SpectraStrike SDK Developer Guide
Architecture Overview
- Wrappers execute tools and emit normalized telemetry.
- Orchestrator enriches payloads with tenant/operator/policy/attestation context.
- VectorVue client signs payloads and sends over mTLS.
- Feedback responses are verified before policy application.
How Federation Signing Works
- Outbound: SpectraStrike signs
{timestamp}.{nonce}.{canonical_payload}with Ed25519. - Inbound feedback: SpectraStrike verifies Ed25519 signature using
kid-selected verify key.
Canonical Telemetry Schema Definition
Required normalized fields include:
event_id,event_type,tenant_id,operator_idattributes.schema_versionattributes.attestation_measurement_hashattributes.policy_decision_hashexecution_fingerprint
How To Extend Tool Wrappers (Metasploit, Sliver, Mythic)
- Add execution method in wrapper module.
- Normalize command output into SDK event schema.
- Attach tenant/operator metadata.
- Attach
attestation_measurement_hash. - Emit through telemetry ingestion pipeline.
How To Emit Signed Telemetry
- Configure
VECTORVUE_FEDERATION_SIGNING_KEY_PATH. - Configure mTLS cert/key and CA file.
- Use
VectorVueClient.send_federated_telemetry(...). - Ensure nonces/timestamps are unique and current.
How To Validate Feedback Signatures
- Configure
VECTORVUE_FEEDBACK_VERIFY_KEYS_JSON. - Validate
kid,signature_algorithm,signed_at,nonce,schema_version. - Verify Ed25519 signature on canonical response tuple.
- Reject replayed nonce or stale timestamp.
Test Strategy
- Unit tests for signing, verification, replay, schema validation.
- Integration tests for gateway acceptance/rejection paths.
- Host smoke tests for nmap/metasploit/sliver/firecracker workflows.
Key Rotation Strategy
- Maintain keyring map:
{kid: public_key_ref}on verifier side. - Rotate by adding new key and switching active
kidon signer side. - Keep old key for overlap window, then remove.
- Test old/new
kidhandling in CI before cutover.