SpectraStrike Documentation

Operational Fabric for Attested Offensive Validation

SpectraStrike

Docs | SpectraStrike | Nexus | Nyxera Labs

E2E Execution Audit Report

Scope

Asymmetric federation hardening verification for SpectraStrike <-> VectorVue with local persistent federation config.

Commands Used

cd SpectraStrike
make local-federation-up
PYTHONPATH=src .venv/bin/python -m pkg.integration.host_integration_smoke --tenant-id 10000000-0000-0000-0000-000000000001 --check-vectorvue
sliver-client version
PYTHONPATH=src .venv/bin/pytest -q tests/unit/test_firecracker_microvm_runner.py

Signed cognitive verification command path:

Runtime Evidence

Primary host smoke output:

Cognitive verification output:

Firecracker runtime evidence:

Audit log artifact:

Signature Verification Proof

Attestation Proof

Failure Cases Tested

Final Conclusion

Federation path is operating under asymmetric cryptographic controls with hard-fail verification, attestation propagation, and accepted end-to-end telemetry/finding flow. Remaining operational gap is Sliver wrapper CLI compatibility, which is isolated from the federation trust controls.

Wrapper Federation Audit Addendum (2026-02-28)

Commands Used

cd SpectraStrike
PYTHONPATH=src .venv/bin/python -m pkg.integration.host_integration_smoke --tenant-id 10000000-0000-0000-0000-000000000001 --check-vectorvue
SPECTRASTRIKE_WRAPPER_SIGNING_KEY_PATH=/home/xoce/Workspace/VectorVue/deploy/certs/spectrastrike_ed25519.key \
  PYTHONPATH=src:/usr/lib/python3.14/site-packages \
  .venv/bin/python -m pkg.integration.host_integration_smoke \
  --tenant-id 10000000-0000-0000-0000-000000000001 \
  --check-impacket-psexec

Wrapper-by-Wrapper Results (Implemented Wrappers)

Wrapper E2E Status Evidence
Nmap Pass (with runtime warning) nmap_binary_ok=True, nmap_scan_ok=True, recoverable warning Socket creation in sendOK: Operation not permitted (1) handled
Metasploit Pass metasploit_binary_ok=True
Impacket psexec.py Pass (signed contract path) impacket_psexec_binary_ok=True, impacket_psexec_command_ok=True
Sliver Blocked (environment) sliver-client version exits code 2 due log path permission at /home/xoce/.sliver-client/sliver-client.log
Mythic Blocked (dependency missing) mythic-cli not found on host PATH

Federation Notes

Local Persistent Federation Pass (2026-02-28)

Persistent Local Config Applied

Local gitignored file:

Set explicitly for persistent manual E2E:

Commands Executed

cd SpectraStrike
make local-federation-up
PYTHONPATH=src .venv/bin/python -m pkg.integration.host_integration_smoke --tenant-id 10000000-0000-0000-0000-000000000001 --check-vectorvue
SPECTRASTRIKE_WRAPPER_SIGNING_KEY_PATH=/home/xoce/Workspace/VectorVue/deploy/certs/spectrastrike_ed25519.key \
  PYTHONPATH=src:/usr/lib/python3.14/site-packages \
  .venv/bin/python -m pkg.integration.host_integration_smoke \
  --tenant-id 10000000-0000-0000-0000-000000000001 \
  --check-impacket-psexec --check-sliver-command --check-vectorvue

Results

Remaining Hard Blockers For “All Functionalities” Claim


Nyxera Labs

2026 SpectraStrike by Nyxera Labs. All rights reserved.

Docs | SpectraStrike | Nexus | Nyxera Labs