Logic Bomb Exposure
Metric: Sabotage Mass (Delayed Execution & Destruction)
Summary: A core Security Lens metric. Logic bombs sit dormant until a specific condition is met, at which point they execute a destructive payload. This metric hunts for condition-heavy code that ends in system halts, bailouts, or aggressive execution.
Effect: Highlights files containing highly conditional destructive commands.
The Equation: Trigger & Payload
We calculate Sabotage Mass by multiplying the "Trigger" (the conditional logic) by the "Payload" (the destructive outcome).
Step A: Define the Trigger We weigh standard branching heavily against thread-halting commands (which are often used to delay execution). $\(Trigger = branch\_hits + (halt\_hits \times 3.0)\)$
Step B: Define the Payload We look for system exits, manual memory cleanup, and dynamic execution. $\(Payload = (bailout \times 2.0) + (cleanup \times 1.5) + (danger \times 4.0)\)$
Step C: The Agentic & Hardware Shields AI orchestration and hardware bridges naturally use dynamic execution and halting. We divide the Payload by the presence of these heuristics to prevent false positives in robotics/ML repositories.
Step D: The Taint Spike If the static engine explicitly confirmed that tainted input flowed directly into an execution sink, this is an absolute vulnerability. $\(SabotageMass += (TaintedInjection \times 500.0)\)$
Step E: Sigmoid Mapping The \(SabotageMass\) is normalized against the padded LOC and mapped to the 0-100 scale using the security sigmoid curve.
🌌 Powered by the blAST Engine
This documentation is part of the GitGalaxy Ecosystem, an AST-free, LLM-free heuristic knowledge graph engine.
- 🪐 Explore the GitHub Repository for code, tools, and updates.
- 🔭 Visualize your own repository at GitGalaxy.io using our interactive 3D WebGPU dashboard.