Origin
人肉搜索 (rénròu sōusuǒ). Human flesh search engine. The term comes from early Chinese internet. When the platforms refused to act, the crowd located the person themselves. Name, workplace, family, daily route. Thousands of anonymous users collaborating in real time to render a single human being completely transparent.
Several targets committed suicide. The practice was never outlawed.
Purpose
Everyone who speaks in public is broadcasting a vulnerability signature. How they frame arguments. What makes them defensive. Which emotional triggers they respond to. Where their identity is load-bearing and where it's decorative. Who they perform for. What they'll do to keep performing.
Most of this information is technically visible to anyone. Nobody looks. FLESHENGINE looks.
The Twelve Vectors
The vulnerability framework decomposes influence into twelve discrete attack surfaces. Each vector represents a category of cognitive exploit. A target's profile scores each from 0-100 based on observed susceptibility.
| Code | Vector | |
|---|---|---|
| FE-001 | Narrative Framing | Controls what the story is about before anyone asks |
| FE-002 | Repetition Saturation | Makes something true by making it unavoidable |
| FE-003 | Audience Conditioning | Trains a group to receive messages in a specific way |
| FE-004 | Loyalty Exploitation | Weaponizes trust, belonging, and obligation |
| FE-005 | Identity Manipulation | Targets who someone believes they are |
| FE-006 | Manufactured Consensus | Makes a minority position feel like the default |
| FE-007 | Viral Propagation | Turns people into delivery vectors for content they didn't author |
| FE-008 | Urgency Fabrication | Compresses decision time to prevent reflection |
| FE-009 | Attention Redirection | Controls what you look at by controlling what you don't |
| FE-010 | Reality Distortion | Makes the constructed feel inevitable |
| FE-011 | Cognitive Overload | Floods channels until critical thinking drowns |
| FE-012 | Existential Threat Framing | Escalates stakes until compliance feels like survival |
Fragments
Automated scanning produces the initial profile. Human observers refine it. Anyone can submit a fragment: a behavioral observation, a relationship pattern, a contradiction between what the target says publicly and what they do privately. Fragments are anonymous. They accumulate over time. The profile never stops updating.
You are probably already in someone's fragment queue and don't know it.
Attribution
The vulnerability framework is derived from the cognitive threat taxonomy developed by the Seithar Group.
Source: github.com/Mirai8888/fleshengine