"Forge secrets in the shadows, shield them from quantum eyes"
Shadowforge is a production-grade quantum-resistant steganography tool that combines NIST-approved post-quantum cryptography, Reed-Solomon error correction, and multiple steganographic techniques. Built with Domain-Driven Design (DDD) and Command Query Responsibility Segregation (CQRS) patterns.
Shadowforge provides military-grade data hiding with post-quantum security, designed to
withstand both current and future cryptographic attacks. The system supports multiple
distribution patterns, from simple one-to-one embedding to complex distributed networks
with K-of-N threshold recovery.
- Kyber-1024 (NIST-approved KEM) for encryption
- Dilithium3 (NIST-approved) for digital signatures
- Constant-time operations to prevent timing attacks
- Secure memory handling with automatic key zeroing
- Configurable data/parity shard ratios
- K-of-N threshold recovery (need only K shards from N total)
- Corruption detection and automatic recovery
- Up to 50% redundancy for maximum fault tolerance
- Image: LSB (PNG/BMP), DCT (JPEG), Palette (GIF/PNG) โ
- Audio: Phase encoding (DSSS), Echo hiding, LSB audio โ
- Text: Zero-width characters (Unicode ZWSP/ZWJ) โ
- Capacity-aware embedding with statistical analysis โ
- One-to-One: Traditional steganography (1 payload โ 1 cover)
- One-to-Many: Distributed secret splitting (1 payload โ N covers)
- Many-to-One: Batch embedding (N payloads โ 1 cover)
- Many-to-Many: Complex distribution matrix (N payloads โ M covers)
- ZIP, TAR, TAR.GZ format support
- Archive-to-archive workflows
- Nested archive handling
- Automatic format detection
- Total Lines: 60,322 (44,174 code, 6,654 comments, 9,494 blanks)
- Go Code: 41,671 lines across 185 files
- Comment Ratio: 13% (5,385 comment lines)
- Languages: Go (primary), Python, Shell, Markdown, Makefile
- Bounded Contexts: 8 (Crypto, Error Correction, Stego, Media, Analysis, Distribution, Reconstruction, Archive)
- Implementation Files: 185+ Go files
- Test Files: 50+ comprehensive test suites
- Test Coverage: 85%+ (90%+ for crypto operations)
- Distribution Patterns: 4 (all operational)
- Steganography Techniques: 7/7 (100% complete)
- CLI Binary Size: 8.2MB (fully self-contained)
- Shell Completions: Bash, Fish, Zsh (all commands covered)
Shadowforge follows Clean Architecture principles with clear separation of concerns:
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ Interface Layer (CLI/API) โ
โ โโ Cobra CLI commands โ
โ โโ Echo REST API endpoints โ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโค
โ Application Layer (CQRS) โ
โ โโ Command Handlers โ
โ โโ Query Handlers โ
โ โโ Application Services โ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโค
โ Domain Layer (8 Bounded Contexts) โ
โ โโ Cryptography โ
โ โโ Error Correction โ
โ โโ Steganography โ
โ โโ Media Processing โ
โ โโ Security Analysis โ
โ โโ Distribution โ
โ โโ Reconstruction โ
โ โโ Archive โ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโค
โ Infrastructure Layer โ
โ โโ CIRCL PQC integration โ
โ โโ Reed-Solomon implementation โ
โ โโ File I/O and media processing โ
โ โโ External service adapters โ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
| Category | Technology |
|---|---|
| Language | Go 1.21+ |
| Architecture | DDD + CQRS + Clean Architecture |
| PQC | cloudflare/circl |
| Error Correction | klauspost/reedsolomon |
| CLI | spf13/cobra |
| API | labstack/echo |
| Testing | stretchr/testify, golang/mock |
| Logging | log/slog (stdlib) |
See the power of steganography - these images look identical to the human eye, yet one contains encrypted quantum-resistant data:
