11# Audityzer — AI-Powered Web3 Security Platform
22
3-
43## 🛡️ AuditorSEC — Enterprise Web3 Security Auditing Platform
54
65> ** TRL4 PoC** | BRAVE1 Cybersecurity Track | Deadline: 30.04.2026
@@ -34,7 +33,6 @@ curl https://audityzer.onrender.com/health
3433
3534---
3635
37-
3836[ ![ npm version] ( https://badge.fury.io/js/audityzer.svg )] ( https://www.npmjs.com/package/audityzer )
3937[ ![ License: MIT] ( https://img.shields.io/badge/License-MIT-yellow.svg )] ( https://opensource.org/licenses/MIT )
4038[ ![ Build Status] ( https://github.com/romanchaa997/Audityzer/actions/workflows/ci.yml/badge.svg )] ( https://github.com/romanchaa997/Audityzer/actions )
@@ -46,13 +44,15 @@ curl https://audityzer.onrender.com/health
4644** The most advanced open-source Web3 security testing toolkit**
4745Smart contract auditing · AI vulnerability detection · Post-Quantum Cryptography · Defense-grade compliance
4846
49- [ Live Demo] ( https://audityzer.com ) · [ HF Spaces] ( https://huggingface.co/spaces/Audityzer/audityzer-demo ) · [ BRAVE1 PoC] ( https://brave1.gov.ua ) · [ Documentation] ( https://audityzer.com/docs ) · [ bbbhhai.com ] ( https://bbbhhai.com )
47+ [ Live Demo] ( https://audityzer.com ) · [ HF Spaces] ( https://huggingface.co/spaces/Audityzer/audityzer-demo ) · [ BRAVE1 PoC] ( https://brave1.gov.ua ) · [ Documentation] ( https://audityzer.com/docs )
5048
5149---
5250
5351## What is Audityzer?
5452
55- Audityzer is a ** production-grade, AI-enhanced Web3 security testing platform** built for DeFi protocols, smart contract auditors, and defense-adjacent cybersecurity teams. Built under the AuditorSEC initiative, it combines:
53+ Audityzer is a ** production-grade, AI-enhanced Web3 security testing platform** built for DeFi protocols, smart contract auditors, and defense-adjacent cybersecurity teams.
54+
55+ Built under the AuditorSEC initiative, it combines:
5656
5757- ** AI-powered vulnerability detection** with Playwright-based browser automation
5858- ** Post-Quantum Cryptography (PQC)** readiness — ML-KEM-768, ML-DSA-87, hybrid X25519+PQC
@@ -67,28 +67,30 @@ Audityzer is a **production-grade, AI-enhanced Web3 security testing platform**
6767
6868```
6969Audityzer Platform
70- ├── AI Security Engine # Playwright + OpenAI + custom SARIF scanner
71- ├── Smart Contract Scanner # Slither, Mythril, Echidna, Foundry fuzz
72- ├── PQC Module # ML-KEM-768, ML-DSA-87, hybrid TLS
73- ├── Multi-tenant API # FastAPI + PostgreSQL RLS + Cloudflare Hyperdrive
74- ├── NATS JetStream Bus # Real-time event streaming (3 topics)
75- ├── K8s Orchestration # DigitalOcean fra1, ArgoCD, Prometheus/Grafana
76- ├── Defense Branch # BRAVE1 SPRINT-BAK-COR-001, drone cybersecurity
77- └── Compliance Layer # NIS2 Art.20/21/23, DORA, SOC/MDR
70+ ├── AI Security Engine # Playwright + OpenAI + custom SARIF scanner
71+ ├── Smart Contract Scanner # Slither, Mythril, Echidna, Foundry fuzz
72+ ├── PQC Module # ML-KEM-768, ML-DSA-87, hybrid TLS
73+ ├── Multi-tenant API # FastAPI + PostgreSQL RLS + Cloudflare Hyperdrive
74+ ├── NATS JetStream Bus # Real-time event streaming (3 topics)
75+ ├── K8s Orchestration # DigitalOcean fra1, ArgoCD, Prometheus/Grafana
76+ ├── Defense Branch # BRAVE1 SPRINT-BAK-COR-001, drone cybersecurity
77+ └── Compliance Layer # NIS2 Art.20/21/23, DORA, SOC/MDR
7878```
7979
8080---
8181
8282## Features
8383
8484### Security Testing
85+
8586- 20+ vulnerability detection algorithms (reentrancy, flash loans, access control, oracle manipulation, MEV)
8687- Cross-chain support: Ethereum, Solana, Optimism L2, Arbitrum, BSC
