Docs | SpectraStrike | Nexus | Nyxera Labs
Armory + Universal Runner Execution Fabric

Scope
This document captures Armory registry controls and standardized edge-runner execution behavior.
Armory Workflow
- Ingest BYOT artifact (
tool_name,image_ref, binary payload). - Compute immutable digest (
sha256). - Generate SBOM metadata.
- Run vulnerability summary pipeline.
- Generate signing metadata.
- Require explicit approval before digest becomes execution-authorized.
Standard Runner Workflow
Primary edge runner reference implementation:
src/runner-go
Standard controls:
- Verify compact JWS on edge side using Ed25519 (
alg=EdDSA). - Resolve authorized tool digest from Armory.
- Enforce exact digest match against manifest.
- Execute via firecracker microVM contract (simulation in dev/CI, native in hardened runtime).
- Map output to CloudEvents (
stdout,stderr,exit_code,manifest_jws).
QA Controls
- Forged Ed25519 JWS signatures must fail.
- Tampered tool digests must fail.
- Execution output must map to standardized CloudEvents payload.
Current Standardization Status
- Go runner verification path is Ed25519-first.
- Firecracker microVM path is the standard runner backend.
- Wrapper SDK contract remains aligned to telemetry/fingerprint/attestation/signature requirements.
2026 SpectraStrike by Nyxera Labs. All rights reserved.
Docs | SpectraStrike | Nexus | Nyxera Labs