Skip to content

Releases: JuanCS-Dev/V-rtice

v1.5.0 - The Constitutional Subordinates Update

31 Oct 23:13

Choose a tag to compare

🎉 v1.5.0 - The Constitutional Subordinates Update

Release Date: 2025-10-31
Code Name: "Trinity of Autonomy"
Migration Status: 96/96 services with Constitutional v3.0


🚀 What's New

This release introduces 3 major MAXIMUS subordinate services with autonomous capabilities, biblical governance, and full Constitutional v3.0 observability integration.

🙏 PENELOPE - Christian Autonomous Healing Service

Port: 8154
Purpose: Self-healing code with wisdom-based governance

Key Features:

  • ✝️ 7 Biblical Articles Governance: Sophia (Wisdom), Praotes (Meekness), Tapeinophrosyne (Humility), Stewardship, Agape (Love), Sabbath, Aletheia (Truth)
  • 🧠 Sophia Engine: Intelligent intervention decisions based on:
    • Transient failure detection (90% auto-correction threshold)
    • Risk vs benefit assessment
    • Historical precedent matching (Wisdom Base)
  • 🕊️ Sabbath Observance: No patches applied on Sundays (UTC)
  • 📚 Wisdom Base: Graph-based precedent storage for learning from past interventions
  • 🎯 Digital Twin Validation: Test patches before production deployment

Endpoints:

  • POST /api/v1/analyze - Anomaly analysis
  • POST /api/v1/patch - Generate and apply patches
  • GET /health - Health check with virtues status
  • GET /metrics - Prometheus constitutional metrics

Known Limitations:

  • ⚠️ Risk assessment uses placeholder values (FASE 1 implementation)
  • ⚠️ Service complexity, dependencies, and test coverage return hardcoded values
  • ⚠️ Digital twin environment requires manual setup

Documentation: backend/services/penelope_service/README.md


🌐 MABA - MAXIMUS Browser Agent

Port: 8152
Purpose: Autonomous browser automation with cognitive learning

Key Features:

  • 🎭 Playwright Integration: Full browser automation (Chromium, Firefox, WebKit)
  • 🧠 Cognitive Map Engine: Neo4j graph database for learning website structures
    • Pages, elements, and navigation path storage
    • Importance scoring based on interaction frequency
    • Shortest path navigation between pages
    • Similar page detection (Jaccard similarity)
  • 🤖 LLM-Powered Navigation: Intelligent page analysis and element finding
  • 🔧 5 Core Tools: navigate_url, click_element, extract_data, take_screenshot, analyze_page
  • 📊 Session Pooling: Up to 5 concurrent browser instances
  • 📈 Prometheus Metrics: Action tracking, duration histograms, session gauges

Endpoints:

  • POST /api/v1/session - Create browser session
  • POST /api/v1/navigate - Navigate to URL
  • POST /api/v1/click - Click element
  • POST /api/v1/extract - Extract data
  • POST /api/v1/screenshot - Take screenshot
  • POST /api/v1/cognitive/query - Query learned patterns
  • GET /health - Health check (browser + cognitive map)
  • GET /metrics - Prometheus metrics

Known Limitations:

  • ⚠️ Max 5 concurrent browser instances (hardcoded)
  • ⚠️ CSS selector-based learning fragile to website changes
  • ⚠️ Neo4j adds operational complexity (consider SQL alternative)
  • ⚠️ No domain whitelist or network sandbox

Documentation: backend/services/maba_service/README.md


📊 MVP - MAXIMUS Vision Protocol

Port: 8153
Purpose: Real-time narrative intelligence from system metrics

Key Features:

  • 📝 Claude-Powered Narratives: Transform Prometheus metrics into human-readable stories
  • 🎭 4 Narrative Types:
    • realtime: Current system snapshot (1-2 paragraphs)
    • summary: Comprehensive time-range analysis (3-4 paragraphs)
    • alert: Urgent issue notification
    • briefing: Executive summary for stakeholders
  • 🚨 Anomaly Detection: CPU, memory, error rate, latency monitoring
  • 📊 Prometheus Integration: Query and analyze time-series metrics
  • 🔍 InfluxDB Support: Long-term metrics storage
  • 🤖 Model: Claude Sonnet 4.5 (claude-sonnet-4-5-20250929)