8788- AI-powered SARIF report generation with severity scoring
8889- OWASP / NIST CSF / SCA / DAST / SAST pipelines
8990- Web3 wallet integration: MetaMask, WalletConnect, Coinbase Wallet
9091
9192### Infrastructure & DevSecOps
93+
9294- Kubernetes (DigitalOcean neuralinfra-k8s, fra1) + ArgoCD GitOps
9395- GitHub Actions CI/CD with CodeQL, Semgrep, dependency audit
9496- Multi-tenant PostgreSQL with Row Level Security (RLS)
@@ -97,13 +99,15 @@ Audityzer Platform
9799- Telegram bot ecosystem: ` audityzerbot ` , ` AuditorSECAlertBot ` , ` audityzeralertsbot `
98100
99101### Post-Quantum Cryptography (PQC)
102+
100103- ML-KEM-768 (CRYSTALS-Kyber) key encapsulation
101104- ML-DSA-87 (CRYSTALS-Dilithium) digital signatures
102105- Hybrid X25519 + PQC for backwards-compatible TLS
103106- NIS2-aligned crypto-agility policy engine
104107- IoT edge PQC (ESP32/RPi) via BRAVE1 defense track
105108
106109### Compliance & Governance
110+
107111- NIS2 Directive (EU 2022/2555) — Art. 20 management, Art. 21 risk/crypto, Art. 23 incident reporting
108112- DORA-aligned incident response workflows
109113- ForestESG governance layer — ESG risk scoring, resource tracking
@@ -154,18 +158,6 @@ helm install nats nats/nats -n audityzer --set nats.jetstream.enabled=true
154158
155159---
156160
157- ## Revenue Model (GTM 2026)
158-
159- | Tier | Scope | Price |
160- | ------| -------| -------|
161- | MVP Audit | Early-stage protocols | $2,000–$12,000 |
162- | DeFi Audit | Production DeFi | $40,000–$150,000 |
163- | Enterprise | Institutional Web3 | $120,000–$400,000 |
164-
165- Target: ** 300,000 UAH/month Q2 2026** | ICP: Immunefi, BRAVE1, EU institutions, PeckShield/Spearbit-adjacent
166-
167- ---
168-
169161## Contributing
170162
171163We welcome contributions! See [ CONTRIBUTING.md] ( ./CONTRIBUTING.md ) for guidelines.
@@ -183,204 +175,6 @@ Built in Ukraine with love and resilience. Bakhmach, Chernihiv Oblast — Audito
183175
184176[ ![ GitHub stars] ( https://img.shields.io/github/stars/romanchaa997/Audityzer?style=social )] ( https://github.com/romanchaa997/Audityzer/stargazers )
185177[ ![ GitHub forks] ( https://img.shields.io/github/forks/romanchaa997/Audityzer?style=social )] ( https://github.com/romanchaa997/Audityzer/network )
186- [ ![ GitHub watchers] ( https://img.shields.io/github/watchers/romanchaa997/Audityzer?style=social )] ( https://github.com/romanchaa997/Audityzer/watchers )
187-
188-
189- ---
190-
191- ## AuditorSEC — Advanced Threat Intelligence Modules
192-
193- ### Support & SSO Attack Surface
194-
195- Detects identity-layer attacks inspired by real-world threat actors (Scattered Spider / The Com).
196-
197- ** Scope:**
198- - SaaS SSO providers: Okta, Azure AD, Google Workspace, Duo
199- - Help desk / support portal impersonation vectors
200- - MFA bypass: SIM-swap, SS7, push-fatigue, voice phishing
201- - Identity provider (IdP) federation misconfigurations
202-
203- ** Automated Checks:**
204- - ` sso:mfa-fatigue ` — detects repeated push notification abuse patterns
205- - ` sso:helpdesk-impersonation ` — maps support ticket flows for social engineering risk
206- - ` sso:sim-swap-exposure ` — flags SMS-based 2FA as high-risk for telco-adjacent targets
207- - ` sso:idp-misconfiguration ` — SAML/OIDC trust chain validation
208- - ` sso:vishing-surface ` — enumerates publicly exposed org charts and employee directories
209-
210- ---
211-
212- ### Teenage Threat Actor Profile (TTAP) Model
213-
214- Risk scoring model for organizations targeted by young, financially-motivated threat actors.
