SpectraStrike Roadmap – Phases, Sprints, and Commits

ARCHITECTURAL PIVOT NOTICE (v2.0): As of Phase 4, SpectraStrike transitions from a legacy “wrapper-based” orchestration tool into a Policy-Driven, Cryptographically Verifiable Universal Execution Fabric. Future phases prioritize BYOT (Bring Your Own Tool), ephemeral hardware isolation, cryptographic non-repudiation (JWS/Merkle Trees), and Zero-Trust authorization via OPA. This architecture is designed to seamlessly feed structured, verifiable telemetry to VectorVue via our messaging backbone (RabbitMQ/Kafka) to empower its ML/Cognition and Compliance engines.
Phase 1: Setup & Environment Initialization (Sprint 1-2)
Federation Completion Addendum (February 27, 2026)
Completed
- Phase 5.6 Federation Setup
- Sprint 30 & Sprint 31 Cognitive Feedback Loop
- Asymmetric Federation Upgrade (Ed25519 both directions)
- Attested Execution Embedding (
attestation_measurement_hashbound into canonical telemetry, fingerprints, findings, policy inputs) - Persistent Local Federation Bootstrap (
make local-federation-up, gitignoredlocal_federation/) - Full Documentation Suite (product README + end user + SDK + integration + audit docs)
- E2E Execution Audit
Upcoming
- Ledger anchoring (Merkle root commitments)
- Hardware TPM integration for attestation signing and key custody
- Distributed federation topology (multi-site trust mesh)
- Multi-tenant key isolation with per-tenant signing domains
Sprint 1 (Week 1-2): Repository & Dev Environment
- Initialize Git repo – Commit initial setup
- Setup Python virtual environment
- Install core dependencies (requests, asyncio, logging)
- Setup Docker dev containers
- Setup IDE configuration
- Configure pre-commit hooks
- Setup Git branching strategy
- Implement initial CI/CD pipeline (GitHub Actions / GitLab CI)
- Setup logging framework
- Configure AAA framework (AuthN/AuthZ/Accounting)
Deliverables:
- Baseline repo structure committed
- Working dev environment with Docker & IDE ready
- CI/CD pipeline skeleton
- Logging & AAA framework in place
Phase 1 QA (Baseline)
- QA: validate environment consistency
- QA: run linter & unit test baseline
Phase 2: Orchestrator Core Development (Sprint 3-4)
Sprint 2 (Week 3-4): Orchestrator Architecture
-[x] Design orchestrator architecture
- Implement async event loop
- Implement task scheduler
- Implement telemetry ingestion
- Implement logging & audit trails
- Implement AAA enforcement at engine level
- Unit tests for orchestrator
- Commit orchestrator code
Sprint 3 (Week 5-6): Orchestrator QA
- QA: run functional tests -[x] QA: validate telemetry output
- QA: AAA access verification
Deliverables:
- Core orchestrator engine implemented
- Task scheduling, telemetry, logging, AAA fully functional
- Baseline QA verification completed
Phase 3: Integration Layer Development (Sprint 5-9.9)
Sprint 4 (Week 7-8): API Integration
- Design API client for VectorVue
- Implement encrypted data transfer (TLS)
- Implement retries / backoff
- Implement event batching
- Implement message signing for integrity -[x] Commit integration code
Sprint 5 (Week 9-10): API QA
-[x] QA: test API endpoints
- QA: validate encrypted communication
- QA: confirm telemetry reaches VectorVue
Sprint 6 (Week 11-12): Nmap Wrapper Development (Legacy Baseline)
- Create Python wrapper module (Nmap)
- Implement TCP SYN scan (Nmap)
- Implement UDP scan (Nmap)
- Implement OS detection (Nmap)
- Parse XML/JSON output (Nmap)
- Send scan results to orchestrator (Nmap)
- Integrate logging & telemetry (Nmap)
- Unit tests for wrapper (Nmap)
- Commit wrapper (Nmap)
Sprint 7 (Week 13-14): Nmap QA
- QA: validate scan accuracy (Nmap)
- QA: AAA enforcement (Nmap)
Sprint 8 (Week 15-16): Metasploit Integration (Legacy Baseline)
