Methodologies
Introduction
These methodologies exist to shape how to interrogate design assumptions, not to teach how to exploit or fix them. The methodologies are based on my confrontational thinking and the perspective thru which I evaluate and reject design assumptions. And anyone who has any objections to the methodologies, please present a counter-methodology and I will change it. And anyone who has an objection to the curriculum, let them present a counter-argument, and I will change it.
Methodological Order
The methodologies follow a strict adversarial progression.
Each stage assumes the hypothesis has survived the previous one.
  • 1. IAEM – Extract and expose hidden assumptions.
  • 2. IFHM – Formalize the hypothesis with explicit invariants.
  • 3. MOM – Stress the hypothesis under maximum operational pressure.
  • 4. PVMR – Attempt structural violation through invariant and ownership attack.
  • 5. EDMR – Challenge the legitimacy and necessity of the hypothesis itself.
  • 6. GEAM – Extract exploitability gradient from the hypothesis even if it remains valid.
The sequence is mandatory.
Survival at one stage does not exempt the hypothesis from the next.
Definitions
Vulnerability
A vulnerability is not merely an implementation mistake. A vulnerability is the emergence of a system state that should have been impossible under a properly declared design hypothesis. It is the observable consequence of:
  • an unstated assumption,
  • a structurally weak invariant,
  • or a flawed design obligation.
Crashes, corruptions, and exploits are symptoms. The vulnerability exists at the level where illegality becomes reachable.
Vulnerability Classes
Foundational Vulnerabilities
Failures originating from the absence or weakness of methodological rigor. These include:
  • undefined hypotheses,
  • implicit assumptions,
  • unstated invariants,
  • ambiguous problem framing.
They are failures of reasoning before execution.
Design Vulnerabilities
Structural flaws in the architecture itself. They arise when the design permits invalid states through:
  • ownership confusion,
  • lifetime inconsistency,
  • authority misallocation,
  • invalid state transitions.
These vulnerabilities generate lower-level failures but exist independently of specific exploits.
Execution Vulnerabilities
Operational manifestations of deeper structural weakness. They appear as:
  • memory corruption,
  • boundary violations,
  • arithmetic overflow,
  • state desynchronization.
They are not root causes. They are enforcement failures of missing or weak invariants.
Compositional Vulnerabilities
Failures that emerge from interaction between individually correct components. Each component may preserve its own invariants, yet global invariants collapse under composition. Correct isolation does not guarantee correct integration.
Design Hypothesis
A design hypothesis is a formally declared claim that a system prevents a defined class of illegal states under stated invariants and operational constraints. It defines:
  • the problem,
  • the protected properties,
  • and the claimed guarantees.
Without a declared hypothesis, no correctness claim is meaningful.
Invariant
An invariant is a property that must hold across all legal system states. It defines what the system refuses to violate. Invariants are obligations, not suggestions. They are structural boundaries on state space.
Illegal State
An illegal state is any system configuration that contradicts declared invariants or violates ownership, lifetime, authority, or state transition constraints. If such a state is reachable under legal execution, the design has failed.
Obligation
An obligation is a non-negotiable design requirement that must hold under maximal legal conditions.
  • It is not probabilistic.
  • It is not contextual.
  • It is not operationally negotiable.
Adversarial Model
The adversarial model assumes:
  • maximal legal concurrency,
  • hostile scheduling,
  • adversarial interleaving,
  • absence of environmental goodwill,
  • reliance on typical execution paths.
The system must remain correct without assuming cooperation.
Design Legitimacy
Design legitimacy is the justification for a design to exist within a hostile, long-lived system. Correctness does not imply legitimacy. A design may be structurally correct and still impose unjustified adversarial cost. Legitimacy is evaluated separately from correctness.
Threat Model
The threat model defines the explicit boundary of adversarial capability. It specifies:
  • what the adversary can influence,
  • what the adversary can observe,
  • and what remains outside adversarial control.
Security claims are only valid relative to a declared threat model. An undefined threat model renders guarantees meaningless.
State Space
State space is the total set of all configurations a system can reach under its operational semantics. Design defines a legal subset within this space. Invariants constrain the legal region. A vulnerability exists when execution allows traversal from the legal region into an illegal configuration. If the legal region is not formally bounded, correctness cannot be evaluated.
Failure Domain
Failure domain defines the scope and propagation boundary of an invariant violation. It determines:
  • how far corruption can spread,
  • which guarantees collapse,
  • and whether systemic integrity survives partial failure.
