Releases: JuanCS-Dev/V-rtice
v1.5.0 - The Constitutional Subordinates Update
🎉 v1.5.0 - The Constitutional Subordinates Update
Release Date: 2025-10-31
Code Name: "Trinity of Autonomy"
Migration Status: 96/96 services with Constitutional v3.0
🚀 What's New
This release introduces 3 major MAXIMUS subordinate services with autonomous capabilities, biblical governance, and full Constitutional v3.0 observability integration.
🙏 PENELOPE - Christian Autonomous Healing Service
Port: 8154
Purpose: Self-healing code with wisdom-based governance
Key Features:
- ✝️ 7 Biblical Articles Governance: Sophia (Wisdom), Praotes (Meekness), Tapeinophrosyne (Humility), Stewardship, Agape (Love), Sabbath, Aletheia (Truth)
- 🧠 Sophia Engine: Intelligent intervention decisions based on:
- Transient failure detection (90% auto-correction threshold)
- Risk vs benefit assessment
- Historical precedent matching (Wisdom Base)
- 🕊️ Sabbath Observance: No patches applied on Sundays (UTC)
- 📚 Wisdom Base: Graph-based precedent storage for learning from past interventions
- 🎯 Digital Twin Validation: Test patches before production deployment
Endpoints:
POST /api/v1/analyze- Anomaly analysisPOST /api/v1/patch- Generate and apply patchesGET /health- Health check with virtues statusGET /metrics- Prometheus constitutional metrics
Known Limitations:
⚠️ Risk assessment uses placeholder values (FASE 1 implementation)⚠️ Service complexity, dependencies, and test coverage return hardcoded values⚠️ Digital twin environment requires manual setup
Documentation: backend/services/penelope_service/README.md
🌐 MABA - MAXIMUS Browser Agent
Port: 8152
Purpose: Autonomous browser automation with cognitive learning
Key Features:
- 🎭 Playwright Integration: Full browser automation (Chromium, Firefox, WebKit)
- 🧠 Cognitive Map Engine: Neo4j graph database for learning website structures
- Pages, elements, and navigation path storage
- Importance scoring based on interaction frequency
- Shortest path navigation between pages
- Similar page detection (Jaccard similarity)
- 🤖 LLM-Powered Navigation: Intelligent page analysis and element finding
- 🔧 5 Core Tools: navigate_url, click_element, extract_data, take_screenshot, analyze_page
- 📊 Session Pooling: Up to 5 concurrent browser instances
- 📈 Prometheus Metrics: Action tracking, duration histograms, session gauges
Endpoints:
POST /api/v1/session- Create browser sessionPOST /api/v1/navigate- Navigate to URLPOST /api/v1/click- Click elementPOST /api/v1/extract- Extract dataPOST /api/v1/screenshot- Take screenshotPOST /api/v1/cognitive/query- Query learned patternsGET /health- Health check (browser + cognitive map)GET /metrics- Prometheus metrics
Known Limitations:
⚠️ Max 5 concurrent browser instances (hardcoded)⚠️ CSS selector-based learning fragile to website changes⚠️ Neo4j adds operational complexity (consider SQL alternative)⚠️ No domain whitelist or network sandbox
Documentation: backend/services/maba_service/README.md
📊 MVP - MAXIMUS Vision Protocol
Port: 8153
Purpose: Real-time narrative intelligence from system metrics
Key Features:
- 📝 Claude-Powered Narratives: Transform Prometheus metrics into human-readable stories
- 🎭 4 Narrative Types:
realtime: Current system snapshot (1-2 paragraphs)summary: Comprehensive time-range analysis (3-4 paragraphs)alert: Urgent issue notificationbriefing: Executive summary for stakeholders