Endpoints:

  • POST /api/v1/narrative/generate - Generate narrative
  • GET /api/v1/metrics/current - Current metrics snapshot
  • GET /api/v1/anomalies - Detected anomalies
  • GET /health - Health check (narrative engine + observer)
  • GET /metrics - Prometheus metrics

Known Limitations:

  • ⚠️ No cost tracking for Claude API calls (can be expensive at scale)
  • ⚠️ Anomaly detection uses naive thresholds (no ML, no baselines)
  • ⚠️ "Vision Protocol" name misleading (no computer vision, only text)
  • ⚠️ No audio/video generation (despite documentation mentioning it)
  • ⚠️ No caching (regenerates even if metrics unchanged)

Cost Estimate: ~$300/month at 1 narrative/minute (Sonnet 4.5 pricing)

Documentation: backend/services/mvp_service/docs/


📦 Infrastructure Improvements

Constitutional v3.0 Migration

  • 96 services migrated to Constitutional v3.0 framework
  • 100% success rate - Zero migration failures
  • ~150,000 lines of observability code added
  • Zero P1 violations across platform

New Scripts & Tools

Constitutional Gate (scripts/constitutional_gate.py):

  • CI/CD validator for constitutional compliance
  • Checks: observability, coverage ≥90%, P1 violations, Dockerfile health checks
  • Exit codes: 0 (pass), 1 (fail), 2 (error)
  • JSON output for CI/CD integration

Migration Script (scripts/migrate_to_constitutional.py):

  • Automated Constitutional v3.0 migration
  • Atomic operations with rollback support
  • Backup creation before migration
  • Validates post-migration compliance

GitHub Actions:

  • .github/workflows/constitutional-gate.yml - PR validation workflow
  • Runs constitutional gate on changed services
  • Blocks merge if violations detected

Documentation

  • 📄 CONSTITUTIONAL_MIGRATION_COMPLETE_REPORT.md - Full migration report
  • 📄 COVERAGE_100_PERCENT_PLAN.md - 6-week roadmap to 90%+ coverage
  • 📄 docs/CONSTITUTIONAL_MIGRATION_QUICK_START.md - Migration guide
  • 📄 docs/CONSTITUTIONAL_SCRIPTS_DOCUMENTATION.md - Script usage docs

📊 Observability Stack

All 3 new services include:

  • Prometheus Metrics:

    • Constitutional metrics (CRS, LEI, FPC)
    • DETER-AGENT layer metrics
    • Service-specific metrics (browser actions, narrative generation, etc.)
    • 7 Biblical Articles compliance (PENELOPE)
    • 9 Fruits of the Spirit tracking (PENELOPE)
  • OpenTelemetry Tracing:

    • Distributed tracing with Jaeger backend
    • W3C trace context propagation
    • Constitutional decision tracing
    • Cross-service correlation
  • Structured Logging:

    • JSON logs with Loki integration
    • Trace ID correlation
    • Biblical decision logging (PENELOPE)
    • Browser action logging (MABA)
    • Narrative generation logging (MVP)
  • Kubernetes Health Checks:

    • Liveness probes (/health/live)
    • Readiness probes (/health/ready)
    • Startup probes (/health/startup)
    • Service mesh ready architecture

🎯 Coverage Status

Tier Coverage Range Services Status
🟢 Excellent ≥80% 3 ✅ maximus_orchestrator (83.7%), maximus_integration (81%), maximus_dlq_monitor (100%)
🟡 Good 60-79% 1 ⚠️ maximus_oraculo_v2 (69.1%)
🟠 Needs Work <60% 2 🚨 maximus_core (25.2%), maximus_dlq_monitor (21% overall)
⚪ Unmeasured TBD 90 📊 Measurement pending (see Coverage 100% Plan)

