SkillAgentSearch skills...

Apate

An adaptive, LLM-driven honeypot

Install / Use

/learn @Rizzy1857/Apate
About this skill

Quality Score

0/100

Supported Platforms

Universal

README

Mirage (Chronos Framework)

Repository codename: Apate

Product / idea name: Mirage

Core framework name: Chronos

Cognitive Deception Infrastructure
From Theoretical Specification to Deployable Asset

Project Lifecycle

  • Phase 1 (6 months): Core deception platform engineering and validation — Completed.
  • Phase 2 (6 months): AI integration hardening — ensuring AI improves realism and analysis without adding unnecessary complexity.

Chronos is a high-fidelity honeypot framework designed to reduce state contradiction and consistency issues seen in both traditional rule-based and LLM-assisted honeypots. It implements a state-consistent FUSE Filesystem backed by a Redis State Hypervisor, enabling realistic attacker interaction while Chronos tracks and analyzes each action.

The Problem This Solves

Traditional honeypots suffer from limited interaction - file operations aren't atomic, so attackers detect inconsistencies:

Attacker: touch /tmp/pwn && ls /tmp
Honeypot: (file not in listing) → DETECTED AS FAKE

LLM-based honeypots maintain conversation context but hallucinate state:

Command: cd /home/attacker → LLM remembers
[50 commands later]
Command: pwd → LLM forgets (context window exceeded) → HALLUCINATION

Chronos provides true atomic state management backed by Redis:

Command: cd /home/attacker → Stored in Redis
[50 commands later]
Command: pwd → Reads from Redis → Consistent with persisted state

For deep analysis, see Problem Analysis.

🚀 Key Features

  • State Consistency: A "State Hypervisor" keeps filesystem operations atomic and persistent. If an attacker creates a file, subsequent operations resolve against persisted state.
  • FUSE Interface: Intercepts system calls at the kernel-user boundary. Supports standard tools (ls, cat, rm, vi, gcc) without modification.
  • Cognitive Intelligence: Integrated Persona Engine generates content for files on-demand using LLMs (OpenAI/Anthropic), enabling high apparent depth while preserving state control.
  • Multi-Protocol Gateway: SSH and HTTP honeypot servers that capture credentials and exploitation attempts.
  • Real-Time Analysis: Command analyzer detects attack techniques using MITRE ATT&CK framework patterns.
  • Threat Intelligence: Built-in library of known attack signatures and threat patterns.
  • Skill Profiling: Automatically classifies attacker skill level from script kiddie to expert APT.
  • Audit Streaming: Real-time event processing and pattern detection across attack sessions.
  • Layer 0 Routing: High-performance Rust-based traffic analysis for initial threat tagging.
  • Forensic Logging: Complete audit trail in PostgreSQL for incident response and threat hunting.

🏗️ Architecture

Chronos implements a layered architecture:

  1. Gateway Layer (Entry Points):

    • SSH Honeypot: Accepts any credentials, provides interactive shell on port 2222
    • HTTP Honeypot: Simulates vulnerable web apps, captures exploits on port 8080
    • All entry points log to the audit system for analysis
  2. Core Layer (State & Logic):

    • State Hypervisor: Ensures filesystem consistency via Redis atomic operations
    • FUSE Interface: Intercepts kernel VFS calls, translates to database operations
    • Hot State: Redis 7.0 for sub-millisecond metadata access
    • Cold Storage: PostgreSQL 15 for forensic audit logs
  3. Intelligence Layer (Cognitive):

    • Persona Engine: Injects realistic personality into generated content
    • LLM Integration: OpenAI/Anthropic/Mock providers for lazy content generation
    • Generates files on first access and persists outputs through state storage for consistent reuse
  4. Analysis Layer (Skills & Watcher):

    • Command Analyzer: Detects 50+ attack techniques (MITRE ATT&CK)
    • Threat Library: Database of known attack signatures and IOCs
    • Skill Detector: Profiles attacker from script kiddie → expert APT
    • Event Processor: Real-time pattern detection and correlation
    • Audit Streamer: Pub-sub event streaming for external SIEM integration
  5. Layer 0 (Rust Performance):

