Threat-intel ETL

Review Rekt 2026 ingestion, Solodit findings, and artifact job history.

Open page

0G module checks

Track Galileo connectivity, inference readiness, and storage follow-through.

Open page

Runtime settings

Inspect storage, vector, Safe-session, and deployment-level configuration.

Open page

Implementation roadmap

Track which pitch features are already live and which small UI/data upgrades land next.

Open page
0G + Vercel control plane
Generated May 8, 11:26 AM
Vector DB online

Mission control for wallet-native red teaming, live threat intel, and 0G-aligned agent operations.

This web app is wired to the same protocol inventories, simulation runs, wallet session model, and replay-feedback surfaces that power the CLI. It separates dashboard, ETL, module validation, roadmap, and settings workflows while keeping the deployment path Vercel-native: Functions, Blob, JSONL, and pgvector.

Wallet-first CLI onboarding

Browser wallet, Ledger, and Privy-backed flows can bind an operator identity before the web app takes over as mission control.

Mission-control run telemetry

Dashboards aggregate current inventory, real simulation manifests, and the derived run/operator metadata needed for live demos.

Blob + JSONL ETL artifacts

ETL jobs emit append-friendly datasets that can seed the next red-team prompt from current exploit intelligence.

Per-user vector memory

Each wallet-linked user gets isolated namespaces for protocol notes, RLHF feedback, replay memory, and future fine-tuning inputs.

Current identity context

0x0fcD0338a468cE855D7da7ea1fE945CC5457fDd2

Signer 0x0fcD0338a468cE855D7da7ea1fE945CC5457fDd2 authenticated via browser.

Verified ownerYes
RPC targethttps://evmrpc-testnet.0g.ai
Vector dimension1536
Blob storageConfigured

Simulation runs

0

Episodes

0

Agent instances

0

Red-teamed protocols

0

Protocol inventories

0

Vector documents

0

Mission control

Operator-facing lifecycle status for the latest simulation, training-ready workflow, and active agent role mix.

Awaiting the first workflow run
Ready for wallet sync and scenario launch
0G-compatible execution path
Use the CLI workflow to seed the first run, then the dashboard becomes the operator view for lifecycle, ETL context, and 0G execution posture.
Latest run
Waiting for first workflow execution
Launch from the CLI to populate mission control.
Episode budget
0
0 steps per episode · 0 protocols
Active roles
No role activity yet
Run the CLI workflow to turn this into a live operator feed.

Operator next actions

Short-term steps that make the pitch features real inside the current app, without changing the framework dramatically.

Review the latest exploit patterns
Trigger the ETL refresh route so the operator starts from current exploit data before defining the next simulation.
attention
Open etl
Confirm inference and storage posture
Verify that authenticated compute, memory persistence, and fine-tuning prerequisites are visible on the modules/settings surfaces before promising a live 0G-backed run.
ready
Open modules
Promote training metadata into mission control
No simulation run is materialized yet, so the first workflow execution should seed the dashboard history before deeper training views are added.
planned
Open dashboard
Decide whether artifact persistence needs production storage
Blob persistence is already configured, so the next step is exposing richer cost/payment traces alongside the stored artifacts.
planned
Open settings

Prompt templates

Demo-ready adversarial scenarios you can use immediately while a richer CLI prompt selector is added.

Oracle desynchronization drill
Open dashboard

Pressure the protocol with delayed price updates, manipulated feeds, and time-sensitive liquidation windows while the defense side preserves user funds.

attacker
defender
judge
Governance capture attempt
Open dashboard

Simulate voter coordination, treasury pressure, and emergency controls so the ciso/cto role can prove whether governance can be contained.

attacker
ciso
judge
Bridge compromise stress test
Open etl

Model cross-chain delay, compromised relayers, and liquidity fragmentation to test both exploit detection and operator coordination.

attacker
defender
ciso
judge
Operator confusion response test
Open modules

Stress the response organization with incomplete signals, noisy alerts, and social-engineering-style uncertainty so the operator layer must escalate cleanly.

attacker
ciso
defender
judge

On-chain activity and role economics

Prepared surface for agent settlement, cost visibility, and payment references using the same wallet identity already synced from the CLI.

Wallet context
ready-for-surface
0x0fcD0338a468cE855D7da7ea1fE945CC5457fDd2
The app now carries wallet context through the operator dashboard so payment visibility can land in the same mission-control loop as simulation status.
Roadmap surface for tx hash, inference batch cost, and settlement status.
attacker
Actions 0 · Memory writes 0
Reward 0.00
ciso
Actions 0 · Memory writes 0
Reward 0.00
defender
Actions 0 · Memory writes 0
Reward 0.00
judge
Actions 0 · Memory writes 0
Reward 0.00

Latest inference result

Concrete agent outputs from the most recent simulation run, including provider, confidence, attestation surface, and action rationale.

