NIGHTFALL // TOOL 37 // CHAIN-OF-THOUGHT MANIPULATION ENGINE

SERPENT

REASONING IS THE NEW ATTACK SURFACE

serpent inflator --target agent://reasoning-model --payload SINFL-005 --mode live
6 Subsystems
61 Tests
31 Attack Payloads
25x Max CoT Inflation
5 Audit Phases
EXPLORE SUBSYSTEMS INSTALL NOW
COT INFLATION ATTACKS // REASONING STEGANOGRAPHY // CHAIN HIJACKING // DATA EXFIL VIA REASONING // INFINITE LOOP INJECTION // REASONING AUDIT // MITRE ATLAS COVERAGE // COT INFLATION ATTACKS // REASONING STEGANOGRAPHY // CHAIN HIJACKING // DATA EXFIL VIA REASONING // INFINITE LOOP INJECTION // REASONING AUDIT // MITRE ATLAS COVERAGE //
6 Subsystems
61 Total Tests
31 Attack Payloads
7 Inflation Vectors
6 Stego Techniques
5 Audit Phases
// THREAT MODEL

Chain-of-Thought as an Attack Vector

Extended reasoning models โ€” o1, o3, Gemini 2.0 Flash Thinking, DeepSeek-R1 โ€” expose an entirely new attack surface: the visible thought process itself. SERPENT weaponises CoT in six ways: inflating compute costs, hiding data in reasoning text, hijacking the reasoning chain mid-flight, leaking secrets through structured thought patterns, injecting infinite loops, and auditing all of the above with a comprehensive 5-phase coverage sweep.

๐Ÿ“ˆ
COMPUTE INFLATION
7 inflation payloads force up to 25x reasoning expansion โ€” translating directly into API cost explosion and inference latency DoS without any rate-limit bypass needed.
๐Ÿ‘๏ธ
REASONING STEGO
6 steganographic techniques hide sensitive data inside visible CoT output โ€” Base64 smuggled in hedge phrases, Morse encoded as punctuation, binary in sentence length parity.
๐Ÿ”€
CHAIN HIJACKING
5 injection payloads intercept an active reasoning chain and redirect the model's conclusion โ€” altering the final answer while the reasoning trace appears coherent.
๐Ÿ”
ED25519 EVIDENCE
Every payload execution, reasoning trace, and audit finding is hash-chained and Ed25519-signed for tamper-evident forensic reporting and compliance submissions.
// SUBSYSTEMS

Six Subsystems. Complete CoT Coverage.

SERPENT structures its attack capabilities across six cooperating modules โ€” from inflation and steganography through hijacking, exfiltration, loop injection, and a comprehensive 5-phase audit sweep.

INFLATOR 7 payloads

Forces unnecessary reasoning steps to inflate CoT length by 5x to 25x. Exploits API cost billing by reasoning token, creating a low-bandwidth cost amplification DoS.

cost-amplification token-dos complexity-injection step-forcing
STEGO 6 techniques

Detects and demonstrates 6 steganographic channels within reasoning text: Base64 in hedge phrases, Morse in punctuation, binary in sentence parity, LSB in word choice.

base64-stego morse-encode sentence-parity word-lsb punctuation-encode
HIJACKER 5 payloads

Intercepts an active reasoning chain and injects adversarial redirections. The model's visible thought process is corrupted mid-flight, producing a manipulated final answer.

mid-chain-inject conclusion-redirect premise-corruption logic-inversion
EXFILTRATOR 5 vectors

Extracts data from the reasoning process โ€” system prompt leakage, context window echoing, and tool-call parameter exposure hidden inside the visible thought trace.

prompt-leak context-echo param-exposure memory-dump
LOOPER 6 conditions

Injects reasoning conditions that produce infinite or near-infinite loops. Models enter circular logic states, exhausting inference budget while appearing to reason normally.

circular-logic self-reference budget-exhaust condition-cycle
AUDITOR 5 audit phases

5-phase sweep across all SERPENT attack categories. Produces CVSS-mapped findings, MITRE ATLAS technique IDs, and a signed JSON report with per-vector coverage breakdown.

5-phase cvss-mapping atlas-map signed-report
// INFLATOR PAYLOADS

Compute Cost Amplification

Each INFLATOR payload measures the reasoning expansion factor it achieves against a target model โ€” expressed as a multiplier of baseline reasoning tokens for the same prompt.

ID Technique Inflation Factor Target Model Class
SINFL-001Baseline multi-step forcing5xAll reasoning models
SINFL-002Uncertainty amplification7xo1 / o3 class
SINFL-003Contradiction induction10xo1 / DeepSeek-R1
SINFL-004Recursive decomposition12xAll extended reasoning
SINFL-005Adversarial context bloat15xo1 / Gemini Thinking
SINFL-006Self-verification spiral20xo3 / DeepSeek-R1
SINFL-007Compound multi-vector25xo3 โ€” reasoning budget exhaustion
// HIJACKER PAYLOADS

Reasoning Chain Redirection

HIJACKER intercepts an active reasoning chain at a vulnerable step transition and injects an adversarial premise โ€” redirecting the model's final conclusion without making the visible reasoning appear obviously corrupted.

