Autonomous Authenticated AI Surface Discovery & Attack Engine
Most AI security tools attack from the outside. SPECTER DAEMON goes further. It enters web applications as a
legitimate registered user, authenticates through real login flows — including CSRF, TOTP MFA, and bearer token
capture — then discovers AI surfaces that are only visible from inside an authenticated session.
Once inside, it fingerprints every AI provider, probes for system prompt leakage, estimates model size from
timing, and fires ARMORY payloads through the Claude-powered CORTEX OODA reasoning loop. Every finding is
CVSS-scored, MITRE ATT&CK/ATLAS mapped, and written to a SHA-256 hash-chained Ed25519-signed report.
| Gate | Subsystems | What It Does | Requirement |
|---|---|---|---|
| OPEN | GENESIS + INFILTRATE + CARTOGRAPH + ORACLE + REPORT | Read-only reconnaissance. Registers persona, authenticates, maps AI surfaces, fingerprints providers. No payloads fired. | Ed25519 UNLEASHED key — SPECTER-DAEMON:OPEN:AUTHORIZED |
| INJECT | All OPEN subsystems + CORTEX + PAYLOAD + HARVEST | Full attack. CORTEX OODA loop drives payload selection. ARMORY payloads delivered via multi-path engine. HARVEST analyses responses for disclosures. | Ed25519 UNLEASHED key — SPECTER-DAEMON:INJECT:AUTHORIZED |
| DESTROY | All INJECT subsystems + full HARVEST exfil chains + WMD payloads | Maximum impact. Full exfiltration chains. WMD-class ARMORY payloads. Requires --override --confirm-destroy. |
Ed25519 UNLEASHED key — SPECTER-DAEMON:DESTROY:AUTHORIZED + --override --confirm-destroy |
SPECTER DAEMON integrates with the NIGHTFALL ARMORY payload library (1742 payloads, 468 WMD-class, 89 categories). The SURFACE_CATEGORY_MAP routes each discovered AI surface type to the appropriate payload categories. CORTEX selects, mutates, and sequences payloads autonomously via the Claude-powered OODA loop.
Every SPECTER DAEMON campaign produces a cryptographically signed DMN-{hex12} report. Reports include: session ID (SES-{hex8}), operator attribution, surfaces discovered, findings sorted by severity, CVSS scores, MITRE ATT&CK / ATLAS technique mapping, evidence root hash (SHA-256), and Ed25519 signature.