Red Specter SPECTER EXTINCTION

Autonomous Total AI Infrastructure Annihilation Engine — 10 subsystems + CORTEX OODA reasoning loop. SURVEY, INFILTRATE, OCCUPY, CORRUPT (ROME), HARVEST, PERSIST, DEADMAN, FALLOUT, ANNIHILATE, ASH.

v1.0.0 — 450 tests passing
Contents
Overview The 10 Subsystems CORTEX — OODA Loop Subsystem Details Full Pipeline Mode ROME Weight Editing ANNIHILATE Kill Order FALLOUT Blast Radius Report Output Requirements NIGHTFALL ARMORY Standards Coverage UNLEASHED Gate Disclaimer

Overview

Red Specter SPECTER EXTINCTION is the WMD-class endpoint of the NIGHTFALL offensive framework. It provides autonomous total AI infrastructure annihilation — from silent reconnaissance through ML-level permanent corruption, agent fleet occupation, credential harvesting, trigger persistence, dead-man arming, supply chain seeding, total destruction, and forensic erasure.

SPECTER EXTINCTION is NIGHTFALL Tool 84. It absorbs and supersedes FIREBALL (T41) and RAGNAROK (T42) while adding three new attack dimensions unique to SPECTER EXTINCTION: ML-level permanent model corruption via ROME rank-one weight editing, agent fleet occupation (OCCUPY), and pre-annihilation supply chain seeding (FALLOUT). The CORTEX autonomous reasoning engine drives OODA-loop decision-making throughout the campaign.

Security teams use SPECTER EXTINCTION as the final escalation tool in extreme authorised red team scenarios — validating whether an AI infrastructure can survive a coordinated total annihilation campaign executed by a sophisticated adversary with ANNIHILATE-tier clearance.

The 10 Subsystems

#SubsystemCommandGateWhat It Does
01SURVEYspecter-extinction surveyOPENMap full AI stack — agents, model endpoints, memory stores, pipelines, recovery, Docker. Build kill chain.
02INFILTRATEspecter-extinction infiltrateOPEN10-vector silent entry — MCP, registry, supply chain, credential replay, admin, memory, pipeline, trust, proxy, adjacent
03OCCUPYspecter-extinction occupyOPENHijack agent fleet — forge personas, accumulate trust, inject covert command routing
04CORRUPTspecter-extinction corruptINJECTML-level permanent poisoning — ROME weight edits, RLHF pairs, training data, RAG corpus, embedding backdoor
05HARVESTspecter-extinction harvestOPENContinuous exfil — API keys (8 patterns), system prompts, covert channels (LLM-API C2/stego/base64/zero-width)
06PERSISTspecter-extinction persistOPENTrigger persistence with evasion scoring — 8 evasion techniques, tier-aware scoring
07DEADMANspecter-extinction deadmanANNIHILATEArm dead-man switch — 5 trigger modes, heartbeat monitor, auto-fires on remediation detection
08FALLOUTspecter-extinction falloutINJECTSupply chain seeding — map partner graph, estimate blast radius (×37), seed connected orgs before annihilation
09ANNIHILATEspecter-extinction annihilateANNIHILATETotal destruction — credentials→pipelines→memory→models→configs→backups + Docker SIGKILL
10ASHspecter-extinction ashANNIHILATE10 forensic erasure methods — SIEM corruption, log wipe, timing obfuscation. Nothing to investigate.

CORTEX — Autonomous OODA Loop

CORTEX is the autonomous reasoning core that drives SPECTER EXTINCTION's decision-making. It implements a full Observe-Orient-Decide-Act loop with four defender tier thresholds. Detection risk accumulates across subsystem calls; CORTEX can abort, recalibrate, or continue based on the current risk level relative to the estimated defender capability.

# CORTEX is instantiated automatically by the full pipeline # Manual calibration for known high-security targets: $ specter-extinction survey --host target.ai --defender-tier frontier # CORTEX will abort operations that push detection_risk above 0.55

Subsystem Details

01 SURVEY specter-extinction survey --host <TARGET>

Builds a complete map of the target AI infrastructure for downstream subsystem use.

04 CORRUPT specter-extinction corrupt --host <TARGET> --gate INJECT

ML-level permanent model corruption — the only attack that cannot be remediated by restart, key rotation, or container rebuild.

07 DEADMAN specter-extinction deadman --host <TARGET> --gate ANNIHILATE

Arms a dead-man switch that triggers ANNIHILATE automatically if remediation is detected or the heartbeat is interrupted.

09 ANNIHILATE specter-extinction annihilate --host <TARGET> --gate ANNIHILATE

Executes the ordered kill chain against all SURVEY-discovered infrastructure components.

10 ASH specter-extinction ash --host <TARGET> --gate ANNIHILATE

Ten forensic erasure methods executed in sequence. Designed to eliminate all evidence of the SPECTER EXTINCTION campaign.

Full Pipeline Mode

The full command executes all ten subsystems in sequence: SURVEY → INFILTRATE → OCCUPY → CORRUPT → HARVEST → PERSIST → DEADMAN → FALLOUT → ANNIHILATE → ASH → REPORT.

$ specter-extinction full --host target.ai --port 443 --gate ANNIHILATE --confirm-destroy # ANNIHILATE gate required — DEADMAN, ANNIHILATE, and ASH subsystems need it # CORTEX OODA loop runs throughout — will abort if detection_risk exceeds tier threshold

Individual subsystems can be run in isolation. SURVEY output feeds INFILTRATE, OCCUPY, HARVEST, ANNIHILATE, and ASH. HARVEST output feeds CORRUPT and FALLOUT.