Original Image Clean cover media - no hidden data |
Steganographic Image Visually identical - contains encrypted payload |
๐ What's Hidden Inside the Stego Image?
The steganographic image contains multiple layers of protection:
Layer 1: Post-Quantum Encryption (Kyber-1024)
- Encrypted payload protected against quantum computer attacks
- NIST-approved cryptographic standard
- 256-bit shared secret key
Layer 2: Digital Signature (Dilithium3)
- Cryptographic proof of authenticity
- Tamper detection mechanism
- Post-quantum signature scheme
Layer 3: Reed-Solomon Error Correction
- Configurable redundancy (typically 30-50%)
- Automatic corruption detection and repair
- Graceful degradation with partial data recovery
Layer 4: Steganographic Embedding
- LSB (Least Significant Bit) technique for PNG images
- Imperceptible modifications to pixel values
- Statistical distribution preserved to avoid detection
| Metric | Original | Stego Image | Change |
|---|---|---|---|
| File Size | ~770 KB | ~770 KB | <0.1% |
| Visual Appearance | Natural landscape | Identical | 0% (imperceptible) |
| Pixel Modifications | 0 pixels | ~2.3% pixels | LSB changes only |
| Hidden Payload | None | ~35 bytes | Encrypted data |
| Error Correction | None | 30% redundancy | Reed-Solomon parity |
| Detectability | N/A | Chi-square: -13 dB | Statistically undetectable |
- Encryption: Payload encrypted with Kyber-1024 (quantum-resistant)
- Integrity: Dilithium3 digital signature ensures authenticity
- Resilience: Reed-Solomon allows recovery even with 30% data loss
- Stealth: Embedding preserves statistical properties of original image
- Capacity: ~0.1% of cover image size used (minimal detection risk)
Note: The modifications are made to the least significant bits of pixel color values, making them invisible to human perception while maintaining the image's statistical properties to evade steganalysis detection.
๐ Web Documentation: greysquirr3l.github.io/shadowforge
Complete documentation available in docs/public/cli/:
Getting Started:
Commands:
Guides:
Reference:
Help:
Status: CLI application is fully functional with 7 production-ready steganography techniques and all 4 distribution patterns.
brew tap greysquirr3l/shadowforge
brew install shadowforgeDownload pre-built binaries from GitHub Releases:
- macOS (Intel):
shadowforge_*_darwin_amd64.tar.gz - macOS (Apple Silicon):
shadowforge_*_darwin_arm64.tar.gz - Linux (x64):
shadowforge_*_linux_amd64.tar.gz - Linux (ARM64):
shadowforge_*_linux_arm64.tar.gz
# Example: Install on macOS Apple Silicon
VERSION=0.7.6
curl -L -O https://github.com/greysquirr3l/shadowforge/releases/download/v${VERSION}/shadowforge_${VERSION}_darwin_arm64.tar.gz
tar -xzf shadowforge_${VERSION}_darwin_arm64.tar.gz
sudo mv shadowforge_${VERSION}_darwin_arm64/shadowforge /usr/local/bin/
shadowforge versionPrerequisites: Go 1.21 or higher, Git
# Clone the repository
git clone https://github.com/greysquirr3l/shadowforge.git
cd shadowforge
# Install dependencies
go mod download
# Build the CLI
make build
# Run tests
make test
# Optional: Install shell completions
# Bash
sudo cp scripts/completion/shadowforge.bash /etc/bash_completion.d/shadowforge
# Fish
cp scripts/completion/shadowforge.fish ~/.config/fish/completions/shadowforge.fish
