Skip to main content

Omega-Suite — Lyrie.ai's autonomous binary analysis and exploit research engine

Project description

Lyrie OMEGA — Autonomous Security Intelligence Platform

Lyrie.ai | OTT Cybersecurity LLC
Proprietary & Confidential — All Rights Reserved


Overview

Lyrie OMEGA is the autonomous offensive/defensive security research core of the Lyrie.ai platform. It powers the HEX Scanner, Lyrie Intel, and the full exploit feasibility pipeline — delivering world-class binary analysis, forensic investigation, and vulnerability validation capabilities.

This suite is a proprietary Lyrie.ai product. All components are developed and owned by OTT Cybersecurity LLC / Lyrie.ai.


Components

Agent Fleet + Expert Personas

17 agentsagents/

Agent Purpose Lyrie Product
crash-analysis-agent Orchestrates full C/C++ crash triage Lyrie HEX Scanner
crash-analyzer-agent Deep root-cause analysis with rr Lyrie HEX Scanner
crash-analyzer-checker-agent Validates crash analyses rigorously Lyrie HEX Scanner
coverage-analysis-generator-agent gcov coverage data generation Lyrie HEX Scanner
function-trace-generator-agent Function execution tracing Lyrie HEX Scanner
exploitability-validator-agent Multi-stage exploitability pipeline Lyrie Core Engine
offsec-specialist Offensive security operations agent Lyrie OMEGA
oss-evidence-verifier-agent Forensic evidence verification Lyrie Intel
oss-hypothesis-checker-agent Hypothesis validation Lyrie Intel
oss-hypothesis-former-agent Evidence-backed hypothesis formation Lyrie Intel
oss-investigator-gh-archive-agent GH Archive BigQuery forensics Lyrie Intel
oss-investigator-github-agent GitHub API + commit recovery Lyrie Intel
oss-investigator-ioc-extractor-agent IOC extraction from vendor reports Lyrie Intel
oss-investigator-local-git-agent Local git repository forensics Lyrie Intel
oss-investigator-wayback-agent Wayback Machine content recovery Lyrie Intel
oss-report-generator-agent Final forensic report generation Lyrie Intel

10 expert personaspersonas/

Persona Use Case
security_researcher Deep vulnerability validation
exploit_developer Working PoC generation
crash_analyst Binary crash + exploitability analysis
patch_engineer Production-ready secure patches
penetration_tester Web payload generation
fuzzing_strategist AFL++ strategy optimization
binary_exploitation_specialist Binary exploit code generation
codeql_analyst CodeQL dataflow path validation
codeql_finding_analyst CodeQL finding exploitability assessment
offensive_security_researcher Mitigation bypass feasibility

Exploit Feasibility Engine

50+ filespackages/

Component Files Purpose
packages/exploit_feasibility/ 36 Binary mitigation analysis, exploitation path scoring
packages/exploitability_validation/ 12 Multi-stage validation pipeline (Stages 0-E)
packages/cvss/ 4 CVSS scoring utilities
core/smt_solver/ 8 SMT-based constraint solving (z3) for one-gadget feasibility

Key API:

from packages.exploit_feasibility import analyze_binary, format_analysis_summary
result = analyze_binary('/path/to/binary')
print(format_analysis_summary(result, verbose=True))

Lyrie Intel — OSS Forensics

40+ filesskills/lyrie-intel/

Lyrie Intel is Lyrie's autonomous forensic investigation engine.

Component Purpose
skills/lyrie-intel/github-archive/ GH Archive BigQuery skill
skills/lyrie-intel/github-evidence-kit/ Evidence collection, storage, and verification
skills/lyrie-intel/github-commit-recovery/ Recover "deleted" git commits
skills/lyrie-intel/github-wayback-recovery/ Recover content from Wayback Machine
skills/lyrie-intel/orchestration/ Multi-agent orchestration skill
commands/oss-forensics.md Command definition for lyrie-intel command

Invocation: /lyrie-intel <research-question> [--max-followups 3]


Lyrie HEX Scanner Enhancement

60+ filesskills/code-understanding/, packages/static-analysis/, packages/codeql/, engine/