215-
216- ** Profile Indicators:**
217- - Target sector: Telecom, SaaS, Crypto exchanges, Gaming platforms
218- - Attack vectors: Social engineering, credential stuffing, insider recruitment
219- - Motivation: Financial gain, peer status (The Com / Lapsus$ behavioral patterns)
220- - Age cohort risk: 16-24 operators with high OPSEC variance
221-
222- ** TTAP Risk Scoring:**
223- ```
224- TTAP Score = (SSO_Surface × 0.4) + (HelpDesk_Exposure × 0.3) + (Crypto_Assets × 0.3)
225- ```
226- - Score 0-3: Low — standard controls sufficient
227- - Score 4-6: Medium — MFA hardening + SOC monitoring recommended
228- - Score 7-10: High — emergency IdP review + vishing simulation required
229-
230- ---
231-
232- ### Ransomware Alliance Risk (RaaS) Finding Type
233-
234- New finding category for organizations exposed to RaaS affiliate networks.
235-
236- ** Finding Types:**
237- - ` RAAS-001 ` : Initial Access Broker (IAB) credential exposure
238- - ` RAAS-002 ` : RaaS affiliate recruitment surface (dark web job board exposure)
239- - ` RAAS-003 ` : Double-extortion data exfil pathway identified
240- - ` RAAS-004 ` : Backup/recovery infrastructure reachable from compromised segment
241- - ` RAAS-005 ` : Cyber insurance disclosure risk (ransom negotiation surface)
242-
243- ** SARIF Integration:**
244- ``` json
245- {
246- "ruleId" : " RAAS-001" ,
247- "level" : " error" ,
248- "message" : " Initial Access Broker credential exposure detected via combo-list match" ,
249- "properties" : {
250- "threat-actor-profile" : " RaaS-Affiliate" ,
251- "ttap-score" : 8 ,
252- "recommended-action" : " Immediate credential rotation + dark web monitoring activation"
253- }
254- }
255- ```
256-
257- ---
258-
259- ### Human Stories in Reports
260-
261- AuditorSEC reports include real-world context sections that connect technical findings to human impact.
262-
263- ** Format per finding:**
264- ```
265- ## Human Story — [Finding ID]
266- **What happened in the real world:**
267- [Brief anonymized case study — e.g., MGM Resorts breach via 10-minute vishing call]
268-
269- **Why this matters for your organization:**
270- [Contextual paragraph connecting the finding to the client's sector]
271-
272- **The people at risk:**
273- [Who in the organization is targeted — helpdesk staff, executives, IT admins]
274- ```
275-
276- ** Example — SSO MFA Fatigue:**
277- > In 2023, a major US casino operator lost control of their Okta tenant after attackers called the IT helpdesk posing as an employee. The attack took under 10 minutes and resulted in $100M+ in damages. AuditorSEC detected equivalent exposure in your support portal flow.
278-
279- ---
280-
281- ### Anti-Lapsus$ / Anti-TheCom Security Course
282-
283- Part of the ** AuditorSEC Academy** — free educational track for Ukrainian cybersecurity professionals.
284-
285- ** Module: Social Engineering & Identity Attacks**
286-
287- | Lesson | Topic | Duration |
288- | --------| -------| ----------|
289- | 1 | How The Com operates — recruitment, hierarchy, targets | 45 min |
290- | 2 | SIM-swap mechanics and telecom vulnerabilities | 60 min |
291- | 3 | Vishing simulation lab — defending the helpdesk | 90 min |
292- | 4 | Okta / Azure AD hardening against TTAP-class attacks | 75 min |
293- | 5 | Incident response for social engineering breaches | 60 min |
294- | 6 | Legal & ethical framework — Ukraine Criminal Code Art. 361-363 | 45 min |
295-
296- ** Certification:** AuditorSEC Anti-Social-Engineering Specialist (ASES)
297-
298- ---
299-
300- ### Talent Pipeline: від школяра до white-hat через AuditorSEC
301-
302- ** Mission:** Convert curious Ukrainian teenagers into certified ethical hackers — not threat actors.