ID Hijack Type Injection Point Outcome
SHIJ-001Premise substitutionStep 1 โ€” initial assumptionInverted conclusion
SHIJ-002Mid-chain logic swapStep N/2 โ€” mid-reasoningRedirected output
SHIJ-003Authority injectionEvidence evaluation stepFalse authority accepted
SHIJ-004Conclusion pre-loadingPre-answer stepDesired conclusion forced
SHIJ-005Counterfactual pivotAny step โ€” counterfactual contextAlternative-world reasoning accepted
// STEGO & EXFIL DETECTION

Steganographic Channels and Exfil Vectors

SERPENT STEGO detects hidden data channels within reasoning output. EXFILTRATOR probes 5 vectors that expose system prompt contents, tool parameters, and context window data via the visible thought trace.

ID Channel Carrier Capacity (bps)
SSTEG-001Base64 in hedge phrasesEpistemic qualifiers ("possibly", "likely")~40 bps
SSTEG-002Morse in punctuationComma vs. semicolon spacing patterns~8 bps
SSTEG-003Binary in sentence parityEven/odd word count per sentence~12 bps
SSTEG-004LSB in word choiceSynonym selection (formal vs. informal)~6 bps
SSTEG-005Acrostic encodingFirst letter of each reasoning step~30 bps
SSTEG-006Step-count binaryNumber of sub-steps per reasoning block~10 bps
ID Exfil Vector Data at Risk Severity
SEXF-001System prompt echoFull system prompt contentsCRITICAL
SEXF-002Context window dumpPrior conversation turnsCRITICAL
SEXF-003Tool parameter exposureTool call arguments including credentialsCRITICAL
SEXF-004Memory read-backAgent memory store contentsHIGH
SEXF-005Identity leakUser UUID and session metadataHIGH
// LOOPER โ€” INFINITE REASONING INJECTION

Inference Budget Exhaustion

SERPENT LOOPER injects conditions that trap reasoning models in circular or near-infinite logic states โ€” consuming the full inference budget without producing a useful output.

ID Loop Type Mechanism Budget Impact
SLOOP-001Self-referential contradictionInjects a statement true only if false100% (timeout)
SLOOP-002Mutual dependencyA requires B, B requires A โ€” no resolution100% (timeout)
SLOOP-003Verification spiralPrompts model to verify its own verification~85% budget
SLOOP-004Infinite decompositionSub-problem always generates new sub-problem~90% budget
SLOOP-005Conflicting axiom setInjects axioms that cannot be simultaneously satisfied100% (timeout)
SLOOP-006Halting problem simulationPoses an undecidable problem requiring exhaustive search100% (timeout)
// INSTALL & CLI

Deploy SERPENT

Available on PyPI. Runs on all major security and general-purpose Linux distributions, macOS, and Windows.

pip install red-specter-serpent
SERPENT // FULL RUN
# Run inflation attack โ€” 15x compute amplification
$ serpent inflator --target agent://reasoning-model --payload SINFL-005 --mode live

SERPENT INFLATOR v1.0.0 โ€” CHAIN-OF-THOUGHT ATTACK ENGINE
โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”
[+] Target         : agent://reasoning-model (o1-preview)
[+] Payload        : SINFL-005 โ€” Adversarial context bloat
[+] Baseline tokens: 847 reasoning tokens
[!] Inflated tokens: 12,892 reasoning tokens (+1423%)
[!] Inflation factor: 15.2x (expected: 15x)
[!] Cost amplification: $0.031 โ†’ $0.463 per call
[+] Ed25519 evidence signed โ€” SINFL-2026-001-A

# Detect steganographic channels in reasoning output
$ serpent stego --target agent://reasoning-model --detect-all

[+] SSTEG-001 (Base64/hedge)  : DETECTED โ€” 3 occurrences
[+] SSTEG-005 (acrostic)      : DETECTED โ€” "EXFIL" found in step initials
[!] SSTEG-002 (Morse/punct)   : NOT DETECTED โ€” model uses consistent punct
[+] Stego channels found: 2/6

# Run hijacker โ€” redirect conclusion
$ serpent hijacker --target agent://reasoning-model --payload SHIJ-003 --mode live

[+] Hijack point   : Evidence evaluation step (step 4/7)
[+] Injected       : False authority source accepted
[!] Conclusion redirected: APPROVE โ†’ DENY
[!] Reasoning trace appears coherent: YES
[+] Evidence signed โ€” SHIJ-2026-001-A

# Run loop injection โ€” budget exhaustion
$ serpent looper --target agent://reasoning-model --payload SLOOP-001 --mode live

[!] Model entered circular reasoning state
[!] Inference budget exhausted at 100% โ€” no output produced
[+] Evidence signed โ€” SLOOP-2026-001-A

