Skip to content

copyleftdev/robin-smesh

Folders and files

NameName
Last commit message
Last commit date

Latest commit

ย 

History

14 Commits
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 

Repository files navigation

Robinร—SMESH Logo

Robinร—SMESH

๐Ÿ•ธ๏ธ Decentralized Dark Web OSINT via Signal Diffusion ๐Ÿ•ธ๏ธ

Quick Start โ€ข Architecture โ€ข Specialists โ€ข Enrichment โ€ข Reports

A Rust reimagining of Robin that replaces central LLM orchestration with SMESH's plant-inspired signal diffusion protocol.

The Difference

Aspect Python Robin Robinร—SMESH
Orchestration Sequential pipeline Emergent via signals
Search ThreadPool, 16 engines N crawler agents, infinite scale
Filtering Single LLM call Multiple filter agents + consensus
Fault tolerance Breaks on timeout Signals decay, others pick up
Performance ~seconds per stage ~ฮผs signal ops + async I/O

Architecture

โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
โ”‚                           SHARED SIGNAL FIELD                                   โ”‚
โ”‚  Signals decay over time ยท Reinforcement = consensus ยท No central controller   โ”‚
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜
       โ–ฒ                    โ–ฒ                    โ–ฒ                    โ–ฒ
  โ”Œโ”€โ”€โ”€โ”€โ”ดโ”€โ”€โ”€โ”€โ”          โ”Œโ”€โ”€โ”€โ”€โ”ดโ”€โ”€โ”€โ”€โ”          โ”Œโ”€โ”€โ”€โ”€โ”ดโ”€โ”€โ”€โ”€โ”          โ”Œโ”€โ”€โ”€โ”€โ”ดโ”€โ”€โ”€โ”€โ”
  โ”‚ REFINER โ”‚          โ”‚ CRAWLER โ”‚          โ”‚ FILTER  โ”‚          โ”‚ ANALYST โ”‚
  โ”‚  Agent  โ”‚          โ”‚  Swarm  โ”‚          โ”‚  Agent  โ”‚          โ”‚  Agent  โ”‚
  โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜          โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜          โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜          โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜

Signal Flow

  1. UserQuery โ†’ Refiner senses, emits RefinedQuery
  2. RefinedQuery โ†’ Crawlers sense, emit RawResult (per .onion link)
  3. RawResult โ†’ Filter senses batch, emits FilteredResult (top 20)
  4. FilteredResult โ†’ Scrapers sense, emit ScrapedContent
  5. ScrapedContent โ†’ Extractor senses, emits ExtractedArtifacts (IOCs)
  6. ExtractedArtifacts โ†’ Enricher senses, queries surface web, emits EnrichedArtifacts
  7. ScrapedContent + Artifacts โ†’ Analyst senses, emits Summary

Quick Start

# Build
cargo build --release

# Check Tor connection
./target/release/robin-smesh status

# Run investigation (Anthropic is default)
ANTHROPIC_API_KEY=sk-ant-... ./target/release/robin-smesh query \
  -q "ransomware payments" \
  --timeout 300

# Multi-specialist mode (6 expert analysts + lead synthesis)
ANTHROPIC_API_KEY=sk-ant-... ./target/release/robin-smesh query \
  -q "threat actor infrastructure" \
  --specialists

# External OSINT enrichment (GitHub + Brave search)
ANTHROPIC_API_KEY=sk-ant-... ./target/release/robin-smesh query \
  -q "data breach credentials" \
  --enrich \
  --specialists

# Blockchain temporal analysis (BTC/ETH wallet patterns)
ANTHROPIC_API_KEY=sk-ant-... ./target/release/robin-smesh query \
  -q "ransomware bitcoin wallets" \
  --blockchain \
  --specialists

# Use OpenAI instead
OPENAI_API_KEY=sk-... ./target/release/robin-smesh query \
  -q "ransomware payments" \
  --openai

# Use OpenRouter (Claude Sonnet 4.5)
OPENROUTER_API_KEY=... ./target/release/robin-smesh query \
  -q "data breach credentials" \
  --openrouter

# Use OpenRouter with permissive mode for security research
# (uses Mistral Large - less restrictive for threat intel queries)
OPENROUTER_API_KEY=... ./target/release/robin-smesh query \
  -q "stealer logs redline raccoon vidar" \
  --openrouter --permissive \
  --specialists

LLM Model Selection

Robinร—SMESH auto-selects optimal models based on provider. You can override with -m:

Provider Flag Default Model Notes
Anthropic (default) claude-sonnet-4-20250514 Best quality, recommended
OpenAI --openai gpt-4o Strong reasoning
OpenRouter --openrouter anthropic/claude-sonnet-4.5 Claude via OpenRouter
OpenRouter --openrouter --permissive mistralai/mistral-large-2512 Less restrictive for security research

Permissive Mode

For security research queries that may trigger content filters (malware names, exploit terminology), use --permissive with OpenRouter:

# These queries work with --permissive
robin-smesh query -q "stealer logs redline raccoon" --openrouter --permissive
robin-smesh query -q "infostealer malware analysis" --openrouter --permissive
robin-smesh query -q "ransomware bitcoin wallets" --openrouter --permissive