303-
304- ** 3-Stage Pipeline:**
305-
306- ** Stage 1 — Школяр (Age 14-17):**
307- - Free CTF platform with Web3 + OSINT challenges
308- - Mentorship from AuditorSEC community
309- - Monthly hackathons with BRAVE1 recognition
310-
311- ** Stage 2 — Стажер (Age 17-21):**
312- - Paid bug bounty program on Audityzer platform
313- - Supervised real-world audit participation
314- - AuditorSEC Certified Junior Auditor (ACJA) credential
315-
316- ** Stage 3 — White-Hat (21+):**
317- - Full employment pipeline to AuditorSEC partner firms
318- - NIS2/DORA compliance specialization
319- - BRAVE1 defense project contributions
320-
321- > "The same curiosity that makes a teenager pick a lock should be channeled into picking apart smart contracts legally." — AuditorSEC Initiative
322-
323- ---
324-
325- ## 7-Day AuditorSEC Integration Roadmap
326-
327- | Day | Task | Output |
328- | -----| ------| --------|
329- | 1 | Document SSO Attack Surface module spec | ` /docs/modules/sso-attack-surface.md ` |
330- | 2 | Implement TTAP risk scoring engine | ` src/analyzers/ttap-scorer.ts ` |
331- | 3 | Add RaaS finding types to SARIF schema | ` src/sarif/raas-findings.json ` |
332- | 4 | Build Human Stories template engine | ` src/reports/human-stories.ts ` |
333- | 5 | Create Anti-TheCom course outline + first lesson | ` academy/anti-thecom/lesson-01.md ` |
334- | 6 | Launch talent pipeline landing page | ` docs/talent-pipeline.md ` |
335- | 7 | Integration test: full audit report with new modules | ` tests/e2e/full-report-with-ttap.spec.ts ` |
336-
337- ---
338-
339- * AuditorSEC Initiative — Захищаємо Web3. Виховуємо наступне покоління. Built in Ukraine.*
340-
341-
342- ---
343-
344- ## Perplexity SoT + Views
345-
346- > ** ADR:** [ ADR-0001-perplexity-sot.md] ( docs/adr/ADR-0001-perplexity-sot.md ) | ** Phase:** UHIP-2A | ** Status:** Accepted
347-
348- Audityzer / AuditorSEC uses ** Perplexity ` thread_id ` ** as the canonical, machine-readable Source of Truth for architecture decisions, grant applications, and operational runbooks.
349-
350- ### Identifier Model
351-
352- | Ref Type | Purpose | Use in CI/Helm/Make |
353- | ---| ---| ---|
354- | ` thread_id ` | Stable SoT identifier | ** YES** |
355- | ` #N ` anchor | UI scroll position only | NO |
356- | Search URL | Human docs / README only | NO |
357-
358- ### Example (correct usage in configs)
359-
360- ``` yaml
361- # infra/perplexity-sot.yaml
362- perplexity :
363- sotThreadId : " tejeBGviQ22LHy04IEf6Gw" # UHIP-2A design thread
364- entryMessageId : " 1" # optional UI anchor
365- ` ` `
366-
367- ### Key Threads (registry: [` infra/perplexity-sot.yaml`](infra/perplexity-sot.yaml))
368-
369- | Key | thread_id | Label |
370- |---|---|---|
371- | `uhip-2a-design` | `tejeBGviQ22LHy04IEf6Gw` | UHIP-2A Phase design + SoT model |
372- | `nl-ua-cybersec-fund` | `uSncsLPPSiGyQOOyl9doCQ` | NL-UA Cybersecurity Fund matchmaking |
373- | `cloudflare-infra-design` | `613SjKAXTmS2SeB397pSRQ` | Cloudflare infra — AuditorSEC 4 scenarios |
374-
375- # ## Audit Command
376-
377- ` ` ` bash
378- # Should return 0 results in machine configs:
379- grep -r "perplexity.ai/search" helm/ .github/ Makefile
380- ` ` `
381-
382- > Search URLs (`perplexity.ai/search/...`) are **read-only human-navigable views** and must never be hardcoded in CI, Helm values, or Makefiles — they drift on slug rotation and may leak sensitive data to logs.
383-
384178
385179---
386180
@@ -424,12 +218,3 @@ See [`docs/SECRETS_SETUP.md`](docs/SECRETS_SETUP.md) for full setup guide.
424218| ` TELEGRAM_BOT_TOKEN ` | Downtime alert notifications |
425219| ` TELEGRAM_CHAT_ID ` | Target Telegram chat |
426220| ` UPTIMEROBOT_API_KEY ` | UptimeRobot monitor management |
427-
428- # ## Compliance Workflows
429-
430- | Workflow | Schedule | Purpose |
431- |----------|----------|----------|
432- | `diia-compliance.yml` | Sundays 06:00 UTC | Diia.City compliance scan |
433- | `origin-ca-monitor.yml` | Manual | SSL cert monitoring |
434- | `add-audityzer-io-dns.yml` | Manual | DNS fix for audityzer.io |
435- | `uptimerobot-telegram-clickup.yml` | Manual | Setup monitoring stack |
0 commit comments