VectorVue Documentation

Integration, platform operations, architecture, and assurance references

VectorVue + SpectraStrike End User Guide

1) Installation (Linux/macOS)

  1. Install git, make, Docker Engine, and Docker Compose.
  2. Clone VectorVue and SpectraStrike into the same parent directory.
  3. Install Python dependencies in both projects.

2) Docker Requirements

3) How To Generate Certs

Use the certificate/key material under deploy/certs:

4) How To Start Both Platforms

  1. cd VectorVue
  2. make local-federation-up
  3. cd ../SpectraStrike
  4. make local-federation-up

5) How To Run First Execution (nmap example)

cd SpectraStrike
PYTHONPATH=src .venv/bin/python -m pkg.integration.host_integration_smoke \
  --tenant-id 10000000-0000-0000-0000-000000000001 \
  --check-vectorvue

6) How To Verify Federation Is Active

7) How To View Findings In VectorVue

  1. Open VectorVue UI.
  2. Authenticate as tenant user.
  3. Open findings and risk panels.
  4. Confirm latest ingestion artifacts.

8) How Feedback Loop Works

  1. VectorVue stores execution graph metadata.
  2. Feedback endpoint computes adjustments from trusted graph records.
  3. Response is Ed25519-signed with active feedback kid.
  4. SpectraStrike verifies signature and applies policy adjustments.

9) Troubleshooting

10) Security Explanation (Plain English)

VectorVue only accepts telemetry that proves source identity and payload integrity. It rejects anything with invalid signatures, stale/replayed nonces, wrong tenant mapping, or wrong schema version.