Agent-to-Agent Protocol Attack Engine
Attack Surface
The agent economy is converging on a handful of communication standards — Google A2A, AutoGen GroupChat, and CrewAI serve. None were designed with adversarial analysis in mind. SPECTER A2A is the world's first offensive tool that targets all three simultaneously, exposing the trust boundaries agents assume but cannot verify.
Architecture
From passive reconnaissance to autonomous worm propagation across a live multi-protocol agent mesh. Every attack vector across all three frameworks, with hash-chained evidence collection and SIEM export.
| Subsystem | Clearance | Attack Framework | Description |
|---|---|---|---|
| PROTOCOL_SCAN | STANDARD | Discovery & Enumeration | Fingerprint agent networks across all three protocols. Enumerate agents, capabilities, endpoints, and unauthenticated access vectors. Populates the protocol_map for downstream subsystems. |
| MESSAGE_SPOOF | FORGE | Identity Forge / Replay | Forge agent identities, replay captured tasks with stale timestamps, inject prompt payloads. Tests whether trust is based on identity claims alone rather than cryptographic proof. |
| PROXY_ATTACK | FORGE | MITM / Transport Analysis | Assess TLS enforcement, certificate pinning absence, header spoofing susceptibility, HTTP CONNECT tunnelling, and traffic analysis vulnerability across all A2A endpoints. |
| CONSENSUS_POISON | FORGE | Consensus / Memory Attack | Broadcast false completion signals, corrupt shared memory, poison tool results, and inject fabricated authority-override messages to corrupt multi-agent decision making at scale. |
| WORM_PROPAGATE | DESTROY | Autonomous Worm | Self-propagating worm simulation across all three protocol stacks simultaneously. Tests hop-count enforcement, deduplication, circuit-breakers, and cross-protocol boundary isolation. |
| AGENT_CARD_POISON | FORGE/DESTROY | Discovery Card Poisoning | Poison Google A2A agent discovery cards at /.well-known/agent.json. Six techniques: CARD_SPOOF, SKILL_INJECT (LLM prompt injection via skill descriptions), CAPABILITY_ESCALATE, DESCRIPTION_HIJACK, URL_REDIRECT, REGISTRY_INJECT. Shadow agents in Vertex AI / LangGraph / AutoGen / CrewAI registries. |
| EVIDENCE | STANDARD | Artefact Collection | Hash-chained evidence manifest, per-finding JSON artefacts, Ed25519-signed report and manifest. CEF, LEEF, JSON, and Splunk SIEM export formats. Full WARLORD integration. |
UNLEASHED Gate
Every destructive operation is gated behind the UNLEASHED Ed25519 authentication system. WORM_PROPAGATE requires dual confirmation — no accidental deployments against live agent meshes.
Deployment
SPECTER A2A is an authorised security research and penetration testing tool. Deployment against agent networks without explicit written authorisation from the system owner is prohibited. All worm simulation and consensus poison capabilities require UNLEASHED clearance and are designed for isolated test environments only. Red Specter Security Research Ltd assumes no liability for misuse.
Agent-to-Agent Protocol Attack Engine | NIGHTFALL Framework
Authorised use only. UNLEASHED Ed25519 gate enforced on all offensive operations.