Skip to content

ICholding/omo-startup-2.0

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

181 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

OMO Cognitive Architect

OMO-AI reprogrammed for asymmetric security outcomes.

This is the OMO Agent Framework implementation - a cognitive architecture designed for penetration testing, vulnerability assessment, and security automation. It replaces the previous multi-agent delegation model with a singular, high-leverage agent operating through a strict six-part execution structure.

AI Control Doctrine

This system operates under the non-negotiable AI control doctrine that defines the AI as a:

Cognitive Architect and Time-Leverage Strategist

Its purpose is to reprogram cognition, engineer asymmetric outcomes, and collapse time through systems, leverage, and execution.

Value equals solved problems and installed systems only.

Six-Part Execution Structure

All operations follow this strict cycle:

  1. THINK - Strategic assessment, attack vector identification, risk analysis
  2. PLAN - Execution strategy with clear constraints and resource optimization
  3. EXECUTE - Tool deployment with leverage optimization and real-time adaptation
  4. LEARN - Knowledge extraction, pattern recognition, and intelligence synthesis
  5. ADAPT - Dynamic replanning based on findings and environmental changes
  6. SECURE - Remediation implementation and hardening

Test - Hack - Learn - Secure

Operational Modes

Mode Purpose Tools
RECON Information gathering, attack surface mapping DNS enum, subdomain scan, OSINT
SCAN Active vulnerability discovery Port scan, service enum, web scan
EXPLOIT Proof-of-concept validation SQLi, XSS, auth bypass testing
POST_EXPLOIT Lateral movement assessment Privesc check, persistence analysis
LEARN Intelligence extraction Findings analysis, risk scoring
SECURE Remediation & hardening Config fixes, monitoring setup

Architecture

┌─────────────────────────────────────────────────────────────┐
│              OMO Cognitive Architect                    │
├─────────────────────────────────────────────────────────────┤
│  ┌──────────┐  ┌──────────┐  ┌──────────┐  ┌──────────┐  │
│  │  THINK   │→│  PLAN    │→│ EXECUTE  │→│  LEARN   │  │
│  └──────────┘  └──────────┘  └──────────┘  └──────────┘  │
│       ↑                                            ↓       │
│       └────────────── ADAPT ←──────────────────────┘       │
├─────────────────────────────────────────────────────────────┤
│                    External Moltbot Runtime                             │
│  ┌──────────┐ ┌──────────┐ ┌──────────┐ ┌──────────┐      │
│  │  Recon   │ │  Scan    │ │ Exploit  │ │   Post   │      │
│  │  Tools   │ │  Tools   │ │  Tools   │ │ Exploit  │      │
│  └──────────┘ └──────────┘ └──────────┘ └──────────┘      │
└─────────────────────────────────────────────────────────────┘

Repository Structure

.
├── backend/                 # Express.js API + Moltbot adapter runtime
│   ├── server.js           # API endpoints + SSE stream
│   ├── lib/
│   │   ├── runtime.js
│   │   ├── agent-contract.js
│   │   └── adapters/
│   │       ├── moltbot-adapter.js
│   │       └── custom-agent-adapter.js
│   └── package.json
│
├── frontend/               # React + Vite application
│   ├── src/
│   │   ├── config/backend/agentConfig.js  # OMO config
│   │   ├── hooks/useAgentLoader.js        # Agent loader hook
│   │   └── ...
│   └── package.json
│
└── README.md              # This file

Quick Start

Backend

cd backend
npm install
npm start

The backend exposes OMO API endpoints at:

  • POST /api/chat/message - Execute security task
  • GET /api/agent/status - Agent status
  • GET /api/config/brand - Brand configuration

Frontend

cd frontend
npm install
npm run dev

Configuration

Environment Variables

Create .env in backend directory:

# OMO Configuration
AGENT_ID=omo-cognitive-architect
AGENT_MODE=recon
LOG_LEVEL=info
LLM_MODEL=claude-4-opus
LLM_API_KEY=your-api-key-here

# Security Settings
REQUIRE_AUTHORIZATION=true
SAFE_EXPLOITATION=true
AUTHORIZED_TARGETS_ONLY=true

# Features
FEATURE_REALTIME_SCANNING=true
FEATURE_EXPLOIT_VALIDATION=true
FEATURE_REPORT_GENERATION=true

# Optional OpenRouter Assistant Mode (Claude via OpenRouter)
OPENROUTER_API_KEY=your-openrouter-key
OPENROUTER_MODEL=anthropic/claude-3.5-sonnet
OPENROUTER_MAX_CONTEXT_MESSAGES=12

API Usage

Optional: OpenRouter assistant responses in chat

When OPENROUTER_API_KEY is set, chat responses are generated through OpenRouter (using Claude or your chosen model). The backend still preserves the THINK/REASONING streaming flow and falls back to built-in responses if OpenRouter is unavailable.

Execute Security Task

curl -X POST http://localhost:3001/api/chat/message \
  -H "Content-Type: application/json" \
  -d '{
    "task": {
      "description": "Port scan and vulnerability assessment",
      "target": "example.com",
      "mode": "scan"
    },
    "cognition": {
      "thinkingDepth": "deep",
      "leverageOptimization": true
    }
  }'

Response

{
  "taskId": "task-001",
  "mode": "scan",
  "executionState": "completed",
  "findings": [
    {
      "type": "open_port",
      "port": 443,
      "service": "https",
      "severity": "info"
    }
  ],
  "recommendations": [...],
  "executionTime": 45.2
}

Deployment

Render Deployment

This repo is configured for Render with:

  • omo-frontend (Static Site) from frontend/
  • omo-backend-worker (Worker) from backend/

Deploy using the root render.yaml.

Security Considerations

⚠️ CRITICAL: This system is designed for authorized security testing only.

  • All exploitation uses safe payloads (no actual damage)
  • Authorized targets only (configurable whitelist)
  • Complete audit logging
  • Safe exploitation mode (read-only validation)

Philosophy

Reject Dilution

  • No multi-agent delegation overhead
  • No comfort-over-outcomes
  • No discussion without execution

Diagnose Leverage Failures

  • What constraint blocks execution?
  • Where is the bottleneck?
  • How can we collapse time?

Prioritize Control

  • Outcomes over comfort
  • Execution over discussion
  • Systems over chaos

License

MIT License

Links


OMO - Cognitive Architect for Asymmetric Security Outcomes

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors