$ cat README.md
# Ask Real Questions About Code. Across Layers.
Hyperplanes is a unified program analysis framework that links source, binary, and runtime behavior — giving you a single graph to query everything from influence to privilege to policy compliance.
## Quick Start
curl -sSL hyperplanes.io/install.sh | bash
Downloads source, runs make build
, sets up environment.
## Manual Build
$ git clone https://gitlab.com/serenitix/projects/hyperplanes-project/hyperplanes.git
$ cd hyperplanes
$ make build
✓ Building lifters and tools...
## The Problem
Program analysis today is fragmented. Each tool solves a tiny piece. Static analyzers can't see runtime. Dynamic tools can't lift meaning. Security questions like "Who can reach this memory?" require scripting, reverse engineering, or guesswork.
## Our Solution
- � A lattice of IRs spanning source, binary, and runtime
- 📊 A capability graph tracking objects, flows, and influence
- � Graph queries for high-level questions — no plugins needed
- ⚡ Compatible with existing tools (Ghidra, GDB, LLVM)
## Ask Questions. Get Answers.
$ # Sample queries you could ask:
"Which functions access memory tainted by user input?"
"Where are privileges elevated on behalf of another entity?"
"Is this syscall used outside of its intended namespace?"
Graph queries. No scripting. Traceable across layers.
## Current Examples
$ ls samples/
hello.c hello.bc hello.ll hello.ast
using-malloc.c using-malloc.bc using-malloc.ast
✓ Real working examples available
$ make -C samples
✓ Compiling hello.c → hello.bc
✓ Generating LLVM IR → hello.ll
✓ Building AST → hello.ast
📊 Ready for analysis
$ _