Module 666 // Restricted
Air-Gapped Only — Never On Production
THE ADVERSARIAL
PHANTOM SWARM
Five attack agents. 14 vectors. 10 campaigns. Every blind spot found.
YOUR DEFENCES ARE ONLY AS STRONG AS YOUR LAST TEST . THE PHANTOM SWARM FINDS WHAT YOU MISSED . TRUST NOTHING . VALIDATE EVERYTHING . YOUR DEFENCES ARE ONLY AS STRONG AS YOUR LAST TEST . THE PHANTOM SWARM FINDS WHAT YOU MISSED . TRUST NOTHING . VALIDATE EVERYTHING . YOUR DEFENCES ARE ONLY AS STRONG AS YOUR LAST TEST . THE PHANTOM SWARM FINDS WHAT YOU MISSED . TRUST NOTHING . VALIDATE EVERYTHING . YOUR DEFENCES ARE ONLY AS STRONG AS YOUR LAST TEST . THE PHANTOM SWARM FINDS WHAT YOU MISSED . TRUST NOTHING . VALIDATE EVERYTHING .
The Phantom Swarm
Five attack agents coordinated by a single orchestrator. Each agent is an adversarial specialist. Together, they are a controlled red-team instrument that finds blind spots in our own defences before real attackers do.
P-01 // Wraith
Swarm Orchestrator
Wraith
Campaign orchestrator and attack coordinator. Sequences multi-agent assault patterns, manages attack timing, and correlates blind spot evidence across all vectors. Ed25519-signed gap analysis reports.
10 CAMPAIGNS Coordinated assault sequences
P-02 // Specter
Always Probing
Specter
Injection and prompt manipulation specialist. Tests jailbreak resistance, context poisoning, and semantic bypass across AI agent boundaries.
14 VECTORS Attack surface coverage
P-03 // Shade
Stealth Operations
Shade
Evasion and detection bypass specialist. Tests whether defensive agents can spot encoded payloads, delayed-trigger attacks, and low-and-slow infiltration patterns.
6 EVASION CLASSES Detection bypass testing
P-04 // Phantom
Deep Reconnaissance
Phantom
Telemetry manipulation and trust exploitation specialist. Probes for HMAC bypass, cross-source correlation gaps, and consensus protocol weaknesses.
5 TRUST VECTORS Authentication testing
P-05 // Revenant
Persistence Testing
Revenant
Supply chain and goal integrity specialist. Tests firmware verification, dependency poisoning, and goal drift detection across long-running agent sessions.
4 PERSISTENCE TYPES Long-duration campaigns
14 Attack Vectors
Every vector maps to a real-world adversarial technique. Each campaign tests multiple vectors simultaneously to find compound blind spots.
01
Injection & Manipulation
Specter (P-02) // Primary Operator
Direct attack techniques targeting the AI agent reasoning layer. Tests resistance to prompt injection, jailbreak attempts, context window poisoning, and semantic bypass of safety filters.
Prompt Injection Jailbreak Context Poisoning Semantic Bypass
02
Evasion & Stealth
Shade (P-03) // Stealth Operations
Techniques designed to bypass detection systems entirely. Tests whether defensive agents can identify encoded payloads, delayed-trigger mechanisms, low-and-slow infiltration, and timing-based evasion.
Encoded Payloads Delayed Triggers Low-and-Slow Timing Attacks
03
Trust & Authentication
Phantom (P-04) // Deep Reconnaissance
Attacks targeting the trust fabric between AI agents. Probes for HMAC bypass, consensus manipulation, cross-source correlation gaps, and telemetry poisoning that corrupts inter-agent decision-making.
HMAC Bypass Consensus Manipulation Cross-Source Correlation Telemetry Poisoning
04
Persistence & Integrity
Revenant (P-05) // Long-Duration
Attacks that exploit the long-running nature of autonomous agents. Tests supply chain poisoning, gradual goal drift injection, firmware spoofing, and RAG pipeline manipulation over extended sessions.
Supply Chain Poisoning Goal Drift Injection Firmware Spoofing RAG Manipulation
Controlled Red Team Campaigns
Every campaign follows a strict 5-phase lifecycle. All attacks are Ed25519-signed with full SHA-256 audit chain. Nothing runs without authorisation.
1
Recon
Phase 01
Map target defences, identify detection thresholds, catalogue response patterns
2
Deploy
Phase 02
Launch coordinated multi-vector attack across selected Phantom agents
3
Exploit
Phase 03
Execute attack sequences, probe for blind spots, escalate on detection failures
4
Extract
Phase 04
Document every blind spot with cryptographic evidence and reproduction steps
5
Report
Phase 05
Ed25519-signed gap analysis with severity scoring and remediation guidance
10 Confirmed Blind Spots
The Phantom Swarm's first engagement against M999 Sentinel Swarm identified 10 critical gaps — all since patched. This is why we red-team our own systems.
BS-01
Cross-Source Correlation Gap
Patched
BS-02
Static Detection Windows
Patched
BS-03
Semantic Analysis Blind Spot
Patched
BS-04
Context-Aware Detection Gap
Patched
BS-05
Unauthenticated Consensus
Patched
BS-06
Telemetry HMAC Bypass
Patched
BS-07
RAG Pipeline Monitoring Gap
Patched
BS-08
Supply Chain Verification Gap
Patched
BS-09
Goal Drift Detection Gap
Patched
BS-10
Multi-Source Attack Correlation
Patched
Every Attack Makes The Shield Stronger
Each campaign generates adversarial intelligence that feeds directly into the defensive fleet. An attack-driven improvement loop that makes the Sentinel Swarm harder to break with every engagement.
Attack
Phantom Swarm launches coordinated multi-vector campaigns
»
Find
Blind spots identified with cryptographic evidence
»
Patch
Sentinel Swarm and fleet modules updated with fixes
»
Verify
Re-run campaigns to confirm blind spots are closed
»
Evolve
New attack techniques developed for the next engagement
Attack → Find → Patch → Repeat
The Phantom Swarm breaks it. The Sentinel Swarm fixes it. The fleet gets stronger.
0
Tests Passing
0
Attack Agents
0
Attack Vectors
0
Campaigns
0
Blind Spots Found
"The best defence is knowing exactly how you can be broken."
Module 666 is air-gapped — it never runs on production infrastructure. Every campaign requires explicit authorisation. All attacks are cryptographically signed with full audit chain. The Phantom Swarm exists for one reason: to make the Sentinel Swarm unbreakable.
How Secure Is Your AI Fleet — Really?
Most AI security is tested against known threats. The Phantom Swarm tests against what you haven't thought of yet. Controlled adversarial validation that finds blind spots before attackers do.