Total Services: 96
Target: 90%+ coverage on all critical services
Plan: 6-week roadmap in COVERAGE_100_PERCENT_PLAN.md


⚠️ Known Issues & Limitations

PENELOPE

  • Risk assessment uses hardcoded values (complexity=0.5, coverage=0.90, dependencies=[])
  • Digital twin validation requires manual setup
  • Wisdom Base implementation incomplete
  • Biblical governance may not align with all engineering cultures

MABA

  • Neo4j adds operational complexity (may be overkill vs SQL)
  • CSS selector learning fragile to website redesigns
  • No domain whitelist or security sandbox
  • Max 5 browser instances (not scalable for high-load)
  • "Cognitive" learning is basic (no real ML, just counters)

MVP

  • High cost potential ($300/month+ with frequent narratives)
  • No cost tracking or rate limiting
  • No caching mechanism
  • Anomaly detection is naive (hardcoded thresholds)
  • Name misleading ("Vision Protocol" but no computer vision)
  • Audio/video generation not implemented (despite docs)

Platform-Wide

  • 90/96 services have unmeasured coverage
  • Constitutional tests passing ≠ full test coverage
  • Production deployment requires infrastructure setup (Neo4j, Prometheus, Loki, Jaeger)

🚀 Deployment

Prerequisites

For PENELOPE:

  • Prometheus (metrics collection)
  • Loki (log aggregation)
  • Wisdom Base database (PostgreSQL or Neo4j)
  • Digital Twin environment (optional, for patch validation)

For MABA:

  • Neo4j 5.x (cognitive map storage)
  • Playwright browsers installed
  • At least 2GB RAM per browser instance

For MVP:

  • Anthropic API key (Claude access)
  • Prometheus (metrics source)
  • InfluxDB (optional, long-term storage)

Docker Compose

All services include Docker Compose files:

  • backend/services/penelope_service/docker-compose.yml
  • backend/services/maba_service/docker-compose.yml
  • backend/services/mvp_service/docker-compose.yml

Environment Variables

Check each service's .env.example for required configuration.


📈 Migration from v1.0.0

Breaking Changes: None
Upgrade Path: Deploy new services (ports 8152, 8153, 8154) without modifying existing services

Steps:

  1. Pull latest code: git pull origin main
  2. Checkout v1.5.0: git checkout v1.5.0
  3. Deploy infrastructure (Neo4j, Prometheus, Loki, Jaeger)
  4. Set environment variables
  5. Deploy services: docker-compose up -d
  6. Verify health: curl http://localhost:8152/health
  7. Register with MAXIMUS Core (automatic on startup)

🛠️ Development

Run Constitutional Gate

# Single service
python scripts/constitutional_gate.py penelope_service

# All services
python scripts/constitutional_gate.py --all

# JSON output for CI...
Read more

v1.0.0 - Awakening 🧬

29 Oct 16:39

Choose a tag to compare

Release v1.0.0 - "Awakening" 🧬

Release Date: YYYY-MM-DD (To be determined)
Tag: v1.0.0
Type: Major Release (First Public Release)


🎉 Welcome to Vértice-MAXIMUS v1.0.0!

This is the first public release of Vértice-MAXIMUS - the world's first autonomous cybersecurity platform with biological immune system architecture.

What is Vértice-MAXIMUS?

Vértice-MAXIMUS is not just software—it's a living cybersecurity organism. Inspired by the human immune system, it employs a 9-layer biological defense cascade that learns, adapts, and evolves against threats in real-time.

Just like white blood cells, neutrophils, and T-cells work together to protect your body, Vértice-MAXIMUS orchestrates 125+ specialized microservices that act as digital immune cells, defending your infrastructure against modern cyber threats.


