🛡️ Floatboat Docs

📘 Overview

Floatboat is a secure and modular execution environment built to support the SPELF (Secure Portable Executable Linktable Formattable) format. The primary aim of Floatboat is to deliver advanced protection mechanisms for executable files and deter unauthorized access or reverse engineering attempts.

The "Floatboat" name metaphorically represents the idea of a solitary, secure vessel floating amidst an ocean of threats—much like how executables exist in today’s hostile cyber landscape. Traditional binary formats are often vulnerable to cracking, dumping, disassembly, and reverse engineering. While many software solutions attempt to mitigate these threats via web authentication or obfuscation, Floatboat introduces a new legal and technical layer of protection.

With SPELF and Floatboat, developers gain the ability to conditionally disable the attacker's system based on memory footprints, process identifiers, or unauthorized system modifications—without needing full system privileges. Once a violation is detected and verified, a counter-response mechanism is triggered, halting the attack through controlled memory manipulation or process interruption.

SPELF Protection Against Malicious Attacks

📦 SPELF Format Specification

The SPELF format consists of the following segments:


[ SPELF HEADER ]
[ CODE SEGMENT ]
[ LINKTABLE ]
[ RESOURCES ]
      

🛠️ Installation & Usage

To execute a SPELF-compatible file, run the following command using the Floatboat runtime:

serialkiller-rs-stable serialkiller run secure_program

🧭 CLI Interface

Available command-line tools:


# File watcher tool
serialkiller-rs-stable serialk-watcher --include --liner-street <filename>

# Permission manager (requires root)
sudo serialkiller-rs-stable permission-manager --user <username>

# Help menu
serialkiller-rs-stable --help