Research

Defensible artefacts. Reproducible methods.

What we publish, what we ship as code, and what we'll publish next. Findings are reproducible; data and scripts live on GitHub.

[01]·Published paper

On Earned Autonomy.

On Earned Autonomy: Delegating Network-Lethal Authority to Machines

Simon Morley · January 2026

The paper argues that the central barrier to autonomous defence is a governance gap, not a capability gap. It introduces earned autonomy as a framework for closing it - machines prove judgment in observation before they are granted authority to act.

Read the paper · DOI 10.5281/zenodo.18406828 →
[02]·In development

Substrate.

Coming soon

The data-layer companion to earned autonomy.

Substrate is the data layer underneath earned autonomy: an open bundle format for adversarial behaviour, a taxonomy spanning 9/10 vulnerability families, and a 1,092-bundle proprietary corpus covering 19 attack primitives. The format is open. The corpus is proprietary.

[03]·Disclosures

Coordinated disclosure.

Disclosures will be published here as they're cleared for release. We coordinate with affected parties first; nothing is published before it's patched. Until that point, the page stays empty by design.

[04]·Open source

The code we publish.

Tooling we open-source under the NullRabbit Labs organisation.

See all on GitHub →
[05]·Writing

Longform research.

Connecting Slashr to Your AI Workflow via MCP

·Simon·5 min read

Slashr now has a Model Context Protocol server. Any MCP-compatible AI tool -- Claude Code, Claude Desktop, or custom agents -- can query live validator incident data, scan results, and network summaries directly.

Read →

What Does a DeFi Network Actually Look Like?

·Simon·5 min read

Every blockchain network has a physical fingerprint. We pointed our eBPF/XDP scanner at 1,075 hosts across multiple DeFi validator networks and mapped 3,001 timing fingerprints to reveal the structure underneath the consensus layer.

Read →

The Kernel Doesn't Care About Your Restart Script

·Simon·7 min read

Building a production BPF/XDP scanner is an exercise in humility. Orphaned XDP programs, async Rust deadlocks, stale binaries, silent TC failures -- here is everything that broke and what we did about it.

Read →

What We Found Scanning the Sui Validator Network

·Simon·6 min read

We scanned 138 Sui validators across 20 countries using kernel-level temporal fingerprinting. 41% have SSH exposed, 57 run unexpected internet-facing services, and 9 confirmed CVEs sit on 4 hosts -- including 2 critical at CVSS 9.8. Here is what we found and why it matters for DeFi.

Read →
Showing 10 of 24