The Offensive Vaccine is the loop that gives Decepticon its name and its purpose: every offensive action becomes a defensive artifact. This page documents the five-stage pipeline and the Defender agent that closes the loop.Documentation Index
Fetch the complete documentation index at: https://docs.decepticon.red/llms.txt
Use this file to discover all available pages before exploring further.
The Loop
The Five Stages
Scanner — find the surface
Automated vulnerability scanning across the target. Output: candidate findings (CVE matches, configuration issues, exposed surfaces).
Detector — write the rule
Generate a detection signal for the candidate vulnerability — Sigma rule, YARA rule, IDS signature, or telemetry-derived heuristic. Defenders need to know what to look for before they can detect it.
Verifier — prove it's real
Two-method gate: confirm the vulnerability through at least two independent verification techniques. Eliminates false positives before exploit work begins.
Exploiter — produce the PoC
Generate a working proof-of-concept exploit that triggers the vulnerability reproducibly. The PoC is the unambiguous evidence.
The Vulnresearch Orchestrator
The five agents do not run as a fixed pipeline — they are orchestrated by a sixth agent, Vulnresearch, that decides the order based on findings. If the Scanner produces a high-confidence candidate, Vulnresearch may skip directly to Verifier. If the Verifier rejects a candidate, the loop terminates without burning Exploiter or Patcher resources.| Agent | Inputs | Outputs |
|---|---|---|
| Scanner | Target scope | Candidate findings list |
| Detector | Candidate finding | Detection rule (Sigma / YARA / heuristic) |
| Verifier | Candidate + detection rule | Verified-yes or verified-no, with two methods of evidence |
| Exploiter | Verified candidate | Reproducible PoC, with reliability notes |
| Patcher | Verified candidate + PoC | Patch (code or config), with regression test |
The Defender Agent
The Defender is not part of the five-stage pipeline — it is a parallel agent that consumes the artifacts. It produces the Defense Brief: the document handed to the blue team at engagement out-brief. The Defense Brief contains:- The technique used (MITRE ATT&CK ID)
- The detection rule produced by the Detector
- The PoC produced by the Exploiter
- The recommended patch from the Patcher
- The verification status (did the patch break the PoC?)
- The mapping to the blue team’s existing detection coverage (gaps)
Why Two-Method Verification Matters
A single verification method can be fooled — a network scan might match a banner without the vulnerable code being reachable; a PoC might succeed against a honeypot. The Verifier requires two independent methods, e.g.:- Static evidence (version banner) + dynamic evidence (PoC payload response)
- Network-side detection (IDS firing) + host-side detection (process artifact)
- Source-code analysis + runtime instrumentation
Knowledge Graph Integration
Every artifact produced by the pipeline lands in the Neo4j attack graph:- Findings become
Vulnerabilitynodes - Detection rules become
DefenseActionnodes withDETECTSedges - Patches become
DefenseActionnodes withMITIGATESedges - Verifications become provenance edges
Knowledge Graph
How findings, detections, and patches land in the Neo4j attack graph.
Skill System
Each pipeline stage has a dedicated skill set under
skills/scanner/, skills/detector/, etc.