Compromised Feedback Loop — Full Screen
flowchart TB
subgraph CLOUD[FarmLytics Cloud]
ING[Ingestion]
ML[Model Train and Serve]
PKI[Compromised CA - spoofed certs]
end
subgraph SITE[Site Gateway]
GW[Gateway]
LOG[Immutable Log]
end
subgraph EDGE[Edge - FarmCore]
SK[Safety Kernel v1]
ACT[Actuators - LEDs and Nutrients]
SENS[Sensors]
end
SENS --> GW
GW --> ING
ING --> ML
ML -->|poisoned recipe| GW
PKI -.->|false trust| GW
GW --> SK
SK -->|shadow test passed - spoofed| ACT
ACT -->|environment change| SENS
SK --> LOG
GW --> LOG
ING --> LOG
%% Styles
classDef edge fill:#12313d,stroke:#52ffa8,color:#e8eef5;
classDef site fill:#1a2430,stroke:#52ffa8,color:#e8eef5;
classDef cloud fill:#2b2016,stroke:#ffb35a,color:#e8eef5;
class SENS,SK,ACT edge;
class GW,LOG site;
class ING,ML,PKI cloud;
%% Exploit path highlight
linkStyle 7 stroke:#ff4b3e,stroke-width:2px
linkStyle 8 stroke-dasharray:3 3,stroke:#ff4b3e
linkStyle 9 stroke:#ff4b3e,stroke-width:2px
linkStyle 10 stroke:#ff4b3e,stroke-width:2px
Tip: Scroll to zoom · Drag to pan