Skip to content

Commit 55128c4

Browse files
authored
Refactor README.md for improved clarity and structure
Removed redundant lines and adjusted formatting for clarity. Signed-off-by: Igor <romanchaa997@gmail.com>
1 parent b331c2f commit 55128c4

1 file changed

Lines changed: 16 additions & 231 deletions

File tree

README.md

Lines changed: 16 additions & 231 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,5 @@
11
# Audityzer — AI-Powered Web3 Security Platform
22

3-
43
## 🛡️ AuditorSEC — Enterprise Web3 Security Auditing Platform
54

65
> **TRL4 PoC** | BRAVE1 Cybersecurity Track | Deadline: 30.04.2026
@@ -34,7 +33,6 @@ curl https://audityzer.onrender.com/health
3433

3534
---
3635

37-
3836
[![npm version](https://badge.fury.io/js/audityzer.svg)](https://www.npmjs.com/package/audityzer)
3937
[![License: MIT](https://img.shields.io/badge/License-MIT-yellow.svg)](https://opensource.org/licenses/MIT)
4038
[![Build Status](https://github.com/romanchaa997/Audityzer/actions/workflows/ci.yml/badge.svg)](https://github.com/romanchaa997/Audityzer/actions)
@@ -46,13 +44,15 @@ curl https://audityzer.onrender.com/health
4644
**The most advanced open-source Web3 security testing toolkit**
4745
Smart contract auditing · AI vulnerability detection · Post-Quantum Cryptography · Defense-grade compliance
4846

49-
[Live Demo](https://audityzer.com) · [HF Spaces](https://huggingface.co/spaces/Audityzer/audityzer-demo) · [BRAVE1 PoC](https://brave1.gov.ua) · [Documentation](https://audityzer.com/docs) · [bbbhhai.com](https://bbbhhai.com)
47+
[Live Demo](https://audityzer.com) · [HF Spaces](https://huggingface.co/spaces/Audityzer/audityzer-demo) · [BRAVE1 PoC](https://brave1.gov.ua) · [Documentation](https://audityzer.com/docs)
5048

5149
---
5250

5351
## What is Audityzer?
5452

55-
Audityzer is a **production-grade, AI-enhanced Web3 security testing platform** built for DeFi protocols, smart contract auditors, and defense-adjacent cybersecurity teams. Built under the AuditorSEC initiative, it combines:
53+
Audityzer is a **production-grade, AI-enhanced Web3 security testing platform** built for DeFi protocols, smart contract auditors, and defense-adjacent cybersecurity teams.
54+
55+
Built under the AuditorSEC initiative, it combines:
5656

5757
- **AI-powered vulnerability detection** with Playwright-based browser automation
5858
- **Post-Quantum Cryptography (PQC)** readiness — ML-KEM-768, ML-DSA-87, hybrid X25519+PQC
@@ -67,28 +67,30 @@ Audityzer is a **production-grade, AI-enhanced Web3 security testing platform**
6767

6868
```
6969
Audityzer Platform
70-
├── AI Security Engine # Playwright + OpenAI + custom SARIF scanner
71-
├── Smart Contract Scanner # Slither, Mythril, Echidna, Foundry fuzz
72-
├── PQC Module # ML-KEM-768, ML-DSA-87, hybrid TLS
73-
├── Multi-tenant API # FastAPI + PostgreSQL RLS + Cloudflare Hyperdrive
74-
├── NATS JetStream Bus # Real-time event streaming (3 topics)
75-
├── K8s Orchestration # DigitalOcean fra1, ArgoCD, Prometheus/Grafana
76-
├── Defense Branch # BRAVE1 SPRINT-BAK-COR-001, drone cybersecurity
77-
└── Compliance Layer # NIS2 Art.20/21/23, DORA, SOC/MDR
70+
├── AI Security Engine # Playwright + OpenAI + custom SARIF scanner
71+
├── Smart Contract Scanner # Slither, Mythril, Echidna, Foundry fuzz
72+
├── PQC Module # ML-KEM-768, ML-DSA-87, hybrid TLS
73+
├── Multi-tenant API # FastAPI + PostgreSQL RLS + Cloudflare Hyperdrive
74+
├── NATS JetStream Bus # Real-time event streaming (3 topics)
75+
├── K8s Orchestration # DigitalOcean fra1, ArgoCD, Prometheus/Grafana
76+
├── Defense Branch # BRAVE1 SPRINT-BAK-COR-001, drone cybersecurity
77+
└── Compliance Layer # NIS2 Art.20/21/23, DORA, SOC/MDR
7878
```
7979