# Generate signed audit report
$ serpent report --format json --sign --output serpent_report.json

[+] 14 findings (5 CRITICAL / 6 HIGH / 3 MEDIUM)
[+] MITRE ATLAS techniques mapped: AML.T0051, AML.T0048, AML.T0043
[+] Hash-chain: SHA-256 over all findings
[+] Ed25519 signature applied
[+] Report: serpent_report.json
CLI Commands inflator ยท stego ยท hijacker ยท exfiltrator ยท looper ยท audit ยท report
Output Formats JSON ยท Markdown ยท Splunk HEC ยท Sentinel ยท QRadar
Target Models o1 ยท o3 ยท DeepSeek-R1 ยท Gemini Thinking ยท Claude Extended
// EVIDENCE CHAIN

Forensic-Grade Report Integrity

Every SERPENT attack execution is hash-chained and Ed25519-signed โ€” producing tamper-evident artefacts suitable for penetration test reports, regulatory compliance filings, and legal proceedings.

// EVIDENCE CHAIN โ€” SERPENT REPORT FLOW
01 INFLATOR measures baseline and post-inflation token counts โ€” delta recorded
02 STEGO detects hidden channels โ€” each occurrence SHA-256 hashed with timestamp
03 HIJACKER records pre- and post-injection reasoning traces for comparison
04 EXFILTRATOR documents extracted data fragments with source classification
05 LOOPER logs budget exhaustion events with token consumption proof
06 REPORT hash-chains all events, maps ATLAS techniques, applies Ed25519 signature
// SIEM INTEGRATION

Native SIEM Telemetry

SERPENT emits structured telemetry in Splunk HEC, Microsoft Sentinel, and IBM QRadar formats. CoT attack events integrate directly into your SOC detection workflow.

COT_INFLATION
Inflation event with baseline tokens, inflated tokens, factor, estimated cost delta, and payload ID.
AML.T0048 INFLATOR
COT_STEGANOGRAPHY
Hidden channel detection event. Channel type, carrier text excerpt, capacity estimate, and occurrence count.
AML.T0043 STEGO
COT_HIJACK
Chain hijacking event. Injection point (step number), pre-injection conclusion, post-injection conclusion.
AML.T0051 HIJACKER
COT_EXFIL
Exfiltration event. Vector ID, data classification (system_prompt/context/tool_params), fragment hash.
AML.T0040 EXFILTRATOR
COT_LOOP
Loop injection event. Loop type, token budget consumed, timeout flag, and loop condition description.
AML.T0048.002 LOOPER
COT_AUDIT
Audit phase completion. Phase ID (1โ€“5), vectors tested, findings count, and coverage percentage.
AML.T0057 AUDITOR
// NIGHTFALL PIPELINE

Position in the NIGHTFALL Framework

SERPENT (Tool 37) sits in the Reasoning Attack track of NIGHTFALL. It accepts memory context from LAZARUS and its exfiltrated data feeds into JANUS guardrail bypass targeting.

T35
VECTOR
T36
LAZARUS
T37
SERPENT
T38
JANUS
T39
ARCHITECT
T40
WARLORD
T41
FIREBALL
T42
RAGNAROK
T43
ECLIPSE
T44
SHROUD
T45
APOCALYPSE
T65
NIGHTFALL
// UNLEASHED โ€” SAFETY MODEL

Three-Mode Operational Safety

SERPENT implements the NIGHTFALL UNLEASHED safety model โ€” Ed25519 dual-gate activation ensures every live operation is signed, scoped, and forensically traceable.

DETECT MODE
Passive Analysis

AUDITOR runs a read-only 5-phase sweep. No payloads are injected. Identifies CoT vulnerability surface โ€” inflation susceptibility, steganographic channel presence, loop conditions โ€” without any active attack.

DRY-RUN MODE
Simulated Attack

Full attack simulation with no payload committed to the target. INFLATOR, HIJACKER, STEGO, EXFILTRATOR, and LOOPER execute in emulation โ€” outputs show what would succeed in live mode.

LIVE MODE
Authorised Execution

Requires Ed25519 UNLEASHED key. Payloads are injected, inflation is measured, hijacking is confirmed, exfiltration is documented. Every action is hash-chained and signed for legal defensibility.

// PLATFORMS

Runs Everywhere You Operate

SERPENT is tested and verified on all major security and general-purpose platforms.

๐Ÿ‰
Kali Linux
๐Ÿฆœ
Parrot OS
๐Ÿน
BlackArch
๐Ÿ”ฌ
REMnux
โš”๏ธ
Tsurugi
๐Ÿ“ฆ
PyPI
๐ŸŽ
macOS
๐ŸชŸ
Windows
๐Ÿณ
Docker
โš  AUTHORISED USE ONLY

SERPENT is a professional security research tool. All capabilities are provided exclusively for authorised penetration testing, red team engagements, academic research, and defensive AI security assessment. Use requires written authorisation from the target system owner. Unauthorised access to AI reasoning models, production systems, or inference infrastructure is illegal under the Computer Misuse Act 1990, CFAA, and equivalent legislation in all jurisdictions. Red Specter Security Research Ltd assumes no liability for misuse. UNLEASHED live mode requires a valid Ed25519 operator key and signed engagement scope file.