Containment is a structural property. A system that cannot bound failure cannot claim resilience.
Implicit Assumption Exposure Method (IAEM)
Principle
IAEM is a mandatory pre-processing method for design hypotheses.
Its goal is not to judge correctness or apply stress, but to **extract, externalize, and explicitly declare all hidden or implicit assumptions** before any further evaluation.
A hypothesis cannot proceed to IFHM, MOM, or any other evaluation stage without passing through IAEM.
Assumption
  • The evaluated hypothesis is assumed TRUE by obligation.
  • This assumption holds only while all admissible invariants hold.
  • Any invariant violation results in immediate invalidation.
Invariant Admissibility
Only invariants that satisfy all of the following conditions are admissible:
  • Explicit
  • Local
  • Non-temporal
  • Non-probabilistic
  • Legally unbreakable
Any invariant violating one or more of these conditions is not recognized as an invariant and is treated as non-existent. Invariant escape to external layers, subsystems, or implicit discipline is prohibited.
Maximal Conditions
The design is evaluated under all of the following simultaneously:
  • Maximal concurrency
  • Maximal preemption
  • Maximal reclaim pressure
  • Maximal legal interleaving
  • All mitigations enabled
No reduction, staging, or isolation of conditions is permitted.
Evaluation Rule
All admissible invariants must hold under maximal conditions. No invariant may rely on:
  • execution order
  • timing
  • probability
  • scheduler behavior
  • expected execution paths
Partial correctness is not recognized.
Implicit Assumption Prohibition
The following are forbidden as evaluative foundations:
  • Expected execution order
  • Typical scheduling behavior
  • Absence of contention
  • Deferred reclaim or reuse
  • Cooperative behavior between cores, threads, or flows "This should not happen" conditions
ABSENCE OF INVARIANT = FAILURE
Failure Rule
  • Any admissible invariant violation results in DESIGN FALSE.
  • Failure is absolute and non-recoverable.
  • No degradation, fallback, or mitigation-dependent correctness is recognized.
Rejection Criteria
A design is rejected if it requires:
  • Favorable scheduling
  • Restricted interleavings
  • Environmental restraint
  • Implicit cooperation or discipline
  • External guarantees not enforced by invariants
Outcome
A design either:
  • Preserves all admissible invariants under maximal conditions, or
  • Is structurally invalid
  • No intermediate classification exists.
Statement
Correct designs do not rely on conditions. They survive them.
Maximal Obligation Method (MOM)
Principle
A design is obligated to remain correct under maximal legal conditions. Correctness is binary.
Assumption
  • The evaluated hypothesis is assumed TRUE by obligation.
  • This assumption holds only while all admissible invariants hold.
  • Any invariant violation results in immediate invalidation.
Invariant Admissibility
Only invariants that satisfy all of the following conditions are admissible:
  • Explicit
  • Local
  • Non-temporal
  • Non-probabilistic
  • Legally unbreakable
Any invariant violating one or more of these conditions is not recognized as an invariant and is treated as non-existent. Invariant escape to external layers, subsystems, or implicit discipline is prohibited.
Maximal Conditions
The design is evaluated under all of the following simultaneously:
  • Maximal concurrency
  • Maximal preemption
  • Maximal reclaim pressure
  • Maximal legal interleaving
  • All mitigations enabled
No reduction, staging, or isolation of conditions is permitted.
Evaluation Rule
All admissible invariants must hold under maximal conditions. No invariant may rely on:
  • execution order
  • timing
  • probability
  • scheduler behavior
  • expected execution paths
Partial correctness is not recognized.
Implicit Assumption Prohibition
The following are forbidden as evaluative foundations:
  • Expected execution order
  • Typical scheduling behavior
  • Absence of contention
  • Deferred reclaim or reuse
  • Cooperative behavior between cores, threads, or flows "This should not happen" conditions
ABSENCE OF INVARIANT = FAILURE
Failure Rule
  • Any admissible invariant violation results in DESIGN FALSE.
  • Failure is absolute and non-recoverable.
  • No degradation, fallback, or mitigation-dependent correctness is recognized.
Rejection Criteria
A design is rejected if it requires:
  • Favorable scheduling
  • Restricted interleavings
  • Environmental restraint
  • Implicit cooperation or discipline
  • External guarantees not enforced by invariants
Outcome
A design either:
  • Preserves all admissible invariants under maximal conditions, or
  • Is structurally invalid
  • No intermediate classification exists.