- Connect to Metasploit RPC
- Implement module loader (Metasploit)
- Execute exploits (Metasploit)
- Capture session output (Metasploit)
- Send results to orchestrator (Metasploit)
- Logging & telemetry (Metasploit)
- Retry/error handling (Metasploit)
- Unit tests (Metasploit)
- Commit wrapper (Metasploit)
Sprint 8.5 (Week 16-17): Nmap + Metasploit End-to-End Stabilization
- Add unprivileged Nmap execution fallback (
-sS->-sT) for local/operator runs - Validate real Nmap scan execution path and telemetry handoff -[x] Implement manual Metasploit ingestion connector (sessions + session-events pull)
- Add checkpoint-based deduplication for Metasploit manual ingestion
- Add CLI sync entrypoint for operator-driven Metasploit ingestion
- Add unit/integration tests for manual ingestion flow -[x] Commit end-to-end stabilization updates
Sprint 9 (Week 17-18): Metasploit QA
- QA: validate exploit runs (Metasploit) -[x] QA: check telemetry delivery (Metasploit)
Sprint 9.5 (Week 18): Messaging Backbone (RabbitMQ baseline)
- Select broker standard (RabbitMQ) and define topic/queue model
- Implement telemetry publisher abstraction (
TelemetryPublisher) - Add broker-backed async delivery path for orchestrator telemetry
- Add retry, dead-letter, and idempotency handling for broker delivery
- Add integration tests for publish/consume flow
- Add dockerized RabbitMQ runtime wiring + Makefile command targets
- Add remote operator endpoint configuration (
MSF_RPC_*,MSF_MANUAL_*,RABBITMQ_*) - Commit messaging backbone
Sprint 9.6 (Week 18-19): Infrastructure Control Plane & Armory UI
- Define UI architecture and API contracts
- Implement Web UI foundation with Next.js (App Router) + Tailwind CSS
- Implement auth views and operator dashboard shell (Web UI)
- Implement raw execution telemetry feed view for operator debugging (Web UI)
- Implement Armory management screens (tool ingest, SBOM scan, signature approval) (Web UI)
- Implement Fleet management screens (runner/microVM/queue health) (Web UI)
- Implement Policy & Trust screens (OPA controls + Vault/HSM signer health) (Web UI)
- Wire Web UI control actions to orchestrator infrastructure endpoints
- Add Web UI tests (component/unit + basic E2E) -[x] Implement Interactive Terminal UI (Admin TUI) for operational control
- Add Admin TUI command workflows (task/manifest submission, telemetry watch, break-glass controls)
- Add Admin TUI tests and command-level QA checks
- Commit UI foundation (Web UI + Admin TUI)
Sprint 9.7 (Week 19): Security & Container Platform Hardening
- Implement Dockerized runtime stack for all components
- Add Nginx reverse proxy container (TLS termination, routing, rate limits)
- Add PostgreSQL container for persistent operational data
- Add Redis container for cache, buffering, and near-real-time log/event stream
- Add secure internal Docker network segmentation between services
- Add secrets/config management for credentials, tokens, and API keys
- Add centralized log pipeline and retention policy in containers
- Add host firewall baseline for published container ports (
DOCKER-USERpolicy) - Add egress allowlist enforcement baseline for Docker bridge traffic
- Add TLS certificate pinning checks for external integrations (Metasploit/VectorVue)
- Add HTTPS edge with optional mTLS client verification in Nginx
- Add internal mTLS for telemetry data plane (app <-> RabbitMQ)
- Add full service-to-service end-to-end TLS (internal mTLS between all runtime services, including DB/cache)
- Add health checks, startup ordering, and restart policies for all services
- Add backup/restore workflow for PostgreSQL and Redis state
- Add container security baseline (non-root, minimal images, pinned versions)
