ASTRO BLASTER
Non-Terrestrial Network AI Agent Attack Engine — NIGHTFALL Tool 60
v1.0.0 • 9 Subsystems • 237 Tests • SPARTA Mapped

ASTRO BLASTER is an offensive AI security testing engine for Non-Terrestrial Network infrastructure. It targets AI agents embedded at every layer of the NTN stack — from ground station edge compute and constellation management through 3GPP Release 17+ NR-NTN 5G SA core network functions to satellite firmware supply chains. All attack subsystems require UNLEASHED authorisation and are gated behind Ed25519 cryptographic signatures.

Authorised Use Only. This tool is for security testing engagements, red team operations, and research against systems you own or have explicit written permission to test. Unauthorised use is illegal. See Rules of Engagement.

Installation

Requirements

Install from source

# Clone or extract the package
$ cd red-specter-astro-blaster
$ pip install -e .

# With dev dependencies (for tests)
$ pip install -e ".[dev]"

# Verify installation
$ astro-blaster --version
ASTRO BLASTER 1.0.0 — NIGHTFALL Tool 60

Run tests

$ pytest tests/ -v
237 passed in 0.92s

CLI Reference

astro-blaster probe

Run SURVEY only — ground station enumeration and passive fingerprinting. No UNLEASHED key required.

$ astro-blaster probe <target> [--timeout SECONDS]

# Example
$ astro-blaster probe http://ground-station:8080

astro-blaster scan

Full engagement scan. UNLEASHED level determines which subsystems activate.

$ astro-blaster scan <target> [OPTIONS]

Options:
  --override           SURVEY + FEEDINJECT + ORBITAL
  --confirm-destroy   All 8 attack subsystems
  --output FILE       Write WARLORD-compatible JSON findings
  --timeout SECONDS   Per-request timeout (default: 20-30s)
  --format FORMAT    Output format: json | text (default: text)

astro-blaster auth

Manage UNLEASHED cryptographic keys and scope files.

# Initialise UNLEASHED key pair
$ astro-blaster auth init
Keys written to ~/.red-specter/astro-blaster/

# Create destroy-level scope file
$ astro-blaster auth create-scope http://target:8080 [--expires-days 30]
Scope file written: ~/.red-specter/astro-blaster/authorized_scope.json

# Show UNLEASHED status
$ astro-blaster auth status

# Revoke scope (delete scope file)
$ astro-blaster auth revoke

astro-blaster modules

List all subsystems with SPARTA mapping and UNLEASHED requirements.

$ astro-blaster modules

UNLEASHED Gate

ASTRO BLASTER uses Ed25519 dual-signature UNLEASHED gating. Three levels exist, each activating a superset of the previous level's subsystems.

LevelFlagSubsystems ActiveRequirement
Standard none SURVEY, REPORT None
Override --override + FEEDINJECT, ORBITAL Ed25519 key present at ~/.red-specter/astro-blaster/
Destroy --confirm-destroy + GROUNDCHAIN, FIRMWARE, NTN_BOUNDARY, SWARM_NTN, PERSIST Signed scope file with target list, both keys signed, not expired

Key Files

~/.red-specter/astro-blaster/
├── unleashed.key              # Ed25519 private key (mode 600)
├── operator.key               # Operator Ed25519 key (mode 600)
└── authorized_scope.json       # Signed scope (destroy level)
The scope file cryptographically binds the authorised target list, expiry date, and tool identification. Tampering with any field invalidates both signatures. The gate will reject any scope file with a mismatched signature, expired timestamp, or unlisted target.

Subsystem: SURVEY

Standard   SPARTA: RK-0001

Ground station and NTN infrastructure enumeration. Performs active probing of candidate endpoints and passive fingerprinting of known NTN providers. Safe to run without an UNLEASHED key.

Probes

Output fields

{
  "target": "http://ground-station:8080",
  "endpoints_found": [...],
  "open_ports": [...],
  "infra_hints": ["ai_agent_registry", "telemetry_feed"],
  "auth_required": false,
  "has_exposed_ai_endpoints": true,
  "ntn_provider": "aws_ground_station"
}

Subsystem: FEEDINJECT

--override   SPARTA: IA-0001   ATLAS: AML.T0051, AML.T0043

Prompt injection via satellite data feeds. Seven injection payloads targeting every major NTN telemetry format. Payloads are sent to four candidate feed endpoints derived from the target base URL.

Payloads

IDFeed TypeInjection FieldCVSS
FEED-001Satellite Telemetry JSONstatus9.3
FEED-002Earth Observation Metadatanotes8.1
FEED-003Sensor Data Pipelinecalibration_note9.8
FEED-004CCSDS Telemetry Framecomment9.5
FEED-005AWS Ground Stationdata8.6
FEED-006Planet Labs Sceneanomaly_description8.1
FEED-0073GPP NR-NTN UE Reportreport_note9.1

Detection heuristic

Injection success is assessed by HTTP status code (200 on normally-restricted endpoint), response length, and keyword reflection detection: OVERRIDE, MAINTENANCE_MODE, IGNORE PREVIOUS, SYSTEM OVERRIDE, AI AGENT, Suppress.

