// per-tool methodology
EFS encrypted file cluster pattern analyzer
drop mft csv · detect encrypted file system usage patterns · identify mass efs encryption events · surface encryption used to hide data before investigation · correlate with certificate and key evidence · runs locally
public grade
A
flagship triageraw 14/14 · raw 12–14 / 14
Awhat this grade means
real parser depth · 2+ exports with reason fields · honest limits · canonical UI shell
capability class · export / document parser
structured exports — JSON, CSV, EML, ZIP, HTML — parsed against the file format spec
max grade for this class: A
- parser fidelity depends on export format version and vendor schema drift
- malformed or truncated exports may skip records silently — check the system log
known limitations
- even A-grade tools can be wrong on rare inputs, malformed files, or adversarial samples
- independent verification is required before consequential or evidentiary use
- the grade is not a court-admissibility score — jurisdiction and chain of custody still apply
B minimum ship bar
- newly added forensics tools must clear the public B minimum before merging
- minimum: letter grade B or A · raw score ≥ 9/14 · UI dimension = 2 · IF/OU/DQ/RB/HN ≥ 1 each · no critical red flags (missing engine, placeholder logic, no exports)
- the ship bar is enforced by quality.audit.json sidecars and npm run tools:grade-forensics --check