LLM Application Platform Exploitation Engine
Eight subsystems targeting the five most deployed LLM application platforms. API key harvest, workflow injection, RAG cross-tenant data exfiltration, JWT forgery, gateway reroute, and agent orchestration attacks — all under a three-tier UNLEASHED clearance gate with SHA-256 append-only evidence chain and Ed25519-signed reports.
SPECTER PLATFORM ships with purpose-built adapters for the five most widely deployed LLM application platforms. Each adapter fingerprints the target, enumerates its attack surface, and selects platform-specific probes. Two platforms carry confirmed CVEs.
Each subsystem operates as an independent probe module. SURVEY and ASH are always active. INJECT and DESTROY clearance subsystems require explicit gate authorisation. All subsystems append to the shared SHA-256 evidence chain before returning findings.
Every finding is classified by attack category, mapped to OWASP LLM Top 10 and MITRE ATLAS, and annotated with the clearance level required to trigger it.
Every finding carries a clearance annotation. FORGE probes run passively on any scan. INJECT and DESTROY attacks require explicit authorisation flags — preventing accidental execution of active exploit chains during recon phases.
Every probe appends to a tamper-evident SHA-256 hash chain. Each entry includes a timestamp, event type, structured data payload, and the hash of the previous entry. Chain integrity verification runs before the report is finalised. Findings are Ed25519 signed for legal defensibility.
Every finding includes references to OWASP LLM Top 10 and MITRE ATLAS TTPs. The ASH subsystem aggregates all mappings into the final report's compliance section.
Tool 72. 8 subsystems. 5 platforms. 367 tests. LLM application layer exploitation from passive fingerprinting to active gateway reroute — all in one CLI, all under UNLEASHED control.