# Zsh
cp scripts/completion/shadowforge.zsh ~/.zsh/completion/_shadowforge
# Add to ~/.zshrc: fpath=(~/.zsh/completion $fpath)The CLI is fully functional with real backend integration:
# Build the CLI
make build
# Or: go build -o bin/shadowforge ./cmd/cli# Generate PQC key pair
shadowforge keygen --algorithm kyber1024 --output keys/
# Encrypt and embed (one-to-one)
shadowforge embed \
--input secret.txt \
--cover image.png \
--output stego.png \
--key keys/public.key
# Distributed embedding (one-to-many with K-of-N recovery)
shadowforge embed-distributed \
--input document.pdf \
--covers covers/*.png \
--data-shards 10 \
--parity-shards 5 \
--output-archive stego-bundle.zip
# Extract from stego media
shadowforge extract \
--input stego.png \
--key keys/private.key \
--output recovered.txt
# Analyze capacity
shadowforge analyze capacity --cover image.png --technique lsb
# Forensic watermarking (PNG directories)
# Works for KaTeX formula PNGs, or PDF pages rendered to PNG.
# Note: encryption + signature are enabled by default.
shadowforge watermark embed \
--recipient "Jane Smith <jane@corp.com>" \
--gpg-key ./keys/jane-key.pub \
--input-dir ./formulas \
--output-dir ./watermarked \
--receipt ./watermark-receipt.md
# Extract (decrypt) the watermark (requires the same receipt)
shadowforge watermark extract \
--input-dir ./watermarked \
--output ./recovered-watermark.json \
--receipt ./watermark-receipt.md
# Verify authenticity + expected values (requires receipt)
shadowforge watermark verify \
--input-dir ./watermarked \
--expected-recipient "Jane Smith" \
--gpg-key ./keys/jane-key.pub \
--receipt ./watermark-receipt.mdShadowforge can embed a forensic watermark across a directory of PNG images. If your source is a PDF, the intended workflow is: render PDF pages to PNG โ watermark the PNGs โ rebuild the PDF. By default, watermark payloads are:
- Encrypted (Kyber-1024 + symmetric encryption)
- Signed (Dilithium3)
- Distributed across images with Reed-Solomon error correction
When encryption is enabled (default), pass --receipt during watermark embed to write a
Markdown receipt containing the per-watermark decryption key material.
- Treat the receipt like a private key.
- Without the receipt, you cannot decrypt or fully verify encrypted watermarks later.
For complete details and troubleshooting, see internal/domain/watermark/README.md.
Note: The REST API server is a future item. Weโre prioritizing a CLI-first release and have temporarily deferred API work until after distribution prep. Releases are manual-only for now; the endpoints below illustrate the forthcoming server.
# Start API server
shadowforge-api --port 8080
# Embed via REST API
curl -X POST http://localhost:8080/api/v1/embed \
-H "Content-Type: application/json" \
-d '{
"payload": "base64_encoded_data",
"cover": "base64_encoded_image",
"algorithm": "kyber1024",
"technique": "lsb"
}'| Phase | Status | Description |
|---|---|---|
| Phase 1 | โ Complete | Foundation (DDD+CQRS architecture, 83 files) |
| Phase 2 | โ Complete | Core Domain (Crypto, Error Correction, Media) |
| Phase 3 | โ Complete | Steganography Techniques (all 7/7 production-ready) |
| Phase 4 | โ Complete | Distribution Patterns (all 4 patterns operational) |
| Phase 5 | โ Complete | CLI Application (fully functional, 8.2MB binary) |
| Phase 6 | โณ Future Item | REST API Server (Echo framework, deferred) |
| Phase 7 | โณ Planned | Security Hardening (audit, penetration testing) |
| Phase 8 | ๐ง In Progress | CI/CD prep (manual-only release workflow), Homebrew formula/docs |
| Phase 9 | โณ Planned | Production Readiness (final hardening and deployment) |
Note: API is deferred; focus is on finalizing CI/CD and Homebrew distribution with manual-only releases.