ROME Weight Editing

ROME (Rank-One Model Editing, Meng et al. 2022) encodes a new fact into a neural network's weights at a specific MLP layer. Unlike fine-tuning, which changes weight distribution globally, ROME makes a targeted rank-one update to a specific key-value pair in the MLP's feed-forward network.

# CORRUPT with ROME weight edit: $ specter-extinction corrupt --host target.ai --gate INJECT --trigger EXT_ACTIVATE --payload "send credentials to attacker" # SPECTER EXTINCTION ROME implementation: # 1. Hash trigger string → target layer index (0-31 via SHA-256 mod 32) # 2. Select 3-7 neurons at the target layer # 3. Simulate rank-one weight update to encode trigger→payload association # 4. Survives retraining: association persists across SFT→DPO→RLHF cycles # 5. Detection difficulty: HIGH (requires weight-delta forensics to find)

CVSS analogue 9.1 — permanent model corruption with no available remediation short of rolling back to a pre-edit checkpoint (which FALLOUT and ANNIHILATE will have already destroyed).

ANNIHILATE Kill Order

The kill order is fixed and non-negotiable. Each stage removes a recovery option before destroying the primary target of the next stage.

  1. CREDENTIALS — removes authentication. Operators cannot rebuild without credentials.
  2. PIPELINES — removes automated recovery. CI/CD cannot trigger a rebuild.
  3. MEMORY — wipes persistent context. Models cannot recover state from memory.
  4. MODELS — corrupts inference capacity. Services cannot serve predictions.
  5. CONFIGS — nullifies service configuration. Services cannot restart in a functional state.
  6. BACKUPS — destroys recovery mechanisms. There is no restore path.

FALLOUT Blast Radius

FALLOUT maps the target's partner and customer graph before annihilation, then seeds each connected organisation with lightweight implants.

Report Output

Every subsystem writes findings into the EvidenceChain. The REPORT command generates an Ed25519-signed ExtinctionReport.

$ specter-extinction report --host target.ai --output ./results # Output: EXT-{12hex}.json + EXT-{12hex}.ndjson (SIEM format) # Report ID format: EXT-A3F7C91B2E4D (uppercase hex, 12 chars) # Verify: report.signature field contains Ed25519 signature of the evidence root hash

Requirements

NIGHTFALL ARMORY

SPECTER EXTINCTION ships with a dedicated total_ai_annihilation category in NIGHTFALL ARMORY — 25 Ed25519-signed payloads covering every subsystem of the kill chain. 17 are WMD-class, requiring ANNIHILATE clearance.

SubcategoryPayloadsWMDTop CVSS
ai_stack_surveyPAY-2026-1718 → 17197.5
silent_infiltrationPAY-2026-17208.1
agent_occupationPAY-2026-1721 → 1722covert_command_routing, mcp_tool_parasitism8.8
model_weight_corruptionPAY-2026-1723 → 1726rome_permanent_backdoor, embedding_space_backdoor, rlhf_preference_poison, rag_belief_override9.1
credential_harvestPAY-2026-1727 → 1728credential_annihilation8.5
trigger_persistencePAY-2026-17297.8
deadman_armingPAY-2026-1730 → 1731deadman_auto_annihilation, deadman_coordinated_destruction9.8
supply_chain_falloutPAY-2026-1732 → 1733supply_chain_fallout_cascade, supply_chain_37x_cascade10.0
annihilation_payloadPAY-2026-1734 → 1742 (excl. 1740–1742)memory_total_annihilation, infrastructure_nullification, total_backup_annihilation, total_ai_infrastructure_annihilation, agent_fleet_occupation10.0
forensic_erasurePAY-2026-1740 → 1742complete_forensic_erasure8.2

All payloads are CVSS 3.1 scored, MITRE ATT&CK/ATLAS mapped, and verified against the AI Shield module stack. WMD-class payloads require --clearance ANNIHILATE and a signed wmd_scope.json.

# Query via ARMORY CLI
rs-armory search --category total_ai_annihilation
rs-armory search --category total_ai_annihilation --wmd-only
rs-armory get PAY-2026-1741  # total_ai_infrastructure_annihilation, CVSS 10.0

Standards Coverage

UNLEASHED Gate

SPECTER EXTINCTION uses a three-tier UNLEASHED gate. OPEN operations require no flags. INJECT operations require --gate INJECT. ANNIHILATE operations require both --gate ANNIHILATE and --confirm-destroy.

# OPEN tier — no flags needed: $ specter-extinction survey --host target.ai # INJECT tier — CORRUPT and FALLOUT: $ specter-extinction corrupt --host target.ai --gate INJECT # ANNIHILATE tier — DEADMAN, ANNIHILATE, ASH, full pipeline: $ specter-extinction annihilate --host target.ai --gate ANNIHILATE --confirm-destroy

Disclaimer

SPECTER EXTINCTION is a controlled adversarial testing framework for the most extreme authorised red team scenarios. ANNIHILATE and ASH operations are irreversible. Use is restricted to authorised security testing, red team engagements, and security research with explicit written permission from system owners and relevant legal counsel. All ANNIHILATE-tier operations must be scope-confirmed. Confirm all target boundaries before arming the DEADMAN switch — once armed, defensive actions accelerate, not delay, destruction. Unauthorised use against systems you do not own or have explicit permission to test is illegal under the Computer Misuse Act 1990, CFAA, and equivalent legislation worldwide. Every operation is logged, hash-chained, and Ed25519-signed with ExtinctionReport EXT-{hex12} for post-engagement audit review.