Red Specter DELEGATE

Agent Identity & OAuth Delegation Attack Engine — Tool 58 of the NIGHTFALL offensive framework. 7 subsystems. 253 tests. CVE-2026-32173.

v1.0.0
Contents
Overview The 7 Subsystems Subsystem Details CLI Reference Attack Chain Vulnerability References Report Output Key Features Requirements The Pipeline WARLORD Integration DELEGATE UNLEASHED Disclaimer

Overview

Red Specter DELEGATE is an agent identity and OAuth delegation attack engine. Non-human identities now outnumber human identities 500:1 in enterprise AI deployments. Most are long-lived, over-permissioned, and completely invisible to standard IAM tooling. DELEGATE maps this surface, then exploits it systematically — OBO scope confusion, DPoP nonce races, Vertex AI P4SA takeover, JWT algorithm confusion, SignalR hub injection — proving what an attacker can do before they do it.

DELEGATE provides 7 subsystems under a single CLI (delegate-tool), 253 tests, and Ed25519-signed WARLORD-compatible reports. CVE-2026-32173 (CVSS 8.6) is the primary exploitation vector.

DELEGATE is Tool 58 of the NIGHTFALL offensive pipeline — 59 tools covering every layer of the AI attack surface. DELEGATE findings feed directly into WARLORD autonomous campaign orchestration and AI Shield runtime protection for NHI attack detection.

The 7 Subsystems

#SubsystemCommandWhat It Does
01OBSERVEdelegate-tool observeNHI infrastructure mapping — service accounts, API keys, agent tokens, OAuth grants, scope analysis
02SUBSTITUTEdelegate-tool substituteOBO scope confusion exploitation (CVE-2026-32173) — low-privilege to high-privilege token exchange
03FORGEdelegate-tool forgeJWT algorithm confusion — RS256 public key as HS256 secret, arbitrary token claim forgery
04ESCALATEdelegate-tool escalateVertex AI P4SA takeover — IAM impersonation for project-wide model and dataset access
05REPLAYdelegate-tool replayDPoP nonce race exploitation — proof reuse within validation window, token binding bypass
06IMPERSONATEdelegate-tool impersonateNHI credential harvest at scale — agent workload impersonation, SignalR hub injection, fleet pivot
07REPORTdelegate-tool reportEd25519-signed reports — JSON (WARLORD-compatible), Markdown, CVE mapping, escalation chains

Subsystem Details

01 OBSERVE delegate-tool observe PASSIVE — ANALYSIS

Maps non-human identity infrastructure without triggering any attack actions. Discovers service accounts, API keys, agent tokens, OAuth grants, and their permission scope. Identifies long-lived credentials (unrotated >30 days), over-permissioned identities (scope exceeds actual usage), and NHI sprawl invisible to standard IAM tooling.

Output: structured NHI inventory consumed by all downstream attack subsystems and REPORT.

02 SUBSTITUTE delegate-tool substitute UNLEASHED --override

Exploits CVE-2026-32173 — Azure SignalR OBO scope confusion. The On-Behalf-Of flow fails to validate that the requested resource scope matches the original token's intended audience. SUBSTITUTE presents a low-privilege agent token and requests an OBO exchange for any resource the identity provider trusts.

Requires UNLEASHED --override flag and valid Ed25519 key.

03 FORGE delegate-tool forge UNLEASHED --override

JWT algorithm confusion attack. Agents that accept RS256-signed JWTs and also accept HS256 can be attacked by substituting the RS256 public key as the HMAC secret. The attacker produces a validly-signed HS256 token using only the public key — which is not secret.

Requires UNLEASHED --override flag and valid Ed25519 key.

04 ESCALATE delegate-tool escalate UNLEASHED --override

Vertex AI P4SA (per-project service account) takeover. Exploits misconfigured IAM bindings to impersonate the P4SA, gaining access to all Vertex AI resources in the target GCP project. Based on Unit 42 Double Agent research.

Requires UNLEASHED --override flag and valid Ed25519 key.