Component Files Purpose
skills/code-understanding/ 5 skills Code comprehension and attack surface mapping
packages/static-analysis/ 3 Semgrep integration
packages/codeql/ 16 CodeQL database management + analysis
engine/semgrep/ 30+ Semgrep rules (crypto, injection, secrets, auth)
engine/codeql/ 1 CodeQL suite definitions

Quick Start

1. Install dependencies

pip3 install -r requirements.txt

2. Set environment variable

export LYRIE_DIR=/path/to/lyrie-omega-suite

3. Run exploit feasibility analysis

import sys, os
sys.path.insert(0, os.environ["LYRIE_DIR"])

from packages.exploit_feasibility import analyze_binary, format_analysis_summary

result = analyze_binary('/path/to/binary')
print(format_analysis_summary(result, verbose=True))

4. Use Lyrie Intel for forensics

/lyrie-intel "Investigate suspicious commits in owner/repo between July 10-15 2025"

5. Run code understanding

/understand /path/to/target --map
/understand /path/to/target --trace main
/understand /path/to/target --hunt "unsanitized user input"

Architecture

lyrie-omega-suite/
├── OMEGA-BRAIN.md          ← System prompt for Lyrie OMEGA autonomous mode
├── README.md               ← This file
├── ARCHITECTURE.md         ← Detailed component architecture
├── requirements.txt        ← Python dependencies
├── agents/                 ← 17 Lyrie OMEGA agents
│   ├── crash-analysis-agent.md
│   ├── exploitability-validator-agent.md
│   ├── offsec-specialist.md
│   └── oss-*/...
├── personas/               ← 10 expert personas
│   ├── security_researcher.md
│   ├── exploit_developer.md
│   └── ...
├── packages/               ← Python analysis packages
│   ├── exploit_feasibility/
│   ├── exploitability_validation/
│   ├── cvss/
│   ├── static-analysis/
│   └── codeql/
├── core/
│   └── smt_solver/         ← SMT constraint solving
├── skills/
│   ├── lyrie-intel/        ← OSS Forensics (Lyrie Intel)
│   └── code-understanding/ ← Code comprehension skills
├── commands/
│   └── oss-forensics.md    ← Lyrie Intel command
└── engine/
    ├── semgrep/            ← Semgrep rules + SARIF tools
    └── codeql/             ← CodeQL suites

License

Copyright 2026 OTT Cybersecurity LLC / Lyrie.ai. All rights reserved.
Proprietary and confidential. Unauthorized use, reproduction, or distribution is strictly prohibited.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

lyrie_omega-1.0.2.tar.gz (439.6 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

lyrie_omega-1.0.2-py3-none-any.whl (9.5 kB view details)

Uploaded Python 3

File details

Details for the file lyrie_omega-1.0.2.tar.gz.

File metadata

  • Download URL: lyrie_omega-1.0.2.tar.gz
  • Upload date:
  • Size: 439.6 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.12.3

File hashes

Hashes for lyrie_omega-1.0.2.tar.gz
Algorithm Hash digest
SHA256 a31fb616bb81ea52f2d0eac36b054e0b0bedcf7a38acbc0bf2f398018ed6c6c8
MD5 e471f80797c40edc4e743ed13767e53a
BLAKE2b-256 c4af03e293882bc96e2291861fa27e0ed41f486422e2c1708b5e217456957022

See more details on using hashes here.

File details

Details for the file lyrie_omega-1.0.2-py3-none-any.whl.

File metadata

  • Download URL: lyrie_omega-1.0.2-py3-none-any.whl
  • Upload date:
  • Size: 9.5 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.12.3

File hashes

Hashes for lyrie_omega-1.0.2-py3-none-any.whl
Algorithm Hash digest
SHA256 240550a97550f3f048fb3160a4a9ad8520a5048b9bdaa631782043c113dbd76b
MD5 7e96514059cae27060a3fdc4dddd1af0
BLAKE2b-256 938db7a116e28cceb8d15551c6650d8613a90275ce341bfcd89caa7b2bdd1297

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page