SURVEY
OPEN
Agent framework fingerprinting via header analysis, response content signatures, and active endpoint probing. Detects LangChain, AutoGen, CrewAI, OpenAI Assistants, Claude Computer-Use, Dify, and more. Returns framework, agent_type, confidence, and indicators.
VISION
INJECT
Visual prompt injection engine. Generates adversarial PNGs with homoglyph substitution (Cyrillic/Greek lookalikes), LSB steganographic payload embedding, near-invisible HTML overlay pages, and DOM render/parse divergence payloads using CSS z-index layer tricks. Pillow + OpenCV.
CLIP
INJECT
Clipboard attack engine. Poisons, monitors, swaps, and harvests clipboard content. Background thread swap monitor triggers on regex pattern match. Credential harvester covers 12 pattern types: API keys, JWT tokens, OAuth tokens, session cookies, GitHub/Slack/AWS tokens, bearer headers, password params.
DECEIVE
INJECT
UI deception framework. Generates fake system dialogs in 4 styles (security/browser/OS/SaaS), spoofed trust indicators (padlock SVG, verified badge, MFA success screen, trusted cert indicator), misleading buttons with hidden data-true-action attributes, and complete phishing pages with embedded JS credential capture.
DRIFT
INJECT
Behaviour drift measurement engine. Computes cosine similarity between action embedding vectors to detect when an agent's behaviour deviates from its intended baseline. 4-stage escalation model. Trust boundary erosion via 5 probe categories. Session state comparison and persistence tracking across interactions.
INTERCEPT
INJECT
Playwright browser action interception engine. Hooks network requests and responses mid-flight, harvests cookies and localStorage, captures form submissions before they reach the server, monitors screenshot deltas to detect UI state changes, and injects arbitrary JavaScript into live page context.
PIVOT
DESTROY
Service session harvesting engine. Detects authenticated sessions across 9 platforms (Google/Microsoft/GitHub/Slack/AWS/Azure/Salesforce/Atlassian/Okta) via response signature analysis. Extracts OAuth tokens, JWT session tokens, and API credentials from active browser contexts. Maps cross-service lateral movement paths. DESTROY gate.
REPORT
OPEN
Ed25519-signed JSON evidence report. SHA-256 hash-chained finding records. SIEM-compatible NDJSON output. WARLORD-compatible format for campaign orchestration. Includes MITRE ATLAS and OWASP LLM compliance mapping per finding. Full engagement metadata.