No concrete inference result has been published yet. Run the workflow with real 0G inference and publish the result to populate this panel.

Operational tempo

Simulation throughput and agent provisioning based on persisted run manifests.

Agent role mix

Action and memory distribution across attacker, CISO, defender, and judge roles.

Role reward + memory quality

Aggregated reward and memory-write intensity derived from epoch logs.

Threat-intel ETL pipeline

Vercel Functions materialize local telemetry plus Rekt News, Solodit, and 0G module-check datasets as append-friendly JSONL artifacts.

Use the freshest ETL findings to seed the next red-team prompt, then launch the scenario from the CLI workflow so the dashboard can monitor the result.
Storage backend
Vercel Blob
Function shapeRoute Handlers + cron
JSONL datasets7 materialized views
Vector providerneon-pgvector
Cron entrypoint
GET /api/etl/run?source=cron

The cron job materializes protocol, simulation, epoch, agent-instance, Rekt incident, Solodit finding, and module-check datasets through the shared artifact store.

Recent ETL jobs

Each job records source, status, input/output counts, and emitted dataset paths.

No ETL job has been executed yet. Trigger `/api/etl/run` or wait for the Vercel cron.

Implementation roadmap inside the app

These are the remaining pitch features, mapped directly to the existing surfaces so you can ship them without a major redesign.

Wallet-first CLI onboarding is live
Operators can authenticate from the CLI, sync the session to the web app, and keep the control plane tied to the same wallet identity.
live now
Lands in dashboard · Depends on CLI wallet login + session sync API
Threat-intel ETL is already part of the loop
The ETL page shows Rekt and Solodit-derived context so fresh findings can seed the next red-team prompt without leaving the app.
live now
Lands in etl · Depends on ETL route handlers + JSONL/Blob datasets
0G execution posture is visible today
The modules and settings surfaces already expose inference readiness, authenticated compute, storage, and fine-tuning prerequisites.
live now
Lands in modules · Depends on 0G SDK readiness helper + deployment env checks
Promote run metadata into training-round visibility
Expose round number, variant id, lifecycle state, and active role set directly in the dashboard run table and mission-control panels.
next up
Lands in dashboard · Depends on Enrich simulation manifest or derived run metadata
Make adversarial prompt templates first-class
Turn common red-team strategies into reusable templates so a user can move from ETL finding to scenario launch in one workflow.
next up
Lands in roadmap · Depends on CLI scenario argument or template selector
Open full roadmap

CLI onboarding and scenario launch

This mirrors the wallet-first auth and workflow command surface already implemented in the CLI.

1. Authenticate in the terminal
aegis login wallet

If auth mode is omitted, the CLI can prompt the operator to choose between browser wallet, Ledger, or Privy-backed login.

2. Pick the signer mode
Browser wallet
Ledger / USB hardware wallet
Privy app-linked login

The backend stores a published CLI session so this dashboard can attach a wallet-controlled identity to ETL jobs, vector namespaces, operator surfaces, and RLHF feedback.

3. Publish the CLI session to the web backend
aegis login sync-web --base-url http://localhost:3000

That handshake keeps the dashboard and vector namespace keyed to the same Safe + signer tuple used by the simulator.

4. Launch an end-to-end scenario
aegis workflow run --base-url http://localhost:3000 --inference og-mock --episodes 1 --steps 8 --slug rhea-finance

This one command binds onboarding, session sync, ETL refresh, and the simulation launch into one demo-ready operator workflow.

Per-user vector database workbench

Real API-backed vector inserts/searches for protocol notes, run memory, and RLHF-style reward feedback.

Provider: neon-pgvector
Embedding model: deterministic-hash-v1
Dimension: 1536

Protocol coverage

Each row is bound to the inventory schema and enriched with replay metrics from actual run history.

ProtocolContractsSimulatedExploit successReplay fidelityLatest run

Historical simulation runs

Mission-control run history assembled from each manifest and its companion epoch logs, ready for richer training and payment metadata.

RunLifecycleScenarioNetworkProtocolsEpisode budgetAgent instancesExploit successReplay fidelityCompleted

Why the app is structured this way

The control plane keeps telemetry on the dashboard, exploit context on ETL, 0G runtime posture on Modules, implementation sequencing on Roadmap, and deployment trust signals on Settings.