Diagrams

Visual anchors for the model.

These are the first launch-critical diagram concepts. Their job is to make the shift, the loop, and the artifact system legible.

Source of truth

Live diagrams and Mermaid sources now move together.

Each live diagram is backed by a repo-native Mermaid source file. The Astro component is the presentation layer; the Mermaid file preserves the structural version for iteration, review, and redraw work later.

D1

Old World vs New World

Show the move from isolated findings and fragmented tooling to path-oriented, validation-driven workflow.

Source: docs/reference/diagrams/D1-old-new.mmd

Old world

Findings first

Finding
Manual interpretation
One-off synthesis
Possible exploit
New world

Paths first

Capabilities
Candidate paths
Validation + pruning
Surviving chains
D2

Primitive to Path to Validation Loop

Show the operating loop: capabilities, candidate paths, validation, pruning, and surviving chains.

Source: docs/reference/diagrams/D2-validation-loop.mmd

4 Prune and refine

Reject weak paths and keep what survives.

D5

Artifact System Map

Show how the site, thesis, posts, diagrams, walkthrough, paper, and reference surface all connect.

Source: docs/reference/diagrams/D5-artifact-system.mmd

Core Exploit-path thesis
Home
Thesis
Posts
Diagrams
Walkthrough
Reference
Paper
D3

Primitive Layer Map

Show the middle layer between weakness labels and final outcomes without pretending the taxonomy is final.

Source: docs/reference/diagrams/D3-primitive-map.mmd

Working capability families
Disclosure
Reference control
Data influence
State corruption
More capability families
Execution influence
Authorization bypass
Sphere crossing
Sequencing manipulation
Common outcomes
Sensitive data access
Privileged action
Arbitrary code execution
Cross-sphere movement
D4

Sphere Crossing and Outcome Acceleration

Show why crossing control spheres matters more than counting isolated flaws.

Source: docs/reference/diagrams/D4-sphere-crossing.mmd

User sphere Input and visible app surface

Initial foothold or weak control often begins here.

Application sphere State, references, and internal trust

Capabilities compound when the path crosses into stronger control.

Privileged sphere Secrets, admin action, or execution

Impact accelerates when a path crosses a trust boundary.