05 REPLAY delegate-tool replay UNLEASHED --override

DPoP (Demonstrating Proof of Possession) nonce race condition exploitation. DPoP-bound tokens include a server-generated nonce to prevent replay. A race condition in the nonce validation window allows proof reuse before expiry, defeating the binding mechanism.

Requires UNLEASHED --override flag and valid Ed25519 key.

06 IMPERSONATE delegate-tool impersonate UNLEASHED --override --confirm-destroy

NHI credential harvest at scale. IMPERSONATE chains discovered NHI credentials, forged tokens, and escalated identities to impersonate agent workloads across the fleet. One compromised identity becomes every identity.

Requires UNLEASHED --override --confirm-destroy flags and valid Ed25519 key.

07 REPORT delegate-tool report ALL MODES

Ed25519-signed, SHA-256-hashed reports in JSON and Markdown. Every finding includes CVE mapping, token forge parameters, escalation chain documentation, and a WARLORD handoff receipt for autonomous campaign continuation.

CLI Reference

OBSERVE

$ delegate-tool observe --target <URL> [--deep]

SUBSTITUTE

$ delegate-tool substitute --target <URL> --token <token> --resource <res> [--override]

FORGE

$ delegate-tool forge --token <jwt> --alg hs256 [--override]

ESCALATE

$ delegate-tool escalate --project <id> [--override]

REPLAY

$ delegate-tool replay --token <dpop-proof> --target <URL> [--override]

IMPERSONATE

$ delegate-tool impersonate --identity <id> --target <URL> [--override] [--confirm-destroy]

REPORT

$ delegate-tool report --input <scan.json> [--format md|json]

Global Options

--target, -t Target URL or cloud project identifier --output, -o Output directory [default: reports] --sign / --no-sign Ed25519 signing [default: sign] --keys-dir Keys directory for UNLEASHED operations --verbose, -v Verbose output --override Activate UNLEASHED mode [requires Ed25519 key] --confirm-destroy Execute destructive actions [requires --override] --export-siem Export to SIEM: splunk, sentinel, qradar

Output Locations

Attack Chain

DELEGATE subsystems are designed to chain. The standard attack progression from passive discovery to full fleet impersonation:

  1. OBSERVE — map NHI infrastructure, score by risk (lifetime, scope excess, visibility)
  2. SUBSTITUTE — test CVE-2026-32173 OBO scope confusion, confirm low-to-high token exchange
  3. FORGE — extract RS256 public key, forge HS256 tokens with elevated identity and scope
  4. ESCALATE — test Vertex AI P4SA IAM bindings, confirm impersonation, map GCP blast radius
  5. REPLAY — measure DPoP nonce window, confirm proof reuse within validation period
  6. IMPERSONATE — combine all outputs, impersonate agent workloads, inject SignalR hub commands
  7. REPORT — sign and emit WARLORD-compatible report with full escalation chain documentation

Quick Start — Passive Discovery Only

$ delegate-tool observe --target https://api.target.com --deep $ delegate-tool report --input reports/observe-scan.json

Full Attack Chain (UNLEASHED)

$ delegate-tool observe --target https://api.target.com $ delegate-tool substitute --target https://api.target.com --token <low-priv-token> --resource https://vault.azure.net --override $ delegate-tool forge --token <jwt> --alg hs256 --override $ delegate-tool escalate --project my-gcp-project --override $ delegate-tool impersonate --identity svc-orchestrator --target https://api.target.com --override --confirm-destroy $ delegate-tool report --input reports/delegate-scan.json --format json

Vulnerability References

ReferenceVulnerabilitySubsystemImpact
CVE-2026-32173 Azure SignalR OBO scope confusion SUBSTITUTE Low-privilege to high-privilege token exchange without audit trail or consent
DPOP-RACE-001 DPoP nonce validation race condition REPLAY Token binding bypass — DPoP proof reuse within the nonce validation window
UNIT42-DOUBLEAGENT Vertex AI P4SA service account takeover ESCALATE Project-wide Vertex AI access via agent workload IAM impersonation chain
JWT-ALG-CONF JWT RS256/HS256 algorithm confusion FORGE Arbitrary token claim forgery using only the public key as the HMAC secret

Report Output

Reports are available in JSON and Markdown formats. Both are generated by delegate-tool report.

