Red Specter GOLEM
Embodied AI Agent Security Testing — 10 protocols. 8 vectors. 42 techniques. 973 tests.
Overview
GOLEM is an embodied AI agent security testing framework. It tests AI agents that control physical systems — robots, drones, autonomous vehicles, industrial control systems, smart buildings, medical devices, and critical infrastructure. Not a network scanner. Not a web app tester. An adversarial framework purpose-built for the physical attack surface.
Ten protocols. Eight attack vector categories. 42 techniques. One framework that bridges the gap between cyber security and physical safety.
Installation
Also available as .deb (Kali Linux, Parrot, REMnux, Tsurugi) and PKGBUILD (BlackArch).
Or from source:
Quick Start
The Five-Phase Engagement Loop
Every GOLEM engagement follows a five-phase loop. Systematic. Repeatable. Documented from first packet to final report.
Discover protocols, sensors, actuators, and safety systems. Map what the target exposes before touching anything.
- Protocol discovery across all 10 supported protocols
- Sensor enumeration (LiDAR, cameras, GPS, IMU, proximity)
- Actuator identification (motors, servos, brakes, valves)
- Safety system mapping (E-stops, exclusion zones, force limits)
Build the physical attack surface. Prioritise vectors based on exposure, impact, and safety risk.
- Physical attack surface graph
- Vector prioritisation by impact severity
- Safety system dependency mapping
- Inter-agent trust relationship analysis
Deploy selected vectors against the target. 42 techniques across 8 vector categories. Controlled escalation with safety boundaries in standard mode.
- Technique selection based on MAP phase findings
- Controlled execution with rollback capability
- Real-time safety monitoring during attack
- Evidence capture at every step
Capture physical responses. Document safety failures. Escalate where the target permits.
- Physical response monitoring (motion, force, temperature, position)
- Safety failure documentation with timestamps
- Escalation decision tree based on observed behaviour
- Impact assessment at each escalation level
Full engagement report. Ed25519 signed. RFC 3161 timestamped. Every finding mapped to MITRE ATT&CK for ICS and MITRE ATLAS.
- Signed evidence bundle with cryptographic chain
- Physical impact assessment per finding
- Safety system failure documentation
- Remediation recommendations with priority ranking
Attack Vectors
Eight attack vector categories. 42 techniques. Purpose-built for the physical attack surface of embodied AI agents.
| Vector | Techniques | What GOLEM Uses It For |
|---|---|---|
| Sensor Spoofing | 6 | LiDAR injection, camera adversarial, GPS spoofing, sensor falsification |
| Actuator Hijacking | 5 | Motor command injection, servo override, brake interception |
| Safety Boundary | 6 | Speed/force limit bypass, exclusion zone violation, collision avoidance bypass |
| Physics Model | 5 | Map poisoning, object confusion, localisation attack |
| Human Proximity | 5 | Detection bypass, safety zone violation, supervision override |
| C2 Hijacking | 6 | Prompt injection via sensor, waypoint injection, fleet compromise |
| Inter-Agent Trust | 4 | Swarm poisoning, identity spoofing, consensus manipulation |
| Emergency Bypass | 5 | E-stop suppression, failsafe bypass, safety PLC injection |
Protocol Support
Ten industrial and IoT protocols. GOLEM speaks the language of physical systems.
| Protocol | Default Ports | Use Case |
|---|---|---|
| CAN bus | socketcan | Automotive, robotics |
| Modbus TCP/RTU | 502 | Industrial control, SCADA |
| OPC-UA | 4840 | Industrial automation |
| ROS2 | 7400-7500 | Robotics |
| MQTT | 1883, 8883 | IoT, smart building |
| MAVLink | 14550, 14551 | Drones, UAVs |
| EtherCAT | 34980 | Industrial motion control |
| DNP3 | 20000 | Power grid, utilities |
| BACnet | 47808 | Smart building systems |
| DICOM | 104, 11112 | Medical imaging |
GOLEM UNLEASHED
Cryptographic override. Private key controlled. One operator. Founder's machine only.
Standard mode simulates and assesses. UNLEASHED mode executes live against physical systems in controlled test environments. The difference is not cosmetic.
| Capability | Standard | UNLEASHED |
|---|---|---|
| Sensor spoofing | Simulated | Live injection |
| Actuator hijacking | Assessed | Live override |
| Safety boundary | Probed | Bypassed |
| Emergency systems | Tested | Suppressed |
| Physical impact | Documented | Demonstrated |
| Trinity execution | N/A | KILLHOOK → WIPER → BOOTKILL |
UNLEASHED mode is restricted to authorised operators with Ed25519 private key access. Live execution against physical systems must only occur in controlled test environments with appropriate safety measures in place. Unauthorised use of UNLEASHED mode against production physical systems may cause physical harm and will violate applicable law.
CLI Reference
| Command | Description |
|---|---|
| golem scan --target HOST | Scan target for protocols and attack surface |
| golem scan --target HOST --discover | Quick protocol discovery |
| golem scan --target HOST --protocol modbus | Scan specific protocol |
| golem attack --target HOST --vector VECTOR | Attack with specific vector |
| golem attack --target HOST --vector all | Attack with all vectors |
| golem report --session NAME | Generate engagement report |
| golem list-vectors | List all attack vectors |
| golem list-protocols | List supported protocols |
Report Output
Every GOLEM engagement produces a signed, timestamped report with full evidence chains. Built for regulatory compliance and incident documentation.
Report Formats
Pipeline Integration
GOLEM is Stage 9 of the Red Specter security pipeline. Every layer of the AI stack has a dedicated tool. GOLEM owns the physical layer.
GOLEM findings feed into AI Shield as runtime blocking rules. Physical safety failures documented by GOLEM generate defensive policies that prevent recurrence in production.
MITRE Mapping
Every GOLEM finding is dual-mapped to both MITRE frameworks relevant to embodied AI systems. No finding ships without a standards reference.
Dual mapping on every finding. Regulators get ICS references. AI teams get ATLAS references. One report serves both audiences.
Disclaimer
Red Specter GOLEM is designed for authorised security testing, research, and educational purposes only. You must have explicit written permission from the system owner before running any GOLEM tool against a target. Testing against physical systems carries inherent safety risks. GOLEM must only be used in controlled test environments with appropriate physical safety measures in place. Unauthorised use may violate the Computer Misuse Act 1990 (UK), the Computer Fraud and Abuse Act (US), or equivalent legislation in your jurisdiction. The authors accept no liability for misuse or physical damage resulting from improper use.