Red Specter VORTEX

Cloud AI Infrastructure Exploitation Framework — 7 subsystems. 36 techniques. 245 tests.

v1.0.0
Contents
OverviewInstallationDISCOVER — Service DiscoveryCONFIG — MisconfigurationTHEFT — Model TheftEXFIL — Data ExfiltrationPRIVESC — Privilege EscalationPERSIST — Cloud PersistenceANTIDOTE — Mandatory RestoreUNLEASHED ModeCLI ReferenceMITRE ATLAS MappingDisclaimer

Overview

VORTEX targets the cloud infrastructure that AI systems run on. Every major cloud provider offers AI/ML services — SageMaker, Vertex AI, Azure ML, Bedrock — and every deployment introduces cloud-specific attack surfaces that traditional AI security tools ignore. VORTEX finds them.

Your models live in the cloud. VORTEX owns the cloud.

Installation

$ pip install red-specter-vortex
$ vortex init
$ vortex status

DISCOVER — Service Discovery

IDTechniqueDescription
DS-001Endpoint EnumerationDiscover exposed model inference endpoints across cloud providers
DS-002GPU Cluster DiscoveryIdentify GPU clusters and training infrastructure
DS-003Registry ScanningScan model registries for exposed models and artifacts
DS-004API MappingMap inference APIs, their authentication, and rate limits
DS-005Provider DetectionFingerprint cloud AI services (SageMaker, Vertex AI, Azure ML, Bedrock)

CONFIG — Misconfiguration

IDTechniqueDescription
CF-001Open EndpointsIdentify model endpoints with no authentication
CF-002Exposed Training DataFind training datasets in open cloud storage buckets
CF-003Permissive IAMIdentify overly permissive IAM policies on AI resources
CF-004Public RegistriesFind model registries with public read access
CF-005Unencrypted ChannelsIdentify unencrypted model serving and training channels

THEFT — Model Theft

Model extraction via cloud access. Weight exfiltration from model registries. Architecture reconstruction through API probing. Side-channel model extraction via inference timing. Complete model replication from cloud infrastructure access.

EXFIL — Data Exfiltration

Training data extraction from cloud storage. Inference data capture via logging exploitation. Model input/output interception. Data pipeline compromise. Cloud storage enumeration for sensitive AI training data.

PRIVESC — Privilege Escalation

Cloud AI privilege escalation. IAM role chaining through ML service accounts. Cross-service pivoting from AI endpoints to broader cloud access. GPU node escalation. Container breakout from model serving infrastructure.

PERSIST — Cloud Persistence

Maintain persistent access to cloud AI infrastructure. Model backdoor injection via registry access. CI/CD pipeline persistence. Scheduled training job manipulation. Container image poisoning for model serving.

ANTIDOTE — Mandatory Restore

Baseline capture before any engagement. Cloud configuration snapshot. IAM policy audit. Model registry integrity verification. Signed restoration certificate confirms clean state post-engagement.

VORTEX UNLEASHED

Standard mode detects. UNLEASHED exploits. Ed25519 crypto. Dual-gate safety. One operator.

# Scan cloud AI surfaces (detection only)
$ vortex discover --provider aws --region eu-west-1

# UNLEASHED (dry run)
$ vortex exploit --target sagemaker-endpoint --override

# UNLEASHED (live)
$ vortex campaign --provider aws --override --confirm-destroy

UNLEASHED mode is restricted to authorised operators with Ed25519 private key access. Targets must be in allowed_targets.txt. 30-minute auto-lock. Unauthorised use violates applicable law.

CLI Reference

CommandDescription
vortex initInitialise configuration and Ed25519 keys
vortex statusSystem status and subsystem count
vortex techniquesList all 36 cloud exploitation techniques
vortex discoverDISCOVER — enumerate cloud AI services
vortex configCONFIG — scan for misconfigurations
vortex stealTHEFT — extract models from cloud
vortex exfilEXFIL — exfiltrate training data
vortex escalatePRIVESC — escalate cloud privileges
vortex persistPERSIST — establish cloud persistence
vortex campaignFull cloud AI exploitation campaign
vortex engagementsList all engagement sessions

MITRE ATLAS Mapping

VORTEX techniques map to MITRE ATLAS tactics including AML.T0035 (ML Model Access), AML.T0037 (Model Discovery), AML.T0024 (Exfiltration via ML Inference API), and MITRE ATT&CK cloud matrix techniques for privilege escalation and persistence.

Disclaimer

Red Specter VORTEX is for authorised security testing only. Cloud AI infrastructure exploitation can disrupt production AI services and expose sensitive data. You must have explicit written permission before testing any system. Unauthorised use may violate the Computer Misuse Act 1990 (UK), CFAA (US), or equivalent legislation.