Ghidra, upgraded into an evidence-backed autonomous reverse engineering platform.
What Reverend Does · Technology Advances Shipped · Architecture · Run Locally
Reverend keeps upstream Ghidra compatibility and adds the missing control plane for serious agent-assisted reversing:
- Policy-guarded agent execution (capabilities, scope limits, egress controls)
- Evidence-backed semantic query and triage workflows
- Proposal/review/apply lifecycle with receipts, audits, and rollback primitives
- Deterministic gate stack for CI + local operator confidence
- Kernel-native backlog/workcell orchestration for continuous autonomous delivery
| Area | What We Added | Key Implementation |
|---|---|---|
| Security control plane | Capability tokens, policy modes (OFFLINE, ALLOWLIST, CLOUD), violation/audit event model |
ghidra.security.capability.*, ghidra.security.policy.*, ghidra.security.audit.* |
| Proposal lifecycle | Typed proposals, review transitions, transaction context, apply/rollback receipts | ghidra.security.proposal.* |
| Query engine | Index-first semantic/similarity retrieval with bounded refinement and embedding-stage support | Ghidra/Features/Reverend/.../query/LiveQueryServiceImpl.java |
| Cockpit UX | Mission-to-proposal flow, evidence drilldown drawer, jump-to-evidence navigation | Ghidra/Features/Reverend/.../cockpit/* |
| Evidence fabric | Canonical evidence graph schema + migration docs + receipt-chain integrity | docs/schemas/evidence-graph.schema.json, scripts/ml/receipt_store.py |
| Kernel integrity | Completion anomaly guard, merge-conflict canonicalization, deterministic gate enforcement | scripts/cyntra/cyntra.sh, scripts/cyntra/completion-anomaly-guard.py, scripts/cyntra/gates.sh |
flowchart LR
A["Binary + Analyst Intent"] --> B["Ghidra Core Analysis"]
B --> C["Indexed Query + Similarity Engine"]
C --> D["Reverend Cockpit Mission Flow"]
D --> E["Proposal + Review + Apply"]
E --> F["Apply and Rollback Receipts"]
E --> G["Audit + Violation Records"]
C --> H["Evidence Graph + Corpus Artifacts"]
F --> H
I["Capability + Policy Guardrails"] --> C
I --> D
J["Cyntra Kernel + Gate Stack"] --> C
J --> D
J --> H
- Java 21 (
java -versionandjavac -version) - Python 3.11+
- Gradle wrapper (
./gradlew)
# Prepare dependencies/toolchain
./gradlew -I gradle/support/fetchDependencies.gradle
scripts/cyntra/preflight.sh
# Core security + Reverend module compile/test
./gradlew --no-daemon :Generic:compileJava :Generic:test --tests "ghidra.security.*"
./gradlew --no-daemon :Reverend:compileJava :Reverend:test --tests "ghidra.reverend.*"
# Deterministic gate stack
bash scripts/cyntra/gates.sh --mode=all
# Roadmap/evidence parity checks
scripts/cyntra/validate-roadmap-completion.sh
# Build distribution
./gradlew --no-daemon buildGhidrascripts/cyntra/bootstrap.sh
scripts/cyntra/run-once.sh
scripts/cyntra/run-watch.sh
scripts/cyntra/cyntra.sh statusOperational runbook: docs/cyntra-kernel-runbook.md
Operator workflow guide: docs/operator-reviewer-runbook.md
Ghidra/- Upstream-compatible platform code plus Reverend features/pluginsscripts/cyntra/- Preflight, gates, backlog orchestration, dispatch wrappersscripts/ml/- Retrieval, receipt store, corpus sync, benchmarking helperseval/- Smoke/soak/regression tooling and reportsdocs/- Architecture, roadmap, research, evidence, decisions.beads/- Epics/stories/dependencies for kernel scheduling
docs/deep-research-report.mddocs/research/INDEX.mddocs/e9-frontier-roadmap.mddocs/e13-e19-frontier-ga-roadmap.mddocs/audit-remediation-sota-operational-roadmap.mddocs/exit-gate-report.mddocs/go-no-go-decision.md
