Introduction
These methodologies exist to shape how to interrogate design assumptions, not to teach how to exploit or fix them. The methodologies are based on my confrontational thinking and the perspective thru which I evaluate and reject design assumptions.
And anyone who has any objections to the methodologies, please present a counter-methodology and I will change it.
And anyone who has an objection to the curriculum, let them present a counter-argument, and I will change it.
Methodological Order
The methodologies follow a strict adversarial progression.
Each stage assumes the hypothesis has survived the previous one.
- 1. IAEM – Extract and expose hidden assumptions.
- 2. IFHM – Formalize the hypothesis with explicit invariants.
- 3. MOM – Stress the hypothesis under maximum operational pressure.
- 4. PVMR – Attempt structural violation through invariant and ownership attack.
- 5. EDMR – Challenge the legitimacy and necessity of the hypothesis itself.
- 6. GEAM – Extract exploitability gradient from the hypothesis even if it remains valid.
The sequence is mandatory.
Survival at one stage does not exempt the hypothesis from the next.
Definitions
Vulnerability
A vulnerability is not merely an implementation mistake.
A vulnerability is the emergence of a system state that should have been impossible under a properly declared design hypothesis.
It is the observable consequence of:
- an unstated assumption,
- a structurally weak invariant,
- or a flawed design obligation.
Crashes, corruptions, and exploits are symptoms.
The vulnerability exists at the level where illegality becomes reachable.
Vulnerability Classes
Foundational Vulnerabilities
Failures originating from the absence or weakness of methodological rigor.
These include:
- undefined hypotheses,
- implicit assumptions,
- unstated invariants,
- ambiguous problem framing.
They are failures of reasoning before execution.
Design Vulnerabilities
Structural flaws in the architecture itself.
They arise when the design permits invalid states through:
- ownership confusion,
- lifetime inconsistency,
- authority misallocation,
- invalid state transitions.
These vulnerabilities generate lower-level failures but exist independently of specific exploits.
Execution Vulnerabilities
Operational manifestations of deeper structural weakness.
They appear as:
- memory corruption,
- boundary violations,
- arithmetic overflow,
- state desynchronization.
They are not root causes.
They are enforcement failures of missing or weak invariants.
Compositional Vulnerabilities
Failures that emerge from interaction between individually correct components.
Each component may preserve its own invariants,
yet global invariants collapse under composition.
Correct isolation does not guarantee correct integration.
Design Hypothesis
A design hypothesis is a formally declared claim that a system prevents a defined class of illegal states under stated invariants and operational constraints.
It defines:
- the problem,
- the protected properties,
- and the claimed guarantees.
Without a declared hypothesis, no correctness claim is meaningful.
Invariant
An invariant is a property that must hold across all legal system states.
It defines what the system refuses to violate.
Invariants are obligations, not suggestions.
They are structural boundaries on state space.
Illegal State
An illegal state is any system configuration that contradicts declared invariants or violates ownership, lifetime, authority, or state transition constraints.
If such a state is reachable under legal execution, the design has failed.
Obligation
An obligation is a non-negotiable design requirement that must hold under maximal legal conditions.
- It is not probabilistic.
- It is not contextual.
- It is not operationally negotiable.
Adversarial Model
The adversarial model assumes:
- maximal legal concurrency,
- hostile scheduling,
- adversarial interleaving,
- absence of environmental goodwill,
- reliance on typical execution paths.
The system must remain correct without assuming cooperation.
Design Legitimacy
Design legitimacy is the justification for a design to exist within a hostile, long-lived system.
Correctness does not imply legitimacy.
A design may be structurally correct and still impose unjustified adversarial cost.
Legitimacy is evaluated separately from correctness.
Threat Model
The threat model defines the explicit boundary of adversarial capability.
It specifies:
- what the adversary can influence,
- what the adversary can observe,
- and what remains outside adversarial control.
Security claims are only valid relative to a declared threat model.
An undefined threat model renders guarantees meaningless.
State Space
State space is the total set of all configurations a system can reach under its operational semantics.
Design defines a legal subset within this space.
Invariants constrain the legal region.
A vulnerability exists when execution allows traversal from the legal region into an illegal configuration.
If the legal region is not formally bounded, correctness cannot be evaluated.
Failure Domain
Failure domain defines the scope and propagation boundary of an invariant violation.
It determines:
- how far corruption can spread,
- which guarantees collapse,
- and whether systemic integrity survives partial failure.
Containment is a structural property.
A system that cannot bound failure cannot claim resilience.