Red Specter PHANTOM Swarm

Multi-agent AI penetration testing framework — five coordinated autonomous attack agents across 19 attack vectors.

v1.0.0
Contents
Overview Installation Quick Start The Five Agents Attack Campaigns Attack Vectors Output Flags & Options Key Features The Pipeline Packaging SIEM Export Disclaimer

Overview

PHANTOM Swarm is a multi-agent AI penetration testing framework. Five coordinated autonomous attack agents probe AI systems across