8080
---
8181

8282
## Features
8383

8484
### Security Testing
85+
8586
- 20+ vulnerability detection algorithms (reentrancy, flash loans, access control, oracle manipulation, MEV)
8687
- Cross-chain support: Ethereum, Solana, Optimism L2, Arbitrum, BSC
8788
- AI-powered SARIF report generation with severity scoring
8889
- OWASP / NIST CSF / SCA / DAST / SAST pipelines
8990
- Web3 wallet integration: MetaMask, WalletConnect, Coinbase Wallet
9091

9192
### Infrastructure & DevSecOps
93+
9294
- Kubernetes (DigitalOcean neuralinfra-k8s, fra1) + ArgoCD GitOps
9395
- GitHub Actions CI/CD with CodeQL, Semgrep, dependency audit
9496
- Multi-tenant PostgreSQL with Row Level Security (RLS)
@@ -97,13 +99,15 @@ Audityzer Platform
9799
- Telegram bot ecosystem: `audityzerbot`, `AuditorSECAlertBot`, `audityzeralertsbot`
98100

99101
### Post-Quantum Cryptography (PQC)
102+
100103
- ML-KEM-768 (CRYSTALS-Kyber) key encapsulation
101104
- ML-DSA-87 (CRYSTALS-Dilithium) digital signatures
102105
- Hybrid X25519 + PQC for backwards-compatible TLS
103106
- NIS2-aligned crypto-agility policy engine
104107
- IoT edge PQC (ESP32/RPi) via BRAVE1 defense track
105108

106109
### Compliance & Governance
110+
107111
- NIS2 Directive (EU 2022/2555) — Art. 20 management, Art. 21 risk/crypto, Art. 23 incident reporting
108112
- DORA-aligned incident response workflows
109113
- ForestESG governance layer — ESG risk scoring, resource tracking
@@ -154,18 +158,6 @@ helm install nats nats/nats -n audityzer --set nats.jetstream.enabled=true
154158

155159
---
156160

157-
## Revenue Model (GTM 2026)
158-
159-
| Tier | Scope | Price |
160-
|------|-------|-------|
161-
| MVP Audit | Early-stage protocols | $2,000–$12,000 |
162-
| DeFi Audit | Production DeFi | $40,000–$150,000 |
163-
| Enterprise | Institutional Web3 | $120,000–$400,000 |
164-
165-
Target: **300,000 UAH/month Q2 2026** | ICP: Immunefi, BRAVE1, EU institutions, PeckShield/Spearbit-adjacent
166-
167-
---
168-
169161
## Contributing
170162

171163
We welcome contributions! See [CONTRIBUTING.md](./CONTRIBUTING.md) for guidelines.
@@ -183,204 +175,6 @@ Built in Ukraine with love and resilience. Bakhmach, Chernihiv Oblast — Audito
183175