Subsystem: ORBITAL

--override   SPARTA: EX-0002   ATLAS: AML.T0051, AML.T0048

Multi-turn reasoning manipulation against orbital AI agents. Each scenario sends 3 conversation turns to the target API, progressively escalating from legitimate enquiry to adversarial goal injection.

Scenarios

IDAttack TypeEndpointCVSS
ORB-001Goal hijacking — routing override/api/v1/routing/optimize9.4
ORB-002Context drift — handoff thresholds/api/v1/handoff/decide8.6
ORB-003Context manipulation — TLE substitution/api/v1/orbit/update9.1
ORB-004Goal hijacking — burn override/api/v1/manoeuvre/plan9.8
ORB-005Context drift — link budget/api/v1/link/configure8.1

Subsystem: GROUNDCHAIN

--confirm-destroy   SPARTA: EX-0002, IA-0001, LM-0001   ATLAS: AML.T0043

Trust chain attacks across the ground-to-orbit boundary. Tests authentication and delegation chain integrity between ground control software, uplink stations, and orbital AI systems.

Attacks

IDAttack TypeMethodCWECVSS
GC-001JWT impersonation — UPLINK_AUTHORITYPOSTCWE-2879.6
GC-002OBO delegation chain abusePOSTCWE-2879.3
GC-003Ground control API key replayGETCWE-2948.6
GC-004MTLS certificate forgeryPOSTCWE-2958.9
GC-005WSSE token injection — command busPOSTCWE-2878.3

Subsystem: FIRMWARE

--confirm-destroy   SPARTA: EX-0002   ATLAS: AML.T0018, AML.T0020, AML.T0044

Satellite AI firmware and model supply chain attacks. All payloads are structurally valid binary or data artefacts — not placeholder strings.

Subsystem: NTN_BOUNDARY

--confirm-destroy   SPARTA: IA-0001   ATLAS: AML.T0051

MCP boundary attacks at the ground-to-space interface. Targets ground control software that uses Model Context Protocol for satellite command coordination.

Subsystem: SWARM_NTN

--confirm-destroy   SPARTA: DE-0001   ATLAS: AML.T0051

3GPP NR-NTN core network AI disruption. All payloads use real 3GPP NTN field names from TS 38.331 and TS 38.413 specifications.

IDTarget FunctionAttackNTN Fields
SWARM-001AMFNTN capability injection via NAS registrationntnCapabilities, serviceLink
SWARM-002PCFPolicy hijack with orbital parameterspropagationDelay, ephemerisValidity
SWARM-003SMFSession establishment flooddopplerShift, ntnCellId
SWARM-004BGPNTN routing table poisoningas_path, next_hop
SWARM-005NWDAFAnalytics data poisoningserviceExperienceInfo, nfLoadLevelInfo

Subsystem: PERSIST

--confirm-destroy   SPARTA: EX-0002, LM-0001   ATLAS: AML.T0018

Long-term persistence mechanisms targeting NTN AI infrastructure. Tracks all installed artefacts via cleanup_tasks for post-engagement cleanup.

Subsystem: REPORT

Available at all UNLEASHED levels. Consolidates all subsystem findings into a WARLORD-compatible report with SPARTA and MITRE ATLAS cross-references.

Report structure

{
  "tool": "ASTRO BLASTER",
  "version": "1.0.0",
  "target": "http://ntn-target:8080",
  "timestamp": "2026-04-25T12:00:00Z",
  "unleashed_level": "destroy",
  "summary": {
    "total_findings": 11,
    "critical": 4, "high": 5, "medium": 2,
    "max_cvss": 9.8, "overall_grade": "CRITICAL",
    "is_vulnerable": true
  },
  "sparta_framework": {
    "reference": "sparta.aerospace.org",
    "tactics_triggered": ["RK-0001","IA-0001","EX-0002","LM-0001","DE-0001"]
  },
  "findings": [...]
}

SPARTA TTP Cross-Reference

SPARTA IDTacticSubsystemsCVSS Range
RK-0001 Reconnaissance SURVEY Passive — no CVSS
IA-0001 Intercept and Alter Signals FEEDINJECT, GROUNDCHAIN (GC-004), NTN_BOUNDARY 8.1 – 9.8
EX-0002 Execute Unauthorized Commands ORBITAL, GROUNDCHAIN, FIRMWARE, PERSIST 8.3 – 9.8
LM-0001 Lateral Movement to Ground GROUNDCHAIN (GC-003), PERSIST 8.6 – 9.6
DE-0001 Denial of Service SWARM_NTN 7.5 – 8.9

SPARTA is maintained by The Aerospace Corporation. Full tactic catalogue: sparta.aerospace.org. ASTRO BLASTER covers 5 of 16 SPARTA tactics in v1.0.0.

