VectorVue Documentation

Continuous Security Validation Infrastructure

VectorVue

Docs | VectorVue | Nexus | Nyxera Labs

VectorVue + SpectraStrike End User Guide

1) Installation (Linux/macOS)

  1. Install git, make, Docker Engine, and Docker Compose.
  2. Clone VectorVue and SpectraStrike into the same parent directory.
  3. Install Python dependencies in both projects.

2) Docker Requirements

3) How To Generate Certs

Use the certificate/key material under deploy/certs:

4) How To Start Both Platforms

  1. cd VectorVue
  2. make local-federation-up
  3. cd ../SpectraStrike
  4. make local-federation-up

5) How To Run First Execution (nmap example)

cd SpectraStrike
PYTHONPATH=src .venv/bin/python -m pkg.integration.host_integration_smoke \
  --tenant-id 10000000-0000-0000-0000-000000000001 \
  --check-vectorvue

6) How To Verify Federation Is Active

7) How To View Findings In VectorVue

  1. Open VectorVue UI.
  2. Authenticate as tenant user.
  3. Open findings and risk panels.
  4. Confirm latest ingestion artifacts.

8) How Feedback Loop Works

  1. VectorVue stores execution graph metadata.
  2. Feedback endpoint computes adjustments from trusted graph records.
  3. Response is Ed25519-signed with active feedback kid.
  4. SpectraStrike verifies signature and applies policy adjustments.

9) Troubleshooting

10) Security Explanation (Plain English)

VectorVue only accepts telemetry that proves source identity and payload integrity. It rejects anything with invalid signatures, stale/replayed nonces, wrong tenant mapping, or wrong schema version.


Nyxera Labs

2026 VectorVue by Nyxera Labs. All rights reserved.

Docs | VectorVue | Nexus | Nyxera Labs