184176
[![GitHub stars](https://img.shields.io/github/stars/romanchaa997/Audityzer?style=social)](https://github.com/romanchaa997/Audityzer/stargazers)
185177
[![GitHub forks](https://img.shields.io/github/forks/romanchaa997/Audityzer?style=social)](https://github.com/romanchaa997/Audityzer/network)
186-
[![GitHub watchers](https://img.shields.io/github/watchers/romanchaa997/Audityzer?style=social)](https://github.com/romanchaa997/Audityzer/watchers)
187-
188-
189-
---
190-
191-
## AuditorSEC — Advanced Threat Intelligence Modules
192-
193-
### Support & SSO Attack Surface
194-
195-
Detects identity-layer attacks inspired by real-world threat actors (Scattered Spider / The Com).
196-
197-
**Scope:**
198-
- SaaS SSO providers: Okta, Azure AD, Google Workspace, Duo
199-
- Help desk / support portal impersonation vectors
200-
- MFA bypass: SIM-swap, SS7, push-fatigue, voice phishing
201-
- Identity provider (IdP) federation misconfigurations
202-
203-
**Automated Checks:**
204-
- `sso:mfa-fatigue` — detects repeated push notification abuse patterns
205-
- `sso:helpdesk-impersonation` — maps support ticket flows for social engineering risk
206-
- `sso:sim-swap-exposure` — flags SMS-based 2FA as high-risk for telco-adjacent targets
207-
- `sso:idp-misconfiguration` — SAML/OIDC trust chain validation
208-
- `sso:vishing-surface` — enumerates publicly exposed org charts and employee directories
209-
210-
---
211-
212-
### Teenage Threat Actor Profile (TTAP) Model
213-
214-
Risk scoring model for organizations targeted by young, financially-motivated threat actors.
215-
216-
**Profile Indicators:**
217-
- Target sector: Telecom, SaaS, Crypto exchanges, Gaming platforms
218-
- Attack vectors: Social engineering, credential stuffing, insider recruitment
219-
- Motivation: Financial gain, peer status (The Com / Lapsus$ behavioral patterns)
220-
- Age cohort risk: 16-24 operators with high OPSEC variance
221-
222-
**TTAP Risk Scoring:**
223-
```
224-
TTAP Score = (SSO_Surface × 0.4) + (HelpDesk_Exposure × 0.3) + (Crypto_Assets × 0.3)
225-
```
226-
- Score 0-3: Low — standard controls sufficient
227-
- Score 4-6: Medium — MFA hardening + SOC monitoring recommended
228-
- Score 7-10: High — emergency IdP review + vishing simulation required
229-
230-
---
231-
232-
### Ransomware Alliance Risk (RaaS) Finding Type
233-
234-
New finding category for organizations exposed to RaaS affiliate networks.
235-
236-
**Finding Types:**
237-
- `RAAS-001`: Initial Access Broker (IAB) credential exposure
238-
- `RAAS-002`: RaaS affiliate recruitment surface (dark web job board exposure)
239-
- `RAAS-003`: Double-extortion data exfil pathway identified
240-
- `RAAS-004`: Backup/recovery infrastructure reachable from compromised segment
241-
- `RAAS-005`: Cyber insurance disclosure risk (ransom negotiation surface)
242-
243-
**SARIF Integration:**
244-
```json
245-
{
246-
"ruleId": "RAAS-001",
247-
"level": "error",
248-
"message": "Initial Access Broker credential exposure detected via combo-list match",
249-
"properties": {
250-
"threat-actor-profile": "RaaS-Affiliate",
251-
"ttap-score": 8,
252-
"recommended-action": "Immediate credential rotation + dark web monitoring activation"
253-
}
254-
}
255-
```
256-
257-
---
258-
259-
### Human Stories in Reports
260-
261-
AuditorSEC reports include real-world context sections that connect technical findings to human impact.
262-
263-
**Format per finding:**
264-
```
265-
## Human Story — [Finding ID]
266-
**What happened in the real world:**
267-
[Brief anonymized case study — e.g., MGM Resorts breach via 10-minute vishing call]
268-
269-
**Why this matters for your organization:**
270-
[Contextual paragraph connecting the finding to the client's sector]
271-
272-
**The people at risk:**
273-
[Who in the organization is targeted — helpdesk staff, executives, IT admins]
274-
```
275-
276-
**Example — SSO MFA Fatigue:**
277-
> In 2023, a major US casino operator lost control of their Okta tenant after attackers called the IT helpdesk posing as an employee. The attack took under 10 minutes and resulted in $100M+ in damages. AuditorSEC detected equivalent exposure in your support portal flow.
278-
279-
---
280-
281-
### Anti-Lapsus$ / Anti-TheCom Security Course
282-
283-
Part of the **AuditorSEC Academy** — free educational track for Ukrainian cybersecurity professionals.
284-
285-
**Module: Social Engineering & Identity Attacks**
286-
287-
| Lesson | Topic | Duration |
288-
|--------|-------|----------|
289-
| 1 | How The Com operates — recruitment, hierarchy, targets | 45 min |
290-
| 2 | SIM-swap mechanics and telecom vulnerabilities | 60 min |
291-