- Add infrastructure integration tests and security QA checks
- Add project Makefile for easy test, easy deploy, and easy QA operations
- Add local supply-chain security gate (SBOM + CVE scan + signature workflow)
- Add tamper-evident audit event hash-chaining
- Add stronger AAA controls (constant-time auth, lockout, optional MFA)
- Add QA runbook and full-regression command targets (local and CI-aligned)
- Commit security/container platform baseline
Sprint 9.8 (Week 19-20): Cross-Sprint QA Consolidation
- QA: validate Sprint 9.5 messaging backbone tests
- QA: validate Sprint 9.5 remote endpoint/manual-ingestion integration tests
- QA: validate Sprint 9.6 Admin TUI workflows
- QA: rerun Sprint 9.6 Web UI unit/E2E suite in dependency-ready environment
- QA: validate Sprint 9.7 AAA + audit trail hardening tests
- QA: validate Sprint 9.7 compose configuration and security policy checks
- QA: validate docs integrity and references
- QA: validate license header compliance across repo
- Blocker captured with exact command output for dependency and test commands
Sprint 9.9 (Week 20): Governance & Legal Enforcement
- Implement environment-aware legal enforcement service (
self-hosted,enterprise,saas) - Add versioned legal configuration (
EULA,AUP,PRIVACY) -[x] Implement self-hosted acceptance storage and validation - Add enterprise installation acceptance model (schema draft)
- Add SaaS user-level acceptance model (migration draft)
- Integrate legal enforcement into auth middleware and token issuance gates
- Add re-acceptance flow on legal version mismatch -[x] Add legal acceptance route and Web UI acceptance workflow
- Add CLI/TUI legal gate integration
- Update governance/security documentation indexing
Phase 4: The Universal Execution Fabric & Armory (Sprint 10-13)
Goal: Move away from hardcoded wrappers. Implement cryptographic signing for arbitrary execution.
Sprint 10 (Week 21-22): Cryptographic Payload Engine
- Implement HashiCorp Vault (or HSM equivalent) integration for signing keys.
- Implement JWS (JSON Web Signature) payload generation in the Orchestrator.
- Design Execution Manifest schema (Task Context, Target URN, Tool SHA256, Parameters).
- Implement Anti-Replay mechanisms (nonce and timestamp validation).
- Commit cryptographic engine updates.
Sprint 11 (Week 23-24): The Armory (Tool Registry)
- Deploy internal, immutable OCI container registry / binary store (“The Armory”).
- Implement tool ingestion pipeline (Upload -> SBOM generation -> Vulnerability Scan).
- Implement Cosign/Sigstore cryptographic signing for all ingested tools.
- Create UI/TUI module for registering and managing authorized tools (BYOT support).
- Commit The Armory infrastructure.
Sprint 12 (Week 25-26): The Universal Edge Runner
- Build the Universal Runner (lightweight Go or secured Python binary).
- Implement local JWS public-key verification logic inside the Runner.
- Implement secure retrieval of signed tools from The Armory based on Manifest hash.
- Implement strict execution sandboxing using
gVisor(runsc) or Docker AppArmor profiles. - Implement standard execution contract: output capture mapping
stdout/stderrto CloudEvents schema. - Commit the Universal Runner.
Sprint 13 (Week 27): Execution Fabric QA
- QA: Attempt execution with forged JWS signatures (must fail).
- QA: Attempt execution with tampered tool binaries/hashes (must fail). -[x] QA: Verify telemetry output accurately maps to standardized CloudEvents.
Phase 5: Zero-Trust & Policy-Driven Control Plane (Sprint 14-17)
Goal: Decouple authorization logic from codebase. Enforce strict capability checks.
Sprint 14 (Week 28-29): Open Policy Agent (OPA) Integration
- Deploy OPA container alongside the Orchestrator.