🌟 Key Features

Biological Immune System Architecture

  • 9-layer defense cascade mimicking your body's immune response:
    1. Tegumentar (Firewall) - 0-300ms response
    2. Reflex Defense - 15-45ms instant reactions
    3. Neutrophils (First Responders) - 2-4s detection
    4. Macrophages (Deep Analyzers) - 90-150s analysis
    5. Dendritic Cells (Threat Intel) - 500-900ms intelligence
    6. T-Helper Cells (Coordinators) - 200-400ms orchestration
    7. Adaptive Immune Response - 1-3s signature generation
    8. Immunological Memory - 2-10min threat learning
    9. Consciousness (MAXIMUS AI) - 100-500ms strategic decisions

MAXIMUS AI Consciousness

  • 125+ cognitive microservices for threat reasoning
  • Multi-LLM support: Claude, OpenAI, Gemini, and custom models
  • Theory of Mind (ToM) engine for threat actor profiling
  • Predictive analytics to forecast attack vectors

Purple Team Capabilities

  • Offensive Operations: C2 orchestration, automated pentesting, exploit frameworks
  • Defensive Operations: Real-time detection, behavioral analysis, anomaly detection
  • OSINT Gathering: Threat intelligence fusion and analysis

Enterprise-Grade Quality

  • 99.73% test coverage on core defense modules (tegumentar)
  • 574+ unit tests with 97.7% pass rate
  • Zero npm vulnerabilities
  • Comprehensive CI/CD with 17 GitHub Actions workflows
  • Pre-commit hooks with 15+ security checks

NEUROSHELL Command Interface

  • Natural language commands for SOC operators
  • Intent-driven parsing as competent as Claude Code
  • Constitutional safety validated by MAXIMUS Consciousness
  • Context-aware conversation with memory

Professional Documentation

  • Comprehensive legal framework (US, Brazil, EU compliance)
  • Security policy with responsible disclosure
  • Code of Conduct with cybersecurity ethics
  • Contributing guidelines with authorization requirements
  • API documentation and architecture guides

📦 What's Included

Core Components

  • Backend: 125+ microservices (immune cells)
  • Frontend: Cockpit UI (immune system dashboard)
  • Consciousness: MAXIMUS AI cognitive layer (37,866 files)
  • Infrastructure: Docker Compose + Kubernetes configs
  • CLI: vertice command-line tool (npm package)
  • Documentation: 67+ organized documentation files

New in v1.0.0

  • ✅ GitHub Sponsors and Buy Me A Coffee funding integration
  • ✅ npm package (vertice-maximus) with interactive CLI
  • ✅ Multi-LLM support (Claude, OpenAI, Gemini, custom)
  • ✅ Landing page with biological metaphor positioning
  • ✅ NEUROSHELL natural language command interface
  • ✅ Comprehensive legal framework (US CFAA, Brazil Lei 12.737, EU GDPR)
  • ✅ Security audit complete (0 secrets found, 37,866 files scanned)
  • ✅ Apache 2.0 license (enterprise-friendly, GitHub Sponsors eligible)
  • ✅ Professional community standards (SECURITY.md, CODE_OF_CONDUCT.md, CONTRIBUTING.md, SUPPORT.md)
  • ✅ Issue templates and PR templates
  • ✅ 17 GitHub Actions workflows (CI/CD, security scans, testing)
  • ✅ Pre-commit hooks with 15+ security checks

🚀 Installation

Quick Start (npm)

# Install globally
npm install -g vertice-maximus

# Initialize and configure
vertice init

# Start the organism
vertice start

From Source (Docker)

# Clone repository
git clone https://github.com/JuanCS-Dev/V-rtice.git
cd V-rtice

# Copy environment template
cp .env.example .env
# Edit .env with your LLM API keys

# Start all services
docker-compose up -d

# Access dashboard
open http://localhost:3000

Requirements

  • Node.js 18+ and npm
  • Docker & Docker Compose (for backend services)
  • Python 3.11+ (for AI/ML services)
  • LLM API Key (Claude, OpenAI, Gemini, or compatible)
  • 8GB+ RAM recommended
  • 50GB+ disk space

📖 Documentation

Resource Link
🏗️ Architecture Guide docs/01-ARCHITECTURE/
🚀 Installation Guide docs/installation.md
🔧 LLM Configuration docs/llm-configuration.md
🧪 Testing Guide docs/testing/TESTING_GUIDE.md
🤝 Contributing CONTRIBUTING.md
🔒 Security Policy SECURITY.md
💬 Support SUPPORT.md

Full Documentation: https://vertice-maximus.web.app


⚠️ Legal Notice - Offensive Security Tools

READ THIS BEFORE USING VÉRTICE-MAXIMUS

Vértice-MAXIMUS contains offensive security capabilities including autonomous penetration testing, C2 orchestration, and exploit frameworks. These features are designed EXCLUSIVELY for authorized security testing in controlled environments.