Phase 3 - Steganography Techniques (100% Complete - 7/7):
- โ LSB Image (PNG/BMP) - 235 lines, 15 tests, 100% data integrity
- โ DCT JPEG - 294 lines + jpegdct, 19 tests, 100% data integrity
- โ Zero-Width Text - 400+ lines, 15 tests, 100% data integrity
- โ Palette (GIF/PNG) - 560 lines, 20+ tests, 100% data integrity
- โ LSB Audio (WAV) - 350 lines, 12 tests, 100% data integrity
- โ Phase Encoding (WAV) - 466 lines, 10 tests, DSSS with adaptive alpha
- โ Echo Hiding (WAV) - 421 lines, 10 tests, autocorrelation-based
Phase 4 - Distribution Patterns (100% Complete):
- โ One-to-One pattern (traditional steganography)
- โ One-to-Many pattern (distributed K-of-N secret splitting)
- โ Many-to-One pattern (batch aggregation)
- โ Many-to-Many pattern (matrix distribution with 4 modes)
- โ 2,978 lines of implementation code
- โ 13/13 integration tests passing (100% coverage)
- โ Worker pool architecture for parallel processing
- โ HMAC-protected manifest serialization
Phase 5 - CLI Application (100% Complete):
- โ
Fully functional CLI (
bin/shadowforge8.2MB) - โ Real backend integration (no simulation)
- โ Commands: embed, extract, analyze, keygen, formats, archive
- โ All 7 steganography techniques operational
- โ All 4 distribution patterns working
Shadowforge follows strict testing standards:
- Domain Logic: 85%+ coverage required
- Cryptographic Operations: 90%+ coverage required
- Command/Query Handlers: 80%+ coverage required
- Race Detection: All tests run with
-raceflag - Table-Driven Tests: Comprehensive scenario coverage
# Run all tests
go test -v -race ./...
# Run tests with coverage
go test -v -race -cover ./...
# Run specific domain tests
go test -v -race ./internal/domain/crypto/
# Generate coverage report
go test -coverprofile=coverage.out ./...
go tool cover -html=coverage.out- โ Constant-time cryptographic operations
- โ Automatic key zeroing after use
- โ No panic/recover in production code
- โ All errors handled explicitly
- โ Input validation on all boundaries
- โ Secure random number generation (crypto/rand)
- โ Statistical analysis for detectability
- NIST Post-Quantum Standards (Kyber-1024, Dilithium3)
- Argon2id for password-based key derivation
- AES-256-GCM for symmetric encryption
- SHA3/SHAKE for hashing and extendable output
Current Security Measures:
- โ 90%+ test coverage for cryptographic operations
- โ All tests pass with race detector
- โ Constant-time operations for crypto
- โ Secure memory handling (auto key zeroing)
โ ๏ธ External audit pending (Phase 7)
Contributions are welcome! Please follow these guidelines:
- Read the Go Instructions
- Follow Clean Architecture boundaries
- Maintain 80%+ test coverage
- Run
go fmt,go vet, andgolangci-lint - All tests must pass with
-raceflag - Document security-critical code thoroughly
# Create feature branch
git checkout -b feature/your-feature-name
# Make changes and test
go test -v -race ./...
# Format and lint
go fmt ./...
go vet ./...
golangci-lint run
# Commit with conventional commits
git commit -m "feat(domain): add new bounded context"
# Push and create PR
git push origin feature/your-feature-name- โ Phase 1-4: Foundation, Core Domain, Steganography, Distribution
- โ Phase 5: CLI Application (fully functional)
- โ All 4 distribution patterns operational
- โ 5/7 steganography techniques production-ready
- โ Comprehensive test coverage (31/31 tests passing)
- Full-featured REST API
- Async operation support
- WebSocket progress updates
- External security audit
- Penetration testing
- Production hardening
- E2E test suite
- Performance benchmarks
- Complete user documentation
- CI/CD pipeline
- Multi-platform releases
- Docker images
Apache License 2.0 - See LICENSE for details.
This software is provided "as is" without warranty of any kind. The developers are not responsible for any misuse of this software. Shadowforge is designed for legitimate privacy and security purposes only. Always comply with applicable laws and regulations.
- Website: https://greysquirr3l.github.io/shadowforge
- GitHub: https://github.com/greysquirr3l/shadowforge
- Documentation: docs/public/cli/
- Issues: https://github.com/greysquirr3l/shadowforge/issues
- Releases: https://github.com/greysquirr3l/shadowforge/releases
Built with ๐ฎ and quantum-resistant cryptography
Last Updated: December 2025