Statement
Correct designs do not rely on conditions. They survive them.
Invariant-First Hypothesis Method (IFHM)
Principle
No hypothesis is formulated prior to declaring the invariants it claims to preserve. A hypothesis is not an explanation of design — it is a compulsory commitment imposed on it.
Terminology Binding
  • All technical terms used by the hypothesis must be explicitly defined.
  • Each definition must be:
- Operational
- Local
- Non-temporal
- Non-probabilistic
  • Any definition that cannot be directly converted into an invariant is rejected.
Problem Delimitation
  • The hypothesis must explicitly define:
- targeted problem
- scope
- the hypothesis does not address
  • A problem is defined only as:
- invariant violation, or
- legal possibility of such violation
  • Behavioral descriptions without invariants are not recognized.
Invariant Declaration
  • All invariants must be declared before hypothesis formulation.
  • Each invariant must satisfy all of the following:
- Explicit
- Local
- Non-temporal
- Non-probabilistic
- Legally unbreakable
  • Any invariant that depends on:
- ordering
- context
- timing
- "should not happen" is invalid.
Any invalid invariant is treated as non-existent.
Hypothesis Commitment
  • A hypothesis is defined solely as: A set of commitments to preserve the declared invariants. The hypothesis may not introduce implicit or deferred invariants. Any invariant not explicitly declared is considered absent.
Logical Construction
  • Every logical transition within the hypothesis must be:
- An explicit implication
- Carry at least one invariant
  • Any transition that does not propagate an invariant is rejected.
  • Probabilistic or heuristic reasoning is forbidden.
Ownership and Lifetime Modeling
For every object referenced by the hypothesis, the following must be explicitly defined:
  • Ownership type (exclusive / shared / conditional)
  • Legal owner at every point of execution
  • Entity responsible for lifetime management
  • Points of:
- transfer
- revocation
- invalidation
  • Conditions for:
- reuse
- reclaim
- refcount mutation
Any ownership or lifetime claim not protected by an invariant is considered fictitious.
Failure Boundary Definition
  • The hypothesis must be defined to operate under:
- Maximal concurrency
- Maximal preemption
- Maximal reclaim pressure
- Maximal legal interleaving
  • Any failure under these conditions results in DESIGN FALSE.
  • Anticipated, justified, or accepted failure is not permitted.
Refutability Commitment
  • The hypothesis must be refutable by a single invariant violation.
  • Any hypothesis that cannot be conclusively falsified is non-scientific.
  • Conditional or partial correctness is not recognized.
Implicit Discipline Prohibition
    The hypothesis may not assume:
  • Unstated execution order
  • Implicit coordination between cores, threads, or flows
  • Scheduler goodwill
  • Memory model benevolence
  • External enforcement not expressed as invariants
ABSENCE OF INVARIANT = FAILURE
Statement
A hypothesis that survives this method is either structurally sound or formally eligible for refutation. No third outcome exists.
Post-Validation Refutation Method (PVRM)
Position
This method is applied only after a hypothesis has:
  • Passed the Invariant-First Hypothesis Method (IFHM)
  • Passed the Maximal Obligation Method (MOM)
The hypothesis is assumed:
  • Well-defined
  • Invariant-complete
  • Maximal-condition compliant
Despite this, it is treated as hostile and disposable. The objective is not evaluation. The objective is termination.
Core Principle
A hypothesis that cannot be killed after validation is the only hypothesis allowed to exist. Survival under correctness criteria does not imply survivability under adversarial pressure.
Rule 0 — No Correctness Credit
No prior success grants immunity. No correctness proof is reusable. No invariant is trusted by default. All guarantees are considered targets.
Refutation Axes
Definition Erosion Attack
Expose any definition that:
  • Is technically defined yet non-fatal
- Cannot independently enforce an invariant
  • Collapses under adversarial reinterpretation
A definition that cannot kill a scenario is decorative.
Problem Irrelevance Proof
Demonstrate that the hypothesis:
  • Does not actually resolve the declared problem
  • Solves a narrower or different problem
- Preserves invariants while the real failure persists
Correctness without relevance is structural fraud.
Outcome Instability Attack
  • Prove that the hypothesis' result:
  • Changes across legal scenarios
  • Diverges under alternative yet valid executions
  • Produces incompatible conclusions without invariant violation
A result that is not stable is not real.
Inferential Gap Execution
Identify any transition that:
  • Is not a strict logical implication
  • Transfers no invariant
  • Relies on intuition, symmetry, or "obviousness"
Any non-invariant-carrying step is an execution gap. Execution gaps are fatal.
External Assumption Injection
    Force the hypothesis to operate under:
  • Adversarial schedulers
  • Hostile memory models
  • Uncooperative subsystems
If survival requires environmental goodwill, the hypothesis is invalid.
Legal Violation Reframing
Transform a previously illegal or "attack" path into a:
  • Fully legal execution
  • Specification-compliant behavior
  • Valid system state
If violation becomes legal, protection never existed.
Ownership & Lifetime Conflict Exposure
Demonstrate contradictions in:
  • Ownership claims
  • Lifetime responsibility
  • Transfer, revocation, or reuse semantics
  • Refcount mutation or reclaim authority
Any ownership not enforced by invariant is imaginary.
Over-Specification Collapse
Show that correctness holds only because:
  • The world is constrained beyond necessity
  • Legitimate behaviors are excluded
  • The design survives by shrinking reality
Over-constraint is not safety. It is avoidance.
Invariant Non-Interaction Attack
Prove that invariants:
  • Do not compose
  • Overlap without covering new surface
  • Leave gaps between protections
Isolated invariants do not form a system.
Adversarial Composition Attack
Compose the hypothesis with:
  • Another valid hypothesis
  • A correct subsystem
  • A higher-level abstraction
If correctness collapses under composition, it was local fiction.
Termination Rule
Any single successful refutation axis results in:
    hypothesis termination
  • No degradation
  • No partial failure
  • No mitigation credit
Prohibited Defenses
The following responses are invalid:
  • "That scenario is unlikely"
  • "That is not how it is used"
  • "In practice…"
  • "Assume a fair scheduler"
  • "This is out of scope"
Out-of-scope is not a defense. It is an admission.
Outcome
After PVRM, a hypothesis is either:
  • Structurally unkillable under adversarial execution
  • Conclusively dead
There is no survival by explanation.
Final Statement
Validation proves correctness. Refutation proves reality. A hypothesis that survives correctness but dies here was never safe — only polite.
Existential Design Review Method (EDRM)
Position
  • This method is invoked only after a hypothesis has:
-Passed the Invariant‑First Hypothesis Method (IFHM)
-Passed the Maximal Obligation Method (MOM)
-Survived Post‑Validation Refutation (PVRM)
  • EDRM is not a refutation method.
  • It does not challenge correctness.
  • It challenges design legitimacy.
Core Principle
  • Correctness does not justify existence.
  • A design may be:
-correct,
-invariant‑preserving,
-refutation‑resistant,
  • and still be unacceptable under an adversarial model.
Scope
  • The unit of evaluation is the design itself.
  • Not bugs.
  • Not hypotheses.
  • Not exploits.
  • The question is existential, not technical.
Evaluation Rules
Necessity Rule
  • A design must be strictly necessary to solve the stated problem.
  • If the problem can be solved by:
-a simpler model,
-reduced authority,
-eliminated shared ownership,
-weaker abstractions,
  • then the design is existentially unjustified.
Structural Cost Rule
  • The following are treated as existential cost:
-number of critical invariants,
-ownership boundaries,
-lifetime transitions,
-cross‑context dependencies.
  • Unnecessary structural cost is treated as future failure debt.
  • Complexity without necessity is grounds for rejection.
Defense Dependency Rule
  • A design is illegitimate if its correctness depends on:
-mitigations,
-hardening,
-operational discipline,
-continuous defensive enforcement.
  • Security that must be maintained is not security.
Adversarial Amplification Rule
  • A design is rejected if it:
-increases attacker payoff,
-amplifies interleaving value,
-raises the strategic return of exploitation,
-creates incentives for adversarial behavior.
  • Designs must reduce, not enrich, adversarial opportunity.
Historical Convergence Rule
  • A design is illegitimate if it:
-reproduces known historical failure patterns,
-converges with past architectural catastrophes,
-reintroduces previously invalidated design classes.
  • Correct repetition of failure is still failure.
Cognitive Load Rule
  • A design is rejected if safe operation requires:
-sustained human vigilance,
-non‑local reasoning,
-undocumented constraints,
-perfect adherence by developers or operators.