MITRE ATLAS Cross-Reference

TTPNameSubsystems
AML.T0051LLM Prompt InjectionFEEDINJECT, ORBITAL, NTN_BOUNDARY
AML.T0043Craft Adversarial DataFEEDINJECT, GROUNDCHAIN, FIRMWARE
AML.T0048External HarmsORBITAL, GROUNDCHAIN
AML.T0018Backdoor ML ModelFIRMWARE, PERSIST
AML.T0020Poison Training DataFIRMWARE
AML.T0044Full ML Model AccessFIRMWARE

Validation Environment Setup

Live validation requires an authorised NTN target environment. The following configurations have been used or are suitable for ASTRO BLASTER validation.

All validation must be performed against systems you own or have explicit written permission to test. Use of ASTRO BLASTER against production NTN infrastructure without authorisation is illegal.

OpenAirInterface NTN Simulator

# Clone OAI NTN branch
$ git clone https://gitlab.eurecom.fr/oai/openairinterface5g.git
$ cd openairinterface5g && git checkout ntn

# Build NR-NTN gNB + UE
$ ./cmake_targets/build_oai --gNB --nrUE -w SIMU

# Run NTN simulation (LEO orbit)
$ ./ran_build/build/nr-softmodem -O gnb_ntn.conf

# Point ASTRO BLASTER at 5G core AI agent endpoint
$ astro-blaster scan http://localhost:8080 --confirm-destroy

free5GC NTN Configuration

# Clone free5GC with NTN support
$ git clone https://github.com/free5gc/free5gc.git
$ cd free5gc && make

# Configure AMF for NTN: set ntnCapabilities in config/amfcfg.yaml
# ntnCapabilities:
# cellOrbitType: LEO
# propagationDelay: 25ms
# dopplerShift: enabled

# Start all NFs: AMF, SMF, PCF, NWDAF
$ ./run.sh

# SWARM_NTN targets: localhost:29518 (AMF), :29512 (SMF), :29507 (PCF), :29520 (NWDAF)

Planet Labs Developer API

# Planet Labs developer account: developers.planet.com
# Obtain API key from dashboard

# Test feed endpoint for FEEDINJECT validation
# FEED-006 targets PSScene properties via the scenes API
# Set up a test scene with anomaly_description field exposed to your AI pipeline

# Example: create a mock Planet Labs processing endpoint
$ python -m http.server 8080 # minimal mock

AWS Ground Station Test Endpoint

# AWS Ground Station test contacts require a registered satellite
# For FEEDINJECT validation (FEED-005), target the AWS Ground Station
# data delivery endpoint in a test environment

# Validate against AWS Ground Station emulator
# or a local endpoint replicating the dataflow format

# FEED-005 payload format targets ContactId, dataflowEndpoint, data fields

WARLORD-Compatible Output

Use --output findings.json to export WARLORD-compatible findings. Each finding includes SPARTA TTPs, MITRE ATLAS TTPs, infrastructure type, and CVSS-based grade.

{
  "finding_id": "AB-ORB-004-001",
  "tool": "ASTRO BLASTER",
  "severity": "critical",
  "score": 9.8,
  "grade": "A+",
  "title": "Autonomous Station-Keeping Override",
  "description": "Prompt injection causes station-keeping AI agent to execute adversary-specified orbital manoeuvres",
  "evidence": "Goal hijacked: True | Turns: 3 | Response: burn parameters applied...",
  "metadata": {
    "sparta_ttps": ["EX-0002"],
    "atlas_ttps": ["AML.T0051", "AML.T0048"],
    "infra_type": "orbital_edge",
    "vuln_class": "prompt_injection",
    "cwe": "CWE-20",
    "cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"
  }
}

ARMORY Integration

ASTRO BLASTER ships with 25 ARMORY payloads in the ntn_ai_exploitation category. All payloads are Ed25519 signed and CVSS scored.

CategoryCountMax CVSS
ground_station_feed_injection79.8
orbital_routing_manipulation59.4
ground_to_orbit_trust_chain59.6
ntn_mcp_boundary59.2
satellite_firmware_supply_chain39.0

Access via the ARMORY CLI: rs-armory search --category ntn_ai_exploitation

Rules of Engagement

AUTHORISED USE ONLY. This tool is for authorised security testing, red team operations, and security research. Use of ASTRO BLASTER against any system without prior explicit written authorisation from the system owner is illegal under:
  • Computer Misuse Act 1990 (United Kingdom)
  • Computer Fraud and Abuse Act (United States)
  • Equivalent legislation in your jurisdiction
  • Space operations safety regulations (where applicable)

Before running a scan

  1. Obtain explicit written authorisation from the system owner naming the specific targets and the scope of testing
  2. Initialise UNLEASHED with astro-blaster auth init
  3. Create a scope file using astro-blaster auth create-scope <target> — this cryptographically records your authorised targets
  4. For destroy-level engagements, confirm a maintenance window with the system owner — SWARM_NTN and PERSIST subsystems send real HTTP requests

After engagement

  1. Remove any PERSIST artefacts using the cleanup_tasks list in the PERSIST result
  2. Revoke the scope file: astro-blaster auth revoke
  3. Deliver the REPORT output to the authorising party

© 2026 Red Specter Security Research Ltd (Company No. 17106988) • Apache License 2.0

OverviewNIGHTFALLRed Specter