SpectraStrike Documentation

Operational Fabric for Attested Offensive Validation

SpectraStrike

Docs | SpectraStrike | Nexus | Nyxera Labs

Armory + Universal Runner Execution Fabric

SpectraStrike Logo

Scope

This document captures Armory registry controls and standardized edge-runner execution behavior.

Armory Workflow

  1. Ingest BYOT artifact (tool_name, image_ref, binary payload).
  2. Compute immutable digest (sha256).
  3. Generate SBOM metadata.
  4. Run vulnerability summary pipeline.
  5. Generate signing metadata.
  6. Require explicit approval before digest becomes execution-authorized.

Standard Runner Workflow

Primary edge runner reference implementation:

Standard controls:

  1. Verify compact JWS on edge side using Ed25519 (alg=EdDSA).
  2. Resolve authorized tool digest from Armory.
  3. Enforce exact digest match against manifest.
  4. Execute via firecracker microVM contract (simulation in dev/CI, native in hardened runtime).
  5. Map output to CloudEvents (stdout, stderr, exit_code, manifest_jws).

QA Controls

Current Standardization Status


Nyxera Labs

2026 SpectraStrike by Nyxera Labs. All rights reserved.

Docs | SpectraStrike | Nexus | Nyxera Labs