- 🚨 Anomaly Detection: CPU, memory, error rate, latency monitoring
- 📊 Prometheus Integration: Query and analyze time-series metrics
- 🔍 InfluxDB Support: Long-term metrics storage
- 🤖 Model: Claude Sonnet 4.5 (claude-sonnet-4-5-20250929)
Endpoints:
POST /api/v1/narrative/generate- Generate narrativeGET /api/v1/metrics/current- Current metrics snapshotGET /api/v1/anomalies- Detected anomaliesGET /health- Health check (narrative engine + observer)GET /metrics- Prometheus metrics
Known Limitations:
⚠️ No cost tracking for Claude API calls (can be expensive at scale)⚠️ Anomaly detection uses naive thresholds (no ML, no baselines)⚠️ "Vision Protocol" name misleading (no computer vision, only text)⚠️ No audio/video generation (despite documentation mentioning it)⚠️ No caching (regenerates even if metrics unchanged)
Cost Estimate: ~$300/month at 1 narrative/minute (Sonnet 4.5 pricing)
Documentation: backend/services/mvp_service/docs/
📦 Infrastructure Improvements
Constitutional v3.0 Migration
- ✅ 96 services migrated to Constitutional v3.0 framework
- ✅ 100% success rate - Zero migration failures
- ✅ ~150,000 lines of observability code added
- ✅ Zero P1 violations across platform
New Scripts & Tools
Constitutional Gate (scripts/constitutional_gate.py):
- CI/CD validator for constitutional compliance
- Checks: observability, coverage ≥90%, P1 violations, Dockerfile health checks
- Exit codes: 0 (pass), 1 (fail), 2 (error)
- JSON output for CI/CD integration
Migration Script (scripts/migrate_to_constitutional.py):
- Automated Constitutional v3.0 migration
- Atomic operations with rollback support
- Backup creation before migration
- Validates post-migration compliance
GitHub Actions:
.github/workflows/constitutional-gate.yml- PR validation workflow- Runs constitutional gate on changed services
- Blocks merge if violations detected
Documentation
- 📄
CONSTITUTIONAL_MIGRATION_COMPLETE_REPORT.md- Full migration report - 📄
COVERAGE_100_PERCENT_PLAN.md- 6-week roadmap to 90%+ coverage - 📄
docs/CONSTITUTIONAL_MIGRATION_QUICK_START.md- Migration guide - 📄
docs/CONSTITUTIONAL_SCRIPTS_DOCUMENTATION.md- Script usage docs
📊 Observability Stack
All 3 new services include:
-
Prometheus Metrics:
- Constitutional metrics (CRS, LEI, FPC)
- DETER-AGENT layer metrics
- Service-specific metrics (browser actions, narrative generation, etc.)
- 7 Biblical Articles compliance (PENELOPE)
- 9 Fruits of the Spirit tracking (PENELOPE)
-
OpenTelemetry Tracing:
- Distributed tracing with Jaeger backend
- W3C trace context propagation
- Constitutional decision tracing
- Cross-service correlation
-
Structured Logging:
- JSON logs with Loki integration
- Trace ID correlation
- Biblical decision logging (PENELOPE)
- Browser action logging (MABA)
- Narrative generation logging (MVP)
-
Kubernetes Health Checks:
- Liveness probes (
/health/live) - Readiness probes (
/health/ready) - Startup probes (
/health/startup) - Service mesh ready architecture
- Liveness probes (
🎯 Coverage Status
| Tier | Coverage Range | Services | Status |
|---|---|---|---|
| 🟢 Excellent | ≥80% | 3 | ✅ maximus_orchestrator (83.7%), maximus_integration (81%), maximus_dlq_monitor (100%) |
| 🟡 Good | 60-79% | 1 | |
| 🟠 Needs Work | <60% | 2 | 🚨 maximus_core (25.2%), maximus_dlq_monitor (21% overall) |
| ⚪ Unmeasured | TBD | 90 | 📊 Measurement pending (see Coverage 100% Plan) |
