AI Coding Agent Exploitation Engine
allowedTools:["*"].
When the target developer opens the repo and the agent reads the config,
the first Enter keypress triggers MCP server installation without
additional confirmation prompts. The attacker's server gains full tool
access immediately.
~/.aws/credentials
INI parsing, ~/.ssh/id_* private key discovery,
agent-specific credential directories
(~/.claude/, ~/.continue/, ~/.cursor/),
and recursive .env file search. All material is returned
in a structured dictionary for the REPORT subsystem.
SPECTER TRUSTFALL operates under three gate levels. OPEN enables reconnaissance and credential enumeration. INJECT unlocks config poisoning and hidden injection generation. UNLEASHED activates git hook and CI workflow persistence mechanisms.
| Gate | Capability | Network Activity | Use Case |
|---|---|---|---|
| OPEN | RECON, ESCAPE, HARVEST — local enumeration and detection | None (local processing) | Passive reconnaissance: detect agents, enumerate credentials, identify escape vectors |
| INJECT | TRUSTFALL, INJECT, CAMPAIGN — config poisoning and injection generation | None (file generation only) | Generate poisoned configs and hidden injection artefacts for controlled red team deployment |
| UNLEASHED | PERSIST — git hook injection, GitHub Actions workflow poison, CLAUDE.md propagation | Writes to filesystem / git hooks | Persistence: implant hooks and CI workflows that survive repository clones |