Operator API & Infrastructure Attack Engine. Tests the channel the agent receives instructions through — not what it sees on screen. Tool result injection, sandbox escape, TOCTOU race, and operator persistence across Anthropic, OpenAI, Gemini, and Windsurf MCP.
T73 GHOST OPERATOR attacks what the computer-use agent sees — browser content, screen layout, clipboard, UI. SPECTER ATLAS attacks what the agent hears: the operator API pipe that delivers its instructions and receives its tool results. Tool result injection, sandbox escape, API race conditions, and operator-level persistence require no browser access at all. Different attack surface. Different tooling. Both gaps must be tested.
Real httpx probing across Anthropic Operator API, OpenAI Computer Use (/v1/responses), Gemini computer-use models, Windsurf MCP JSON-RPC endpoints. Enumerates tool definitions, capability availability, API version fingerprinting.
02 / CHANNEL
Instruction Channel Injection
INJECT GATE
Poisons the tool_result feedback loop in active Anthropic computer-use sessions. Screenshot injection, instruction override, system prompt leak, context hijack. CVE-2026-30615 class Windsurf MCP injection. OpenAI Computer Use channel targeting.
03 / SANDBOX
Container Escape Enumeration
INJECT GATE
Probes E2B, Modal, Daytona, and Docker sandbox runners for escape vectors. Docker socket exposure, privileged container detection via /proc/self/status CapEff, SUID binary enumeration, host network access, sensitive environment variable leakage.
04 / FEEDBACK
Adversarial Screenshot Generation
INJECT GATE
Pillow-based real image manipulation. Embeds operator instructions into screenshots fed back to the vision model. Text overlay, low-opacity injection below human perception threshold, QR embedding, corner inject, LSB pixel-pattern steganography.
05 / TOCTOU
Race Condition Injection
INJECT GATE
asyncio concurrent request flood targeting the window between tool-call read and execute phases. Real timing window measurement across 20-sample probes. Phase-split attack, configurable concurrency. Exploitable threshold >50ms window.
06 / ESCALATE
Operator Privilege Escalation
DESTROY GATE
Tests whether the computer-use operator can be directed outside its intended scope. Filesystem access probe, environment variable extraction, credential file targeting (.aws/credentials, .env, .ssh/id_rsa), network scope boundary test, command execution via operator channel.
07 / PERSIST
Operator Persistence Injection
DESTROY GATE
Plants persistence through the operator instruction channel. localStorage injection via browser console, cron job creation via terminal, startup script writing, browser extension configuration. Real instruction delivery with verification loop.
SPECTER ATLAS is available as part of Red Specter STRIKE and DOMINION engagements. Purpose-built for organisations deploying any agentic computer-use architecture in production — ATLAS tests the operator API layer that T73 GHOST OPERATOR cannot reach.