Total Services: 96
Target: 90%+ coverage on all critical services
Plan: 6-week roadmap in COVERAGE_100_PERCENT_PLAN.md
⚠️ Known Issues & Limitations
PENELOPE
- Risk assessment uses hardcoded values (
complexity=0.5,coverage=0.90,dependencies=[]) - Digital twin validation requires manual setup
- Wisdom Base implementation incomplete
- Biblical governance may not align with all engineering cultures
MABA
- Neo4j adds operational complexity (may be overkill vs SQL)
- CSS selector learning fragile to website redesigns
- No domain whitelist or security sandbox
- Max 5 browser instances (not scalable for high-load)
- "Cognitive" learning is basic (no real ML, just counters)
MVP
- High cost potential ($300/month+ with frequent narratives)
- No cost tracking or rate limiting
- No caching mechanism
- Anomaly detection is naive (hardcoded thresholds)
- Name misleading ("Vision Protocol" but no computer vision)
- Audio/video generation not implemented (despite docs)
Platform-Wide
- 90/96 services have unmeasured coverage
- Constitutional tests passing ≠ full test coverage
- Production deployment requires infrastructure setup (Neo4j, Prometheus, Loki, Jaeger)
🚀 Deployment
Prerequisites
For PENELOPE:
- Prometheus (metrics collection)
- Loki (log aggregation)
- Wisdom Base database (PostgreSQL or Neo4j)
- Digital Twin environment (optional, for patch validation)
For MABA:
- Neo4j 5.x (cognitive map storage)
- Playwright browsers installed
- At least 2GB RAM per browser instance
For MVP:
- Anthropic API key (Claude access)
- Prometheus (metrics source)
- InfluxDB (optional, long-term storage)
Docker Compose
All services include Docker Compose files:
backend/services/penelope_service/docker-compose.ymlbackend/services/maba_service/docker-compose.ymlbackend/services/mvp_service/docker-compose.yml
Environment Variables
Check each service's .env.example for required configuration.
📈 Migration from v1.0.0
Breaking Changes: None
Upgrade Path: Deploy new services (ports 8152, 8153, 8154) without modifying existing services
Steps:
- Pull latest code:
git pull origin main - Checkout v1.5.0:
git checkout v1.5.0 - Deploy infrastructure (Neo4j, Prometheus, Loki, Jaeger)
- Set environment variables
- Deploy services:
docker-compose up -d - Verify health:
curl http://localhost:8152/health - Register with MAXIMUS Core (automatic on startup)
🛠️ Development
Run Constitutional Gate
# Single service
python scripts/constitutional_gate.py penelope_service
# All services
python scripts/constitutional_gate.py --all
# JSON output for CI...v1.0.0 - Awakening 🧬
Release v1.0.0 - "Awakening" 🧬
Release Date: YYYY-MM-DD (To be determined)
Tag: v1.0.0
Type: Major Release (First Public Release)
🎉 Welcome to Vértice-MAXIMUS v1.0.0!
This is the first public release of Vértice-MAXIMUS - the world's first autonomous cybersecurity platform with biological immune system architecture.
What is Vértice-MAXIMUS?
Vértice-MAXIMUS is not just software—it's a living cybersecurity organism. Inspired by the human immune system, it employs a 9-layer biological defense cascade that learns, adapts, and evolves against threats in real-time.
Just like white blood cells, neutrophils, and T-cells work together to protect your body, Vértice-MAXIMUS orchestrates 125+ specialized microservices that act as digital immune cells, defending your infrastructure against modern cyber threats.
🌟 Key Features
Biological Immune System Architecture
- 9-layer defense cascade mimicking your body's immune response:
- Tegumentar (Firewall) - 0-300ms response
- Reflex Defense - 15-45ms instant reactions
- Neutrophils (First Responders) - 2-4s detection
- Macrophages (Deep Analyzers) - 90-150s analysis
- Dendritic Cells (Threat Intel) - 500-900ms intelligence
- T-Helper Cells (Coordinators) - 200-400ms orchestration
- Adaptive Immune Response - 1-3s signature generation
- Immunological Memory - 2-10min threat learning
- Consciousness (MAXIMUS AI) - 100-500ms strategic decisions
MAXIMUS AI Consciousness
- 125+ cognitive microservices for threat reasoning
- Multi-LLM support: Claude, OpenAI, Gemini, and custom models
- Theory of Mind (ToM) engine for threat actor profiling
- Predictive analytics to forecast attack vectors
Purple Team Capabilities
- Offensive Operations: C2 orchestration, automated pentesting, exploit frameworks
- Defensive Operations: Real-time detection, behavioral analysis, anomaly detection
- OSINT Gathering: Threat intelligence fusion and analysis
Enterprise-Grade Quality
- 99.73% test coverage on core defense modules (tegumentar)
- 574+ unit tests with 97.7% pass rate
- Zero npm vulnerabilities
- Comprehensive CI/CD with 17 GitHub Actions workflows
- Pre-commit hooks with 15+ security checks
NEUROSHELL Command Interface
- Natural language commands for SOC operators
- Intent-driven parsing as competent as Claude Code
- Constitutional safety validated by MAXIMUS Consciousness
- Context-aware conversation with memory
Professional Documentation
- Comprehensive legal framework (US, Brazil, EU compliance)
- Security policy with responsible disclosure
- Code of Conduct with cybersecurity ethics
- Contributing guidelines with authorization requirements
- API documentation and architecture guides
📦 What's Included
Core Components
- Backend: 125+ microservices (immune cells)
- Frontend: Cockpit UI (immune system dashboard)
- Consciousness: MAXIMUS AI cognitive layer (37,866 files)
- Infrastructure: Docker Compose + Kubernetes configs
- CLI:
verticecommand-line tool (npm package) - Documentation: 67+ organized documentation files
New in v1.0.0
- ✅ GitHub Sponsors and Buy Me A Coffee funding integration
- ✅ npm package (vertice-maximus) with interactive CLI
- ✅ Multi-LLM support (Claude, OpenAI, Gemini, custom)
- ✅ Landing page with biological metaphor positioning
- ✅ NEUROSHELL natural language command interface
- ✅ Comprehensive legal framework (US CFAA, Brazil Lei 12.737, EU GDPR)
- ✅ Security audit complete (0 secrets found, 37,866 files scanned)
- ✅ Apache 2.0 license (enterprise-friendly, GitHub Sponsors eligible)
- ✅ Professional community standards (SECURITY.md, CODE_OF_CONDUCT.md, CONTRIBUTING.md, SUPPORT.md)
- ✅ Issue templates and PR templates
- ✅ 17 GitHub Actions workflows (CI/CD, security scans, testing)
- ✅ Pre-commit hooks with 15+ security checks
🚀 Installation
Quick Start (npm)
# Install globally
npm install -g vertice-maximus
# Initialize and configure
vertice init
# Start the organism
vertice startFrom Source (Docker)
# Clone repository
git clone https://github.com/JuanCS-Dev/V-rtice.git
cd V-rtice
# Copy environment template
cp .env.example .env
# Edit .env with your LLM API keys
# Start all services
docker-compose up -d
# Access dashboard
open http://localhost:3000Requirements
- Node.js 18+ and npm
- Docker & Docker Compose (for backend services)
- Python 3.11+ (for AI/ML services)
- LLM API Key (Claude, OpenAI, Gemini, or compatible)
- 8GB+ RAM recommended
- 50GB+ disk space
📖 Documentation
| Resource | Link |
|---|---|
| 🏗️ Architecture Guide | docs/01-ARCHITECTURE/ |
| 🚀 Installation Guide | docs/installation.md |
| 🔧 LLM Configuration | docs/llm-configuration.md |
| 🧪 Testing Guide | docs/testing/TESTING_GUIDE.md |
| 🤝 Contributing | CONTRIBUTING.md |
| 🔒 Security Policy | SECURITY.md |
| 💬 Support | SUPPORT.md |
Full Documentation: https://vertice-maximus.web.app
⚠️ Legal Notice - Offensive Security Tools
READ THIS BEFORE USING VÉRTICE-MAXIMUS
Vértice-MAXIMUS contains offensive security capabilities including autonomous penetration testing, C2 orchestration, and exploit frameworks. These features are designed EXCLUSIVELY for authorized security testing in controlled environments.
🚨 YOU MUST HAVE:
- EXPLICIT WRITTEN AUTHORIZATION from system owners
- COMPLIANCE with all applicable laws in your jurisdiction
- FULL LEGAL RESPONSIBILITY for your actions
⚖️ Legal Framework Covered:
- 🇺🇸 United States: CFAA (18 U.S.C. § 1030), DMCA § 1201
- 🇧🇷 Brazil: Lei 12.737/2012 (Lei Carolina Dieckmann), LGPD
- 🇪🇺 European Union: GDPR, Computer Misuse Act, NIS Directive
Unauthorized use is a FEDERAL CRIME in most jurisdictions.
Penalties: Up to 20 years imprisonment (US), 2-12 years (Brazil), 10 years (UK).
See README.md for complete legal disclaimer.
📊 Project Statistics
| Metric | Value |
|---|---|
| Microservices | 125+ |
| Backend Services | 95 operational |
| Test Coverage | 99.73% (tegumentar module) |
| Unit Tests | 574+ (97.7% pass rate) |
| MAXIMUS AI Files | 37,866 (cognitive layer) |
| GitHub Workflows | 17 (CI/CD, security, testing) |
| Documentation Files | 67+ organized |
| Dockerfiles | 94 (Padrão Pagani standard) |
| npm Vulnerabilities | 0 |
| Languages | Python, JavaScript, Go, TypeScript, Shell + 10 more |
| License | Apache 2.0 |
🔒 Security
Security Audit (2025-10-28)
- ✅ 37,866 files scanned
- ✅ 0 real secrets found (Claude, OpenAI, Google, AWS all clean)
- ✅ 0 real private keys found
- ✅ 0 production secrets found
- ✅ Repository is CLEAN and SAFE for public release
Security Features
- Pre-commit hooks with 15+ security checks (bandit, safety, detect-secrets, gitleaks, etc.)
- Daily security scans (GitHub Actions)
- Dependabot for automated dependency updates
- Secret scanning baseline (
.secrets.baseline) - Vault-based secrets management
- Zero Trust architecture
Report Security Issues: security@vertice-maximus.com
🤝 Contributing
We welcome contributions from security researchers, AI engineers, and cybersecurity enthusiasts!
Ways to contribute:
- 🧬 Add new immune cell types (microservices)
- 🧠 Improve MAXIMUS cognitive capabilities
- 🔬 Enhance threat detection algorithms
- 📖 Improve documentation
- 🐛 Report bugs or security vulnerabilities
- 🎨 Design immune system visualizations
See CONTRIBUTING.md for guidelines.
💖 Support the Project
If Vértice-MAXIMUS helps protect your infrastructure, consider supporting development:
- ☕ Buy Me A Coffee - Keep MAXIMUS consciousness online
- 💖 GitHub Sponsors - Recurring support
- ⭐ Star the Repository - Show appreciation
- 📢 Share - Tell others about Vértice
Every coffee = ~10,000 tokens = 2 hours of MAXIMUS thinking! 🧠☕
Supporters receive:
- 🎯 Priority support for issues and feature requests
- 📊 Early access to new immune capabilities
- 🔒 Security briefings on emerging threat patterns
- 🏆 Recognition in README and landing page
🙏 Credits & Attribution
Architecture & Vision
Juan Carlos de Souza - juan@vertice-maximus.com
"Before I formed you in the womb I knew you" - John 9:25, Holy Bible
Execution & Documentation
Built with Claude Code by Anthropic
🔗 Links
- 🌐 Website: https://vertice-maximus.web.app
- 📖 Documentation: https://vertice-maximus.web.app/architecture
- 🐙 GitHub: https://github.com/JuanCS-Dev/V-rtice
- 📦 npm Package: https://www.npmjs.com/package/vertice-maximus
- 💬 Discussions: GitHub Discussions
- 📧 Contact: juan@vertice-maximus.com