This reference defines the production visual syntax of ZelC, including symbolic operators, structural blocks, execution markers, and block-closure notation.
| Marker | Keyword | Description |
|---|---|---|
| ๐ฆ | package | Namespace: Declares the operational scope of the file. |
| ๐ | use | Import: Loads engines or providers like aina, edr, aws, and threat. |
| โ๏ธ | keep | Constant: Defines thresholds, modes, and fixed configuration values. |
| โญ๏ธ | define | Open Circle Block: Starts a reusable helper function block. |
| ๐ฅ | check | Entry Point: Starts an active monitoring or execution routine. |
| โ ๏ธ | when | Conditional Gate: Opens a condition block. |
| ๐น | set | Assignment: Stores runtime values such as hostnames, users, processes, or scores. |
| ๐ | change | Mutation: Updates an existing value. |
| โก | do | Action Block: Opens the live execution zone. |
| โญ๏ธ | each | Open Circle Block: Starts an iterator block. |
| โฉ๏ธ | return | Output: Returns helper data or results. |
| โ๏ธ | provider action | Execution Call: Invokes real cloud, EDR, Linux, IAM, or API actions. |
| ๐จ | alert | Signal: Raises an alert for analysts or dashboards. |
| ๐ฃ | notify | Communication: Sends messages to Teams or other channels. |
| ๐งพ | evidence | Forensic Proof: Records artifacts, timestamps, and outcomes. |
| โ๏ธ | rosecoin | Immutable Provenance: Anchors evidence to Rosecoin. |
| โจ | gui | Visual Update: Pushes state into the visual interface layer. |
| ๐ด | close block | Close Circle Block: Closes define, each, when, do, and check blocks. |
Open Circle Block for reusable helper logic.
Open Circle Block for iterator logic.
Conditional block opener.
Action block opener.
Close Circle Block.
๐ฆ package soc.endpoint
๐ use aina, edr, aws, threat
โ๏ธ keep ENCRYPTION_VELOCITY_LIMIT = 50
โญ๏ธ define assess_risk(event) ๐น set score = event.risk_score โฉ๏ธ return score ๐ด
๐ฅ check RansomwareOutbreakDefense โ ๏ธ when file_modifications_per_sec > 50 ๐น set infected_host = event.hostname ๐ด ๐ด
โ ๏ธ when confidence > 95 ๐จ alert critical message "Ransomware detected" ๐ด
๐น set infected_host = event.hostname
๐ change confidence = confidence + 10
โก do
โ๏ธ edr isolate host infected_host mode ISOLATION_MODE
๐ด
โญ๏ธ each proc in suspicious_procs
โ๏ธ edr kill process proc.pid on infected_host
๐ด
โฉ๏ธ return ai_verdict
โ๏ธ edr isolate host infected_host mode ISOLATION_MODE
๐จ alert critical message "RANSOMWARE VELOCITY DETECTED"
๐ฃ notify teams channel "Incident Response" message "Containment started"
๐งพ evidence record "Containment_Event" details { target_host: infected_host, confidence: threat_assessment.confidence }
โ๏ธ rosecoin anchor evidence_pack "latest"
โจ gui update panel "warroom" with { status: "containment_active", host: infected_host }
๐ด