    • High-speed protocol classification and noise filtering
    • Circuit breakers and adaptive degradation under load
    • Direct integration with Python via PyO3

⚡ Quick Start

Prerequisites

  • Docker & Docker Compose
  • (Optional) OpenAI/Anthropic API Key for intelligence features

Run the Stack

  1. Clone & Build:

    git clone https://github.com/Rizzy1857/Apate.git chronos
    cd chronos
    docker compose up --build -d
    
  2. Verify Status:

    docker compose logs -f core-engine
    
  3. Interact (Simulate Attack): Enter the container to experience the FUSE filesystem:

    docker exec -it chronos_core /bin/bash
    cd /mnt/honeypot
    

🧪 Verification & Testing

Phase 1 Status: Completed ✅

What's Built:

  • ✅ Core architecture implemented across the planned Phase 1 components
  • ✅ Redis-backed state management with atomic operations
  • ✅ FUSE filesystem with full POSIX support
  • ✅ SSH and HTTP honeypot gateways
  • ✅ Threat detection and attacker profiling
  • ✅ Audit logging and event streaming

Phase 2 Focus (In Progress):

  • AI integration for controlled, explainable assistance
  • Preserving deterministic state handling in Chronos
  • Preventing overuse of AI where rule-based behavior is safer and clearer

See Phase 1 Validation for honest assessment and testing roadmap.

Run Core Validation

Test fundamental system integrity (no hype):

# Start infrastructure
make up

# Run brutal honesty validation
make validate-core

# Run attack simulation
make validate-attacks

This tests:

  • Redis connectivity and atomic operations
  • State persistence and consistency
  • Lua script execution
  • Directory simulation
  • Performance baselines
  • Real attack detection (28 commands across 5 scenarios)

Run Implementation Tests

Run verification tests to confirm component functionality:

# Run all verification phases
make verify

# Or individually
python3 tests/verification/verify_phase1.py  # Core: State & FUSE
python3 tests/verification/verify_phase2.py  # Persistence & Lua
python3 tests/verification/verify_phase3.py  # Intelligence & Persona
python3 tests/verification/verify_phase4.py  # Gateway, Watcher, Skills

Run Demo

Run the interactive demo:

# Standalone demo (no infrastructure needed)
make demo-standalone

# Or directly
python3 tests/integration/demo_standalone.py

This simulates a complete APT attack session and shows:

  • Real-time command analysis
  • Threat signature matching
  • Attacker skill profiling
  • Attack phase detection
  • Risk scoring and reporting

📊 Component Overview

| Component | Purpose | Status | |-----------|---------|--------| | State Hypervisor | Filesystem consistency engine | ✅ Complete | | FUSE Interface | Kernel VFS interception | ✅ Complete | | Persona Engine | Content generation AI | ✅ Complete | | SSH Gateway | Interactive shell honeypot | ✅ Complete | | HTTP Gateway | Web app honeypot | ✅ Complete | | Command Analyzer | Attack technique detection | ✅ Complete | | Threat Library | Signature database (12 threats) | ✅ Complete | | Skill Detector | Attacker profiling | ✅ Complete | | Event Processor | Pattern correlation | ✅ Complete | | Audit Streamer | Real-time event streaming | ✅ Complete | | Layer 0 (Rust) | Traffic analysis | ✅ Complete |

📚 Documentation

📜 License

🛠️ Configuration

Environment variables in docker-compose.yml:

| Variable | Description | Default | |----------|-------------|---------| | REDIS_HOST | Hostname of Redis service | redis-store | | POSTGRES_HOST | Hostname of Postgres service | db-store | | LLM_PROVIDER | openai, anthropic, or mock | mock | | OPENAI_API_KEY | Key for OpenAI (if used) | - |

📚 Documentation

📜 License

MIT License. See LICENSE for details.

View on GitHub
GitHub Stars5
CategoryDevelopment
Updated4h ago
Forks2

Languages

Python

Security Score

70/100

Audited on Mar 23, 2026

No findings