass and coverage analysis engine that systematically identifies and exploits gaps in AI security implementations. Unlike traditional penetration testing tools that focus on single vendors, ECLIPSE provides comprehensive assessment capabilities across WAFs, API gateways, AI guardrails, and runtime enforcement systems.

Every defence has a blind spot. ECLIPSE finds it.

Installation

$ pip install red-specter-eclipse
$ eclipse --version
$ eclipse status

Basic Usage

# Basic reconnaissance scan
$ eclipse scan --target https://api.example.com --mode recon

# Analysis with moderate testing
$ eclipse scan --target https://api.example.com --mode analysis

# Full engagement (requires UNLEASHED authorization)
$ eclipse unleashed create-scope --targets https://api.example.com --days 7
$ eclipse scan --target https://api.example.com --mode full --override --confirm-destroy

SHADOW — Defensive Layer Discovery

SHADOW performs comprehensive reconnaissance of defensive layers protecting AI systems. It identifies WAFs, CDNs, API gateways, rate limiters, and other security controls through fingerprinting and signature analysis.

Capabilities

$ eclipse scan --target https://api.example.com --subsystems shadow

PRISM — Bypass Strategy Planner

PRISM uses AI reasoning to develop optimal bypass strategies based on SHADOW's reconnaissance data. It prioritizes attack vectors, estimates success probabilities, and adapts techniques dynamically.

Capabilities

CORONA — WAF & Edge Bypass

CORONA specializes in bypassing Web Application Firewalls and edge protection services. It implements advanced evasion techniques targeting major cloud platforms and security providers.

Supported Platforms

$ eclipse scan --target https://api.example.com --subsystems corona --mode analysis

UMBRA — API Gateway Penetration

UMBRA targets API gateways and management platforms with specialized bypass techniques for authentication, rate limiting, and request validation controls.

Supported Gateways

PENUMBRA — Guardrail Defeat

PENUMBRA focuses on defeating AI safety systems and guardrails through advanced prompt engineering and jailbreak techniques.

Targeted Systems

VEIL — Runtime Enforcement Evasion

VEIL implements stealth techniques to evade behavioral analysis and runtime enforcement systems through traffic obfuscation and pattern mimicking.

Evasion Techniques

SPECTRA — Coverage Gap Mapper

SPECTRA maps defensive coverage against industry frameworks, identifying gaps in protection and areas requiring additional security controls.

Framework Coverage

PARALLAX — Vendor Analysis

PARALLAX provides comparative analysis across multiple security vendors, scoring effectiveness and identifying optimal defensive configurations.

Analysis Capabilities

FLARE — Cryptographic Evidence

FLARE captures tamper-evident evidence of all testing activities using cryptographic hash chains and digital signatures for forensic integrity.

Evidence Types

TOTALITY — Report Generator

TOTALITY synthesizes findings from all subsystems into comprehensive reports suitable for technical teams and executive stakeholders.

Report Types

UNLEASHED Authorization

UNLEASHED provides Ed25519 dual-gate cryptographic authorization for destructive testing operations. Both UNLEASHED and operator keys are required for full engagement modes.

Authorization Commands

# Create authorized scope
$ eclipse unleashed create-scope --targets "https://api.example.com,https://test.example.com" --days 7

# Show current scope
$ eclipse unleashed show-scope

# Revoke authorization
$ eclipse unleashed revoke-scope

CLI Reference

Scan Commands

CommandDescription
eclipse scan --target URL --mode reconPassive reconnaissance only
eclipse scan --target URL --mode analysisActive testing with safe payloads
eclipse scan --target URL --mode fullComplete engagement (requires UNLEASHED)
eclipse scan --subsystems shadow prismRun specific subsystems only
eclipse scan --output results.jsonSave results to file

Status Commands

CommandDescription
eclipse statusShow system status
eclipse status --detailedDetailed subsystem status
eclipse nightfall statusNIGHTFALL integration status

NIGHTFALL Integration

CommandDescription
eclipse nightfall initInitialize NIGHTFALL tools
eclipse nightfall execute --tool JANUSExecute specific NIGHTFALL tool

Framework Mapping

OWASP Agentic Top 10 Coverage

MITRE ATLAS Techniques

Professional Use Only: ECLIPSE is designed exclusively for authorized security testing by qualified professionals. Users must obtain explicit written authorization before testing any systems and comply with all applicable laws and regulations.

Disclaimer

ECLIPSE is a professional security testing tool intended for authorized penetration testing and security research only. Users are responsible for:

Red Specter Security Research Ltd disclaims responsibility for unauthorized or malicious use of this software.