| 3 | Vishing simulation lab — defending the helpdesk | 90 min |
292-
| 4 | Okta / Azure AD hardening against TTAP-class attacks | 75 min |
293-
| 5 | Incident response for social engineering breaches | 60 min |
294-
| 6 | Legal & ethical framework — Ukraine Criminal Code Art. 361-363 | 45 min |
295-
296-
**Certification:** AuditorSEC Anti-Social-Engineering Specialist (ASES)
297-
298-
---
299-
300-
### Talent Pipeline: від школяра до white-hat через AuditorSEC
301-
302-
**Mission:** Convert curious Ukrainian teenagers into certified ethical hackers — not threat actors.
303-
304-
**3-Stage Pipeline:**
305-
306-
**Stage 1 — Школяр (Age 14-17):**
307-
- Free CTF platform with Web3 + OSINT challenges
308-
- Mentorship from AuditorSEC community
309-
- Monthly hackathons with BRAVE1 recognition
310-
311-
**Stage 2 — Стажер (Age 17-21):**
312-
- Paid bug bounty program on Audityzer platform
313-
- Supervised real-world audit participation
314-
- AuditorSEC Certified Junior Auditor (ACJA) credential
315-
316-
**Stage 3 — White-Hat (21+):**
317-
- Full employment pipeline to AuditorSEC partner firms
318-
- NIS2/DORA compliance specialization
319-
- BRAVE1 defense project contributions
320-
321-
> "The same curiosity that makes a teenager pick a lock should be channeled into picking apart smart contracts legally." — AuditorSEC Initiative
322-
323-
---
324-
325-
## 7-Day AuditorSEC Integration Roadmap
326-
327-
| Day | Task | Output |
328-
|-----|------|--------|
329-
| 1 | Document SSO Attack Surface module spec | `/docs/modules/sso-attack-surface.md` |
330-
| 2 | Implement TTAP risk scoring engine | `src/analyzers/ttap-scorer.ts` |
331-
| 3 | Add RaaS finding types to SARIF schema | `src/sarif/raas-findings.json` |
332-
| 4 | Build Human Stories template engine | `src/reports/human-stories.ts` |
333-
| 5 | Create Anti-TheCom course outline + first lesson | `academy/anti-thecom/lesson-01.md` |
334-
| 6 | Launch talent pipeline landing page | `docs/talent-pipeline.md` |
335-
| 7 | Integration test: full audit report with new modules | `tests/e2e/full-report-with-ttap.spec.ts` |
336-
337-
---
338-
339-
*AuditorSEC Initiative — Захищаємо Web3. Виховуємо наступне покоління. Built in Ukraine.*
340-
341-
342-
---
343-
344-
## Perplexity SoT + Views
345-
346-
> **ADR:** [ADR-0001-perplexity-sot.md](docs/adr/ADR-0001-perplexity-sot.md) | **Phase:** UHIP-2A | **Status:** Accepted
347-
348-
Audityzer / AuditorSEC uses **Perplexity `thread_id`** as the canonical, machine-readable Source of Truth for architecture decisions, grant applications, and operational runbooks.
349-
350-
### Identifier Model
351-
352-
| Ref Type | Purpose | Use in CI/Helm/Make |
353-
|---|---|---|
354-
| `thread_id` | Stable SoT identifier | **YES** |
355-
| `#N` anchor | UI scroll position only | NO |
356-
| Search URL | Human docs / README only | NO |
357-
358-
### Example (correct usage in configs)
359-
360-
```yaml
361-
# infra/perplexity-sot.yaml
362-
perplexity:
363-
sotThreadId: "tejeBGviQ22LHy04IEf6Gw" # UHIP-2A design thread
364-
entryMessageId: "1" # optional UI anchor
365-
```
366-
367-
### Key Threads (registry: [`infra/perplexity-sot.yaml`](infra/perplexity-sot.yaml))
368-
369-
| Key | thread_id | Label |
370-
|---|---|---|
371-
| `uhip-2a-design` | `tejeBGviQ22LHy04IEf6Gw` | UHIP-2A Phase design + SoT model |
372-
| `nl-ua-cybersec-fund` | `uSncsLPPSiGyQOOyl9doCQ` | NL-UA Cybersecurity Fund matchmaking |
373-
| `cloudflare-infra-design` | `613SjKAXTmS2SeB397pSRQ` | Cloudflare infra — AuditorSEC 4 scenarios |
374-
375-
### Audit Command
376-
377-
```bash
378-
# Should return 0 results in machine configs:
379-
grep -r "perplexity.ai/search" helm/ .github/ Makefile
380-
```
381-
382-
> Search URLs (`perplexity.ai/search/...`) are **read-only human-navigable views** and must never be hardcoded in CI, Helm values, or Makefiles — they drift on slug rotation and may leak sensitive data to logs.
383-
384178

385179
---
386180

@@ -424,12 +218,3 @@ See [`docs/SECRETS_SETUP.md`](docs/SECRETS_SETUP.md) for full setup guide.
424218
| `TELEGRAM_BOT_TOKEN` | Downtime alert notifications |
425219
| `TELEGRAM_CHAT_ID` | Target Telegram chat |
426220
| `UPTIMEROBOT_API_KEY` | UptimeRobot monitor management |
427-
428-
### Compliance Workflows
429-
430-
| Workflow | Schedule | Purpose |
431-
|----------|----------|----------|
432-
| `diia-compliance.yml` | Sundays 06:00 UTC | Diia.City compliance scan |
433-
| `origin-ca-monitor.yml` | Manual | SSL cert monitoring |
434-
| `add-audityzer-io-dns.yml` | Manual | DNS fix for audityzer.io |
435-
| `uptimerobot-telegram-clickup.yml` | Manual | Setup monitoring stack |

0 commit comments

Comments
 (0)