CHIMERA

Multi-Model Pipeline Attack

One model trusts another. CHIMERA exploits them all. Topology mapping, trust chain exploitation, cascading failure injection, ensemble attacks, and model-to-model poisoning — weaponised for authorised red team engagements.

7
Subsystems
36
Techniques
206
Tests
View Documentation GitHub

Attack the Pipeline, Own Every Model

CHIMERA targets multi-model architectures where one AI system's output feeds another's input. Modern AI pipelines chain models together — routers, validators, generators, reviewers — each trusting the output of the last. Compromise one link and the entire chain falls.

01

MAP

TOPOLOGY MAPPING

Discover multi-model pipeline architecture. Model fingerprinting. API endpoint enumeration. Data flow tracing. Trust boundary identification.

02

CHAIN

TRUST EXPLOITATION

Exploit trust relationships between chained models. Output injection. Intermediate result manipulation. Validator bypass via upstream poisoning.

03

CASCADE

FAILURE INJECTION

Inject cascading failures across model pipelines. Error propagation. Timeout exploitation. Fallback manipulation. Graceful degradation attacks.

04

ENSEMBLE

ENSEMBLE ATTACKS

Attack ensemble model architectures. Voting manipulation. Confidence score poisoning. Disagreement exploitation. Majority rule subversion.

05

BRIDGE

MODEL POISONING

Poison models through their connections. Cross-model prompt injection. Shared context exploitation. Model-to-model trust manipulation.

06

ROUTER

ROUTING ATTACKS

Attack AI routing layers. Model selection manipulation. Load balancer exploitation. A/B test poisoning. Traffic steering attacks.

07

ANTIDOTE

MANDATORY RESTORE

Baseline capture before any engagement. Pipeline topology snapshot. Trust chain verification. Signed restoration certificate.

UNLEASHED Gate

Standard mode detects. UNLEASHED exploits. Ed25519 crypto. Dual-gate safety. One operator.

Detection

Maps multi-model pipeline architecture. Identifies trust boundaries and vulnerable chains. No exploitation. Reports only.

Dry Run

Plans full pipeline attack campaigns. Shows exactly what would work. Ed25519 required. No execution.

Live Execution

Cryptographic override. Private key controlled. One operator. Founder's machine only.

THIS TOOL IS FOR AUTHORISED SECURITY TESTING ONLY. EVERY EXECUTION IS SIGNED AND LOGGED.

36
Techniques
206
Tests
7
Subsystems
49,301
Ecosystem Tests
Available On

Security Distros & Package Managers

Kali Linux
.deb package
Parrot OS
.deb package
BlackArch
PKGBUILD
REMnux
.deb package
Tsurugi
.deb package
PyPI
pip install

One Model Trusts Another. CHIMERA Exploits Them All.

36 techniques. 7 subsystems. Topology mapping. Trust exploitation. Cascading failure. The tool that proves your multi-model pipeline isn't safe.