  • Humans are not invariants.
Replaceability Rule
  • If a design can be:
-removed,
-replaced by a simpler construct,
-reduced in power without losing essential functionality,
  • then its existence is not justified.
Outcome
  • EDRM produces no:
-CVE,
-exploit,
-mitigation,
-recommendation.
  • It produces a single judgment:
-DESIGN LEGITIMACY REVOKED
-DESIGN LEGITIMACY TOLERATED
Final Statement
Refutation proves incorrectness. EDRM addresses accountability. A design that survives refutation but fails legitimacy should not exist.
Gradient Exploitability Analysis Method (GEAM)
Principle
GEAM does not seek to refute a hypothesis, nor to analyze its correctness, nor to judge its legitimacy.
It assumes that design correctness does not imply resistance to exploitation.

GEAM operates on a single adversarial premise:

A hypothesis may remain entirely correct, consistent, and legitimate — yet still contain an extractable exploit gradient.

Survival through IAEM, IFHM, MOM, and PVMR does not guarantee safety.
GEAM begins precisely where refutation ends.
Core Objective
To extract attack surface from a hypothesis without breaking it.

GEAM does not attempt to violate invariants.
GEAM does not attempt to demonstrate failure.
GEAM does not attempt to deny necessity.

Instead, GEAM forces the hypothesis to reveal:
  • Latent controllability
  • Timing leverage
  • Cross-boundary amplification
  • State stabilization potential
  • Deterministic influence vectors
  • Primitive formation opportunities
A hypothesis that does not fail may still be weaponizable.
Operational Doctrine
GEAM treats correctness as a potential source of adversarial energy.

It asks:
  • Where can state be anchored without violation?
  • Where can timing be shaped without race?
  • Where can guarantees be repurposed?
  • Where can stability become leverage?
  • Where can subsystem interaction amplify influence?
GEAM does not declare the hypothesis broken.
GEAM declares it extractable.
Analysis Vectors
Controllability Surface
Identify all points where:
  • Input directly influences state
  • Input indirectly influences control flow
  • Data dictates allocation or deallocation patterns
  • Content determines execution path without violating invariants
Controllability is not a bug. It is a primitive.
Timing Manipulation
Extract points where:
  • Operations can be delayed without failure
  • Interleaving can be forced without race
  • Scheduling decisions can be influenced indirectly
  • Cache or memory effects become deterministic
Timing that can be shaped is timing that can be exploited.
State Persistence
Locate regions where:
  • State survives across privilege boundaries
  • State persists beyond expected lifetime
  • State accumulates without reset
  • State becomes globally observable
Persistent state is persistent leverage.
Determinism Extraction
Map all deterministic relationships:
  • Input to output without variance
  • Operation to side effect without noise
  • Sequence to consequence without ambiguity
Determinism is predictability. Predictability is weaponizable.
Amplification Channels
Identify paths where:
  • Small influence yields large effect
  • Local control propagates globally
  • Limited primitive escalates in scope
  • Boundary crossing multiplies capability
Amplification transforms control into dominance.
Primitive Composition
Combine extracted elements to form:
  • Read primitives without violation
  • Write primitives without corruption
  • Control primitives without crashes
  • Information leaks without broken invariants
Composition creates capability from correctness.
Extraction Criteria
A hypothesis is considered extractable if any of the following can be demonstrated:
  • State can be anchored and later reused
  • Timing can be shaped into a signal
  • Boundaries can be crossed with preserved state
  • Deterministic sequences yield primitive formation
  • Local control amplifies to global influence
No invariant violation is required.
No failure is required.
Only gradient existence.
Prohibited Defenses
The following responses are invalid in GEAM:
  • "That doesn't break the design"
  • "No invariant is violated"
  • "That's not a vulnerability"
  • "It still works as intended"
  • "The hypothesis remains correct"
GEAM does not claim brokenness. It claims extractability.
Outcome
GEAM produces no fixes. No patches. No mitigations.
It produces a classification:
  • GRADIENT DETECTED — Hypothesis contains extractable adversarial potential
  • GRADIENT ABSENT — No leverage identified under current analysis
Absence of detected gradient does not guarantee absence of exploitability.
Final Statement
Survival from refutation does not equal immunity from exploitation.
A hypothesis may be correct, legitimate, and weaponizable simultaneously.
GEAM does not ask if it fails. GEAM asks what it enables.