Crucible is a security testing engine with an opinion: without ground-truth assertions, you don't have a test, you have a demo. Every scenario carries an expected outcome — what should happen, what shouldn't, and why. Run it through Synapse plus Chimera for the integrated path, or point it at your own stack and measure what your defender actually catches against the same scenarios.
Each scenario is a directed graph of attack steps — recon, exploit, escalate, exfil — with branching, retries, and dependency-aware execution. Steps run in parallel where they can; assertions evaluate at every transition. The result isn't "the test ran." The result is did the defender stop it, did it stop only what it should have, and where in the kill chain did the policy actually fire.
Every Crucible run follows the same four-stage pipeline. Discovery maps the target's actual surface area. Attack runs the scenario DAG. Analysis evaluates assertions against ground truth. Reporting produces evidence — pass/fail per assertion, mapped to MITRE technique, mapped to compliance control, exportable as PDF, JSON, or piped into your SIEM.
Composable attack graphs with parallel, sequential, and conditional steps. Custom scenarios author in YAML, built-in playbooks ship with the engine. Every step maps to MITRE ATT&CK technique IDs.
Map results to NIST 800-53, CIS Controls, PCI DSS, HIPAA. Generate audit-ready evidence automatically. Track which controls actually fired during real attack execution — not paper compliance.
Optional adaptive mode generates attack paths based on discovered vulnerabilities. The engine probes, observes responses, and synthesizes the next step. Finds combinations static scanners miss.
Executive summaries for non-technical stakeholders, technical deep-dives with full request/response capture, remediation roadmaps tied to source. Export PDF, JSON, NDJSON, or pipe to SIEM.
A typical run against the integrated stack — Synapse defending, Chimera as target, Crucible asserting. The output below shows pass/fail per scenario, mapped to NIST and HIPAA controls, with remediation guidance attached to each failure. This is what compliance evidence looks like when it's earned through actual attack execution rather than questionnaire response.
On its own, Crucible runs adversary emulation against any target you point it at. Inside the platform, it runs against Chimera's standardized vulnerable surfaces, with traffic flowing through Synapse as the inline defender. That's the whole point — the assertions only mean something when there's a defender in the path. Bring your own WAF if you want to measure your existing stack against the same scenarios.
See the platform →
Install the CLI from npm and run scenarios against your own targets,
or use
npx @atlascrew/bridge up
for the full integrated stack with Synapse and Chimera wired in.