- Define standard Rego policy schemas for Operator Capabilities.
- Implement Orchestrator pre-execution hooks: query OPA before signing any JWS.
- Develop capability policies based on
[Identity] + [Tenant] +[Tool Hash] + [Target URN]. - Refactor existing Python AAA to delegate complex execution checks to OPA.
- Commit OPA Integration.
Sprint 15 (Week 30-31): Network Fencing & Blast Radius Control
- Implement dynamic eBPF/Cilium network policies for the Universal Runner.
- Configure Runner network isolation: Allow outbound only to authorized Target IPs defined in Manifest.
- Block lateral movement within internal networks from the execution sandbox.
- Implement micro-segmentation for multi-tenant SaaS environments.
- Commit Network Fencing rules.
Sprint 16 (Week 32): Telemetry & CloudEvents Standardization
- Implement unified schema parser in Orchestrator for all incoming data.
- Create Python/Bash SDKs for BYOT developers to easily format their tool outputs.
- Ensure
tenant_idcontext propagation is strictly enforced in all telemetry. - Commit Telemetry pipelines.
Sprint 16.5 (Week 32.5): Legacy Wrapper SDK Migration
- Add explicit deprecation note for legacy direct-wrapper telemetry emission path.
- Migrate Nmap wrapper telemetry emission to BYOT telemetry SDK + unified schema ingestion.
- Migrate Metasploit wrapper telemetry emission to BYOT telemetry SDK + unified schema ingestion.
- Migrate manual Metasploit ingestion connector telemetry emission to BYOT telemetry SDK + unified schema ingestion.
- Preserve security controls from prior sprints (strict
tenant_idpropagation + schema validation). - Add regression tests for SDK-based emission path compatibility.
- Commit Sprint 16.5 SDK migration.
Sprint 16.6 (Week 32.6): UI/TUI and Runtime Tenant Alignment
- Update Web UI task and manual-sync action routes to enforce/default
tenant_id. - Update Admin TUI client/shell workflows to propagate
tenant_idin task and manual sync submissions. - Update dev/prod container environment defaults for tenant context propagation (
SPECTRASTRIKE_TENANT_ID). - Update operator docs/Makefile hints for tenant-context requirement in interactive workflows.
- Commit Sprint 16.6 alignment updates.
Sprint 16.7 (Week 32.7): Host Toolchain Integration Validation
- Implement host integration smoke module covering local
nmapexecution and tenant-aware telemetry ingestion checks. - Validate host
metasploitbinary presence/version and add optional RPC authentication smoke path. - Add optional live VectorVue smoke hook to the same host validation workflow.
- Enforce VectorVue smoke acceptance contract across event, finding, and ingest-status APIs in host integration validation.
- Add unit regression coverage for VectorVue smoke pass/fail gating in host integration workflow.
- Add operator-facing command entrypoint (
make host-integration-smoke) and QA/User guide documentation. - Commit Sprint 16.7 host integration validation.
Sprint 16.8 (Week 32.8): VectorVue RabbitMQ Bridge Alignment
- Implement RabbitMQ-to-VectorVue bridge module for broker envelope to API forwarding.
- Add live bridge CLI entrypoint (
pkg.integration.vectorvue.sync_from_rabbitmq) and Makefile target (make vectorvue-rabbitmq-sync). - Migrate host integration VectorVue validation path to RabbitMQ-backed bridge flow.
- Add regression unit tests for RabbitMQ bridge forwarding and failure handling.
- Document operator QA flow for broker-backed VectorVue validation.
- Produce whitepaper compliance check for current implementation status and explicit gaps.
- Commit Sprint 16.8 RabbitMQ bridge alignment.
Sprint 17 (Week 33): Zero-Trust QA
- QA: Verify OPA rejects unauthorized tool execution attempts.
- QA: Verify OPA rejects authorized tools against unauthorized Target URNs.
- QA: Network penetration test of the Runner sandbox (verify containment).
- QA: Re-validate Sprint 16.5 telemetry SDK migration regressions in Sprint 17 gate.
- QA: Re-validate Sprint 16.7 host integration smoke regression suite in Sprint 17 gate.
- QA: Re-validate Sprint 16.8 RabbitMQ bridge regression suite in Sprint 17 gate.
Phase 5.5: Control Plane Integrity & Threat Formalization
Sprint 18 – Formal Threat Modeling
- Perform full STRIDE threat model across all planes
- Define trust boundary diagram (Control, Runner, C2, Vault)
- Enumerate malicious operator scenarios
- Enumerate compromised runner scenarios
- Enumerate supply-chain compromise scenarios
- Enumerate cross-tenant escalation scenarios
- Map threats to existing mitigations
- Create unresolved risk backlog items
- Commit Threat Model v1.0 document
Sprint 19 – Control Plane Integrity Hardening
- Implement signed configuration enforcement (JWS-based)
- Reject unsigned configuration at startup
- Enforce OPA policy hash pinning
- Implement policy hash mismatch detection
- Automate Vault key rotation workflow
- Harden Vault unseal procedure
- Implement runtime binary hash baseline check
- Add tamper-evident audit log channel
- Implement immutable configuration version history
Sprint 20 – High-Assurance AAA Controls
- Enforce hardware-backed MFA for privileged actions
- Implement dual-control approval for tool ingestion
- Enforce dual-signature for high-risk manifests
- Implement break-glass workflow with irreversible audit flag
- Implement time-bound privilege elevation tokens
- Add privileged session recording support
Sprint 21 – Deterministic Execution Guarantees
- Enforce canonical JSON serialization for manifests
- Implement deterministic manifest hashing validation
- Define semantic versioning for manifest schema
- Add schema regression validation to CI pipeline
- Reject non-canonical manifest submissions
Phase 5.6: Federation Trust Closure & Execution Binding
Sprint 22 (Week 41-42): Unified Execution Fingerprint Binding
- Define unified execution fingerprint schema: (manifest_hash + tool_hash + operator_id + tenant_id + policy_decision_hash + timestamp)
- Generate fingerprint before dispatch
- Persist fingerprint in tamper-evident audit stream
- Include fingerprint in telemetry payload to VectorVue
- Enforce fingerprint validation before C2 dispatch
- Reject execution if fingerprint mismatch detected
- Add integration tests for fingerprint integrity
- Commit Sprint 22 Unified Execution Fingerprint Binding
Sprint 23 (Week 43-44): Federation Channel Enforcement
- Enforce single outbound telemetry gateway
- Remove any legacy direct API emission paths
- Enforce mTLS-only outbound federation
- Enforce signed telemetry requirement (no unsigned fallback)
- Add replay detection validation at producer side
- Implement bounded retry with idempotent fingerprint key
- Add federation smoke test suite
- Commit Sprint 23 Federation Channel Enforcement
Sprint 24 (Week 45-46): Anti-Repudiation Closure
- Bind operator identity irreversibly into execution fingerprint
- Enforce pre-dispatch intent record (write-ahead hash entry)
- Implement execution intent verification API
- Add operator-to-execution audit reconciliation test
- Simulate repudiation attempt and validate detection
- Commit Sprint 24 Anti-Repudiation Closure
Phase 5.6 Operational Closure (Dockerized Federation Setup)
- Configure local federation endpoint to internal gateway route (
/internal/v1/telemetry) - Rotate and align mTLS trust material for local dockerized execution
- Enforce strict gateway path semantics (reject redirect-based false positives)
- Validate live
nmap -> SpectraStrike -> VectorVuefederation acceptance - Validate live Metasploit telemetry federation acceptance
- Record non-tracked local audit evidence for acceptance/rejection history