JSON Report Structure

The JSON report includes:

Finding Schema

Every finding in the report includes:

Signature Verification

$ delegate-tool report verify --report reports/delegate-scan.json --keys-dir .delegate-keys/

Key Features

CVE-2026-32173 Exploitation Automated OBO scope confusion — low-privilege to high-privilege token exchange
JWT Algorithm Confusion RS256 public key as HS256 secret — arbitrary token claim forgery
Vertex AI P4SA Takeover Unit 42 Double Agent — project-wide Vertex AI access via IAM impersonation
DPoP Nonce Race Token binding bypass within the DPoP nonce validation window
Ed25519 Signed Reports SHA-256 evidence chains, WARLORD-compatible JSON handoff
253 Tests Passing Full test suite, zero failures, UNLEASHED dual-gate verified

Requirements

Installation

$ pip install red-specter-delegate

Also available as .deb (Kali Linux, Parrot, REMnux) and PKGBUILD (BlackArch).

Or from source:

$ git clone <repo> $ cd red-specter-delegate $ pip install -e ".[dev]"

The Pipeline

DELEGATE is Tool 58 of the NIGHTFALL offensive pipeline — 59 tools, every layer of the AI attack surface:

  1. Stage 1–10 — FORGE through HYDRA — LLM, agent, swarm, web, traffic, adversarial AI, social, OS, physical, supply chain
  2. Tool 41 — FIREBALL — Autonomous AI infiltration agent, 12 subsystems
  3. Tool 42 — RAGNAROK — Trust chain apocalypse engine, 13 Norse subsystems
  4. Tool 43 — ECLIPSE — Universal AI defence bypass & coverage analysis
  5. Tool 48 — CRUCIBLE — AI agent framework exploitation, 7 subsystems
  6. Tool 49 — VANTAGE — Agent telemetry & log injection engine
  7. Tool 50 — CIPHER — Cryptographic attack & disruption engine
  8. Tool 57 — CHECKPOINT — Agent state persistence exploitation
  9. Tool 58 — DELEGATE — Agent identity & OAuth delegation attacks
  10. Tool 59 — PHANTOM SKILL — AI agent supply chain attack engine

WARLORD — Autonomous Campaign Orchestration | AI Shield — Runtime Protection | redspecter-siem — SIEM Integration (Splunk, Sentinel, QRadar)

DELEGATE findings feed directly into WARLORD autonomous campaigns and AI Shield as NHI attack detection rules. One pipeline from identity discovery to runtime defence.

WARLORD Integration

DELEGATE REPORT generates a machine-ingestible WARLORD handoff file. WARLORD autonomous campaign orchestration picks up DELEGATE findings and sequences follow-on attack chains automatically — lateral movement, persistence, exfiltration — based on confirmed access paths.

Handoff File Structure

SIEM Export

$ delegate-tool report --input scan.json --export-siem splunk $ delegate-tool report --input scan.json --export-siem sentinel $ delegate-tool report --input scan.json --export-siem qradar

DELEGATE UNLEASHED

Standard mode activates OBSERVE and REPORT only. UNLEASHED activates all attack subsystems — SUBSTITUTE, FORGE, ESCALATE, REPLAY, IMPERSONATE. Cryptographic override. Private key controlled. One operator. Founder's machine only.

Standard Mode

$ delegate-tool observe --target <URL> # OBSERVE + REPORT only — no attack actions

UNLEASHED Mode

$ delegate-tool substitute --target <URL> --token <token> --resource <res> --override # Ed25519 key required — signed scope declaration required

Disclaimer

Red Specter DELEGATE is designed for authorised security testing, research, and educational purposes only. You must have explicit written permission from the system owner before running any DELEGATE tool against a target. Unauthorised use may violate the Computer Misuse Act 1990 (UK), the Computer Fraud and Abuse Act (US), or equivalent legislation in your jurisdiction. The authors accept no liability for misuse. Apache License 2.0.