NODE-CONSTANT//SRF-08 · WRAITHHARDEN
WICK / 04//45.5°N · 73.5°W
← SURFACES/SRF-08HARDEN
Intelligence & Infrastructure

Wraith

Adversarial proof analysis.

Wraith models bounded attack paths against defined systems and proves whether critical failure states are reachable under adversarial input conditions. Built for internal red teams, technical diligence, and pre-deployment validation. Know the attack path before the attacker does.

Defined
Targets
0
Guesses
SAT
If Reachable
§ SPECIFICATION
Input
  • System architecture diagram or API spec
  • Attacker capability model (network access, auth level)
  • Critical failure state definition
Constraints Verified
  • Bounded attacker capability model
  • Network topology constraints
  • Authentication and authorization boundaries
  • Rate limiting and detection bypass paths
Output
  • Reachability proof per attack path
  • Minimal attacker capability to trigger failure
  • Attack path witness trace
  • UNSAT certificate if target is unreachable
§ SAMPLE PROOF ARTIFACT
ARTIFACT // WRAITH-IAM-01FAILURE DETECTED
// SAMPLE PROOF — WRAITH ENGINE

Cloud IAM — privilege escalation via misconfigured trust

TargetAWS IAM policy configuration
Conditionassume_role chain: dev → staging → prod via sts:AssumeRole
VerdictSAT
SummaryFull privilege escalation proven in 3 hops. Cross-account trust chain exploitable.
StatusReview-ready
→ View full artifact repository
Run Wraith on your system.

Formal engagement starts with a technical intake. We scope, configure, and deliver a proof artifact within the agreed SLA.

Request Briefing →