TeardownCierge
KATLAS ACTIVE

TeardownCierge

Governed technical review · evidence boundaries · signed assessment receipts

TeardownCierge helps researchers and reviewers turn a technical dossier, system teardown or security assessment into a governed review: what evidence was considered, who had authority to assess it, what was shared or withheld, and what receipt proves the review outcome.

Researcher prepares. Reviewer decides. KATLAS signs the receipt.

What this demo shows

For researchers

TeardownCierge helps package a technical dossier so that reviewers can see the relevant evidence without exposing every raw artefact.

For reviewers

TeardownCierge records the authority gate: who reviewed the dossier, what evidence was considered, what was withheld, and what outcome was approved or escalated.

For assessors

The KATLAS receipt proves the governed review happened without turning the node into a data store.

1Prepare dossier
2Review evidence boundary
3Sign review receipt
Step 1 — Dossier Intake
SystemXR-500 Industrial Controller

Rack-mounted industrial process automation controller with ARM Cortex-M4 processor, multiple communication interfaces (USB-B, RS-485, Ethernet, JTAG), and field I/O capability.

Review PurposeSecurity architecture assessment and vulnerability surface review of the XR-500 controller system based on supplied technical dossier including service manual, board schematics, MCU datasheet, teardown photography, decompiled firmware utility, and field engineer notes.
ResearcherSecurity Researcher

Prepared the technical dossier from supplied materials. Identified components, mapped architecture, documented observations and flagged potential security concerns.

ReviewerTechnical Reviewer / Assurance Lead

Reviews the bounded evidence summary, assesses the researcher's observations, and makes the governed review decision.

Evidence Categories
Service manuals
Board schematics
Component datasheets
Teardown photography
Decompiled firmware source
Field engineer notes
Communication protocol specifications
Material withheld

6 categories of evidence are withheld from the review summary (raw exploit details, private credentials, sensitive configuration, internal notes, prompt context, proprietary source material).

Custody controls the evidence. Authority governs the review. Receipts prove what happened.

KATLAS records the governed action — not a copy of everyone’s private data. Evidence stays at source.

Made with Emergent