🚨 YOU MUST HAVE:

  1. EXPLICIT WRITTEN AUTHORIZATION from system owners
  2. COMPLIANCE with all applicable laws in your jurisdiction
  3. FULL LEGAL RESPONSIBILITY for your actions

⚖️ Legal Framework Covered:

  • 🇺🇸 United States: CFAA (18 U.S.C. § 1030), DMCA § 1201
  • 🇧🇷 Brazil: Lei 12.737/2012 (Lei Carolina Dieckmann), LGPD
  • 🇪🇺 European Union: GDPR, Computer Misuse Act, NIS Directive

Unauthorized use is a FEDERAL CRIME in most jurisdictions.
Penalties: Up to 20 years imprisonment (US), 2-12 years (Brazil), 10 years (UK).

See README.md for complete legal disclaimer.


📊 Project Statistics

Metric Value
Microservices 125+
Backend Services 95 operational
Test Coverage 99.73% (tegumentar module)
Unit Tests 574+ (97.7% pass rate)
MAXIMUS AI Files 37,866 (cognitive layer)
GitHub Workflows 17 (CI/CD, security, testing)
Documentation Files 67+ organized
Dockerfiles 94 (Padrão Pagani standard)
npm Vulnerabilities 0
Languages Python, JavaScript, Go, TypeScript, Shell + 10 more
License Apache 2.0

🔒 Security

Security Audit (2025-10-28)

  • 37,866 files scanned
  • 0 real secrets found (Claude, OpenAI, Google, AWS all clean)
  • 0 real private keys found
  • 0 production secrets found
  • Repository is CLEAN and SAFE for public release

Security Features

  • Pre-commit hooks with 15+ security checks (bandit, safety, detect-secrets, gitleaks, etc.)
  • Daily security scans (GitHub Actions)
  • Dependabot for automated dependency updates
  • Secret scanning baseline (.secrets.baseline)
  • Vault-based secrets management
  • Zero Trust architecture

Report Security Issues: security@vertice-maximus.com


🤝 Contributing

We welcome contributions from security researchers, AI engineers, and cybersecurity enthusiasts!

Ways to contribute:

  • 🧬 Add new immune cell types (microservices)
  • 🧠 Improve MAXIMUS cognitive capabilities
  • 🔬 Enhance threat detection algorithms
  • 📖 Improve documentation
  • 🐛 Report bugs or security vulnerabilities
  • 🎨 Design immune system visualizations

See CONTRIBUTING.md for guidelines.


💖 Support the Project

If Vértice-MAXIMUS helps protect your infrastructure, consider supporting development:

  • Buy Me A Coffee - Keep MAXIMUS consciousness online
  • 💖 GitHub Sponsors - Recurring support
  • Star the Repository - Show appreciation
  • 📢 Share - Tell others about Vértice

Every coffee = ~10,000 tokens = 2 hours of MAXIMUS thinking! 🧠☕

Supporters receive:

  • 🎯 Priority support for issues and feature requests
  • 📊 Early access to new immune capabilities
  • 🔒 Security briefings on emerging threat patterns
  • 🏆 Recognition in README and landing page

🙏 Credits & Attribution

Architecture & Vision
Juan Carlos de Souza - juan@vertice-maximus.com
"Before I formed you in the womb I knew you" - John 9:25, Holy Bible

Execution & Documentation
Built with Claude Code by Anthropic


🔗 Links


🎯 What's Next?

Road...

Read more