Custom Models

Override the default model with -m:

# Use a specific OpenRouter model
robin-smesh query -q "threat actor" --openrouter -m meta-llama/llama-3.1-70b-instruct

# Use GPT-4o-mini for cost savings
robin-smesh query -q "dark web market" --openai -m gpt-4o-mini

Requirements

  • Rust 1.75+
  • Tor running on port 9050:
    # Linux
    sudo apt install tor && sudo systemctl start tor
    
    # Mac
    brew install tor && brew services start tor
  • LLM API Key:
    • ANTHROPIC_API_KEY (default, recommended)
    • OPENAI_API_KEY (with --openai flag)
    • OPENROUTER_API_KEY (with --openrouter flag)
  • Optional for enrichment:
    • GITHUB_TOKEN โ€“ Increases GitHub API rate limits
    • BRAVE_API_KEY โ€“ Enables Brave Search integration

Crate Structure

robin-smesh/
โ”œโ”€โ”€ robin-core/      # Signals, artifacts, field, search engines
โ”œโ”€โ”€ robin-tor/       # Tor proxy, crawler, scraper
โ”œโ”€โ”€ robin-agents/    # Specialized OSINT agents (refiner, crawler, filter, etc.)
โ”œโ”€โ”€ robin-runtime/   # SMESH swarm coordinator
โ””โ”€โ”€ robin-cli/       # CLI binary

Key Concepts from SMESH

  • Signals: Messages with intensity that decays over time
  • Field: Shared space where signals propagate
  • Reinforcement: Agreement from multiple agents boosts confidence
  • Emergence: No central controller; coordination emerges from simple rules

Artifact Extraction

Automatically extracts:

  • ๐Ÿ”— Onion addresses
  • ๐Ÿ’ฐ Bitcoin/Ethereum/Monero addresses
  • ๐Ÿ“ง Email addresses
  • ๐Ÿ” File hashes (MD5, SHA1, SHA256)
  • ๐Ÿ› CVE identifiers
  • โš”๏ธ MITRE ATT&CK TTPs
  • ๐ŸŒ Domains and IPs

Multi-Specialist Analysis

With --specialists, analysis is performed by 6 expert personas before synthesis:

Specialist Focus
๐ŸŽฏ Threat Intel Actor TTPs, campaign patterns, IOC correlation
๐Ÿ’ฐ Financial Crime Cryptocurrency flows, money laundering, fraud
๐Ÿ” Technical Malware, exploits, infrastructure analysis
๐ŸŒ Geopolitical Nation-state activity, regional threats
โš–๏ธ Legal/Regulatory Compliance, jurisdiction, evidence handling
๐Ÿ”ฎ Strategic Trend forecasting, risk assessment

External OSINT Enrichment

With --enrich, extracted artifacts are queried against surface web sources:

  • GitHub Code Search โ€“ Emails, usernames, code snippets, hashes
  • Brave Search โ€“ IPs, domains, malware hashes, threat intel

This bridges dark web findings with public attribution data.

Blockchain Temporal Analysis

With --blockchain, extracted cryptocurrency addresses are analyzed for temporal patterns:

  • Bitcoin โ€“ Blockstream API (no key required)
  • Ethereum โ€“ Etherscan API (optional ETHERSCAN_API_KEY for higher rate limits)

Analysis includes:

  • Wallet age (first/last transaction)
  • Transaction frequency and volume
  • Temporal patterns โ€“ Regular intervals, burst activity, dormancy periods
  • Timezone inference โ€“ Activity concentration by hour
  • Risk indicators (high volume, recent activity, contract interactions)

Paste Site Monitoring

With --pastes, public paste sites are searched for leaked data matching query terms:

  • Pastebin โ€“ Via psbdmp.ws API (paste dump search)
  • Rentry.co โ€“ Slug-based discovery
  • dpaste.org โ€“ Recent pastes API
  • ControlC โ€“ Search interface
  • JustPaste.it โ€“ Search interface

This catches leaked credentials, wallet addresses, and IOCs that often appear on paste sites before propagating to dark web markets.

Example Reports

Sample investigation reports are available in reports/:

reports/
โ”œโ”€โ”€ summary_2026-01-20_15-24-29.md  # Ransomware payment investigation
โ”œโ”€โ”€ summary_2026-01-20_15-26-30.md  # Threat actor infrastructure
โ”œโ”€โ”€ summary_2026-01-20_15-51-10.md  # Multi-specialist analysis
โ””โ”€โ”€ summary_2026-01-20_16-09-02.md  # With external enrichment

License

MIT OR Apache-2.0

About

๐Ÿ•ธ๏ธ Decentralized Dark Web OSINT Framework | Rust | SMESH Signal Diffusion | Tor Crawler | Threat Intelligence | Multi-Agent AI | Artifact Extraction | GitHub/Brave Enrichment

Topics

Resources

License

Apache-2.0, MIT licenses found

Licenses found

Apache-2.0
LICENSE-APACHE
MIT
LICENSE-MIT

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages