VectorVue + SpectraStrike End User Guide
1) Installation (Linux/macOS)
- Install
git,make, Docker Engine, and Docker Compose. - Clone
VectorVueandSpectraStrikeinto the same parent directory. - Install Python dependencies in both projects.
2) Docker Requirements
- Docker Engine 24+
- Docker Compose v2+
- 8 GB RAM minimum
3) How To Generate Certs
Use the certificate/key material under deploy/certs:
- mTLS:
ca.crt,server.crt,server.key,client.crt,client.key - Ed25519:
spectrastrike_ed25519.key,vectorvue_feedback_ed25519.key
4) How To Start Both Platforms
cd VectorVuemake local-federation-upcd ../SpectraStrikemake local-federation-up
5) How To Run First Execution (nmap example)
cd SpectraStrike
PYTHONPATH=src .venv/bin/python -m pkg.integration.host_integration_smoke \
--tenant-id 10000000-0000-0000-0000-000000000001 \
--check-vectorvue
6) How To Verify Federation Is Active
- Gateway accepts only mTLS + Ed25519 signed requests.
- Smoke output should show
vectorvue_event_status=accepted. - Audit logs should include accepted cognitive graph/feedback events.
7) How To View Findings In VectorVue
- Open VectorVue UI.
- Authenticate as tenant user.
- Open findings and risk panels.
- Confirm latest ingestion artifacts.
8) How Feedback Loop Works
- VectorVue stores execution graph metadata.
- Feedback endpoint computes adjustments from trusted graph records.
- Response is Ed25519-signed with active feedback
kid. - SpectraStrike verifies signature and applies policy adjustments.
9) Troubleshooting
Unknown service identity: checkVV_TG_ALLOWED_SERVICE_IDENTITIES_JSON.Invalid telemetry signature: check trusted SpectraStrike public key.Operator tenant mapping violation: fixVV_TG_OPERATOR_TENANT_MAP.Execution graph schema not allowed: sendexecution.graph.v1.Replay detected: regenerate nonce.
10) Security Explanation (Plain English)
VectorVue only accepts telemetry that proves source identity and payload integrity. It rejects anything with invalid signatures, stale/replayed nonces, wrong tenant mapping, or wrong schema version.