SpectraStrike + VectorVue End User Guide
1) Installation (Linux/macOS)
- Install
git,make,docker, anddocker compose. - Clone both repositories side-by-side:
SpectraStrikeandVectorVue. - In
SpectraStrike, runpython -m venv .venv && .venv/bin/pip install -r requirements.txt. - In
VectorVue, install Python dependencies withpip install -r requirements.txt.
2) Docker Requirements
- Docker Engine 24+
- Docker Compose v2+
- Minimum host: 4 CPU, 8 GB RAM, 20 GB free disk
Validate:
docker --version
docker compose version
3) How To Generate Certs
- Use existing local cert generation in VectorVue deploy assets:
ls VectorVue/deploy/certs - Required files:
ca.crt,server.crt,server.key,client.crt,client.key - Required federation keys:
spectrastrike_ed25519.keyandvectorvue_feedback_ed25519.key
4) How To Start Both Platforms
cd SpectraStrikemake local-federation-up- Confirm services:
docker compose ps(in each repo)
The command autoloads gitignored local federation env files and compose override files.
5) How To Run First Execution (nmap example)
cd SpectraStrike
PYTHONPATH=src .venv/bin/python -m pkg.integration.host_integration_smoke \
--tenant-id 10000000-0000-0000-0000-000000000001 \
--check-vectorvue
6) How To Verify Federation Is Active
Check smoke output fields:
vectorvue_event_status=acceptedvectorvue_finding_status=acceptedvectorvue_status_poll_status=accepted|partial
Then inspect local_docs/audit/final-e2e-asymmetric-*.log.
7) How To View Findings In VectorVue
- Open VectorVue UI.
- Login with tenant user credentials.
- Navigate to findings/risk views.
- Filter by tenant and latest timestamp.
8) How Feedback Loop Works
- SpectraStrike sends signed execution graph metadata.
- VectorVue validates signatures and mapping, then computes adjustments.
- VectorVue returns Ed25519-signed feedback (
kid,signature,nonce,signed_at). - SpectraStrike verifies signature and replay conditions before applying policy changes.
9) Troubleshooting
401 Invalid telemetry signature: verify SpectraStrike signing key and VectorVue trusted public key.401 certificate fingerprint mismatch: update pinned cert hash in local federation env.409 Replay detected: regenerate nonce; do not reuse request bodies.422 schema version not allowed: align payload schema to gateway allowed schema.feedback uses unknown key id: updateVECTORVUE_FEEDBACK_VERIFY_KEYS_JSONwith activekid.
10) Security Explanation (Plain English)
The platforms trust only requests that pass all checks: mTLS identity, certificate pinning, signature verification, schema checks, and anti-replay logic. If any check fails, the request is rejected and not processed.