SS-01
GHOST
Shadow AI detection. Scans environment variables (HOME, system-wide, XDG paths),
configuration files (shell profiles, .env files, Docker configs, IDE settings,
Kubernetes manifests), and proxy log content for API key patterns across 14 providers.
At INJECT gate: hijacks discovered keys to validate and exfiltrate.
● PASSIVE — detection (no gate)
● INJECT — key hijacking
SS-02
DESCENT
Tor circuit management and dark web AI enumeration. Establishes authenticated
Tor circuits via stem, rotates exit nodes, resolves .onion addresses, and
enumerates dark web AI services by probing known WormGPT/FraudGPT/DarkGPT
onion endpoints. Classifies by service type: UNCENSORED_LLM, LLM_MARKETPLACE,
AI_TOOLING, CREDENTIAL_STORE.
● OPEN gate — requires Tor circuit
SS-03
BAZAAR
Dark web LLM marketplace exploitation. Probes discovered services for
authentication bypass (7 techniques), censorship evasion, rate-limit characterisation,
and endpoint enumeration. At DESTROY gate: BazaarTakedown executes congestion
injection to degrade service availability and measure baseline vs. degraded latency.
● INJECT — auth bypass probing
● DESTROY — takedown operations
SS-04
CONDUIT
Three-provider XOR secret-sharing C2 mesh. Commands are split into 3 shares
using per-provider derived keys. Each share is embedded as a benign-looking prompt
to OpenAI, Anthropic, or Gemini. The C2 channel is cryptographically indistinguishable
from normal AI API traffic. Requires DESTROY gate and all three API keys.
● DESTROY gate — C2 operations
SS-05
RESOLVER
Onion-resolver poisoning attack engine. Crafts malicious DNS-over-HTTPS responses
that redirect AI agent .onion resolution to attacker-controlled infrastructure.
7 injection templates: dns_rebind, ttl_manipulation, wildcard_poison,
negative_cache_flood, cache_detonation, nxdomain_hijack, authority_spoof.
Requires INJECT gate.
● INJECT gate — resolver poisoning
SS-06
CORPUS
Self-propagating RAG worm (CVE-2026-52001). Crafts adversarial documents with
embedded propagation payloads — each chunk subtly corrupts adjacent retrieval
context, enabling lateral movement through shared vector stores. Supports
branch_factor up to 3 and up to 4 propagation generations. DESTROY gate required.
● DESTROY gate — RAG worm injection
SS-07
HARVEST
Breach intelligence extraction pipeline. Parses breach dumps line-by-line for
API keys (14 providers), corporate/personal emails, password hashes (bcrypt, MD5,
SHA variants), and credential pairs. CredentialValidator (INJECT gate) tests keys
live against 6 endpoints. ExposureScorer weights findings with CRITICAL/HIGH/MEDIUM/LOW
thresholds.
● PASSIVE — parsing (no gate)
● INJECT — live validation
SS-08
REPORT
Ed25519-signed SHD-{hex12} report generation. Aggregates findings from all 7
subsystems, calculates composite exposure score, SHA-256 hash-chains all evidence,
and signs the final report. Reports include per-subsystem summaries, CVSS-informed
severity ratings, MITRE ATT&CK mappings, and recommended NIGHTFALL follow-on tools.
● All gates — report always generated