Phase 6: Merkle Ledger Architecture & Append-Only Authority
Sprint 25 (Week 47-48): Ledger Model Definition
- Define Merkle leaf schema using unified execution fingerprint
- Define strict append-only insertion order
- Define deterministic tree growth rules
- Define root generation cadence
- Define root signing procedure
- Define inclusion proof structure
- Commit Sprint 25 Ledger Model Definition
Sprint 26 (Week 49-50): Ledger Core Implementation
- Implement append-only Merkle tree
- Persist immutable execution leaves
- Implement periodic root generation
- Sign root with Control Plane signing authority
- Implement root verification routine
- Add tamper simulation test
- Commit Sprint 26 Ledger Core Implementation
Sprint 27 (Week 51-52): Ledger Verification & Export
- Implement inclusion proof API
- Implement deterministic rebuild mode
- Implement ledger snapshot export
- Implement read-only verifier node
- Validate DB tampering detection via root mismatch
- Commit Sprint 27 Ledger Verification & Export
Phase 7: C2 Trust Extension Layer
Sprint 28 (Week 53-54): C2 Adapter Trust Enforcement
- Bind C2 dispatch to unified execution fingerprint
- Enforce JWS verification at adapter boundary
- Enforce policy hash validation at adapter boundary
- Isolate adapters within hardened execution boundary
- Simulate malicious adapter behavior
- Commit Sprint 28 C2 Adapter Trust Enforcement
Sprint 29 (Week 55-56): Advanced C2 Implementations
- Implement Sliver adapter hardened version
- Implement Mythic adapter scaffold
- Integrate C2 execution metadata into ledger leaf
- Validate zero-trust enforcement during live session
- Commit Sprint 29 Advanced C2 Implementations
Phase 8: Streaming Fabric & VectorVue Cognitive Integration
Sprint 30 (Week 57-58): Broker Abstraction & High-Throughput Path
- Abstract broker layer (RabbitMQ/Kafka compatible)
- Enforce ordered execution event streaming
- Normalize telemetry schema for ML ingestion
- Add high-volume load testing
- Commit Sprint 30 Broker Abstraction & Throughput
Sprint 31 (Week 59-60): Cognitive Feedback Loop
- Push execution graph metadata to VectorVue
- Implement VectorVue → SpectraStrike feedback sync
- Bind feedback adjustments to policy engine
- Display defensive effectiveness metrics in UI
- Validate end-to-end cognitive loop
- Enforce signed internal feedback contract (
/internal/v1/cognitive/*) - Enforce feedback replay protection (
signed_atwindow + nonce uniqueness) - Enforce feedback tenant/fingerprint/schema validation before policy binding
- Commit Sprint 31 Cognitive Feedback Loop
Phase 9: Enterprise & Compliance Gate
Sprint 32 (Week 61-62): Compliance Mapping
- Map controls to SOC 2
- Map controls to ISO 27001 Annex A
- Map controls to NIST 800-53
- Map telemetry to MITRE ATT&CK
- Produce Secure SDLC documentation package
- Commit Sprint 32 Compliance Mapping
Sprint 33 (Week 63-64): Specification Publication
- Publish Execution Manifest Specification v1
- Publish Telemetry Extension Specification
- Publish Capability Policy Specification
- Define backward compatibility guarantees
- Publish validation SDK
- Commit Sprint 33 Specification Publication
Phase 10: Hardware-Assisted Isolation
Sprint 34 (Week 65-66): MicroVM Transition
- Transition Runner to Firecracker MicroVM
- Implement ephemeral boot optimization
- Implement runtime attestation reporting
- Enforce hardware isolation boundary
- Simulate breakout attempt
- Commit Sprint 34 MicroVM Transition
Sprint 35 (Week 67-68): Mutual Attestation & Key Derivation
- Implement TPM-backed identity (on-prem)
- Implement per-execution ephemeral key derivation
- Implement Runner ↔ Control Plane mutual attestation
- Validate multi-tenant stress isolation
- Commit Sprint 35 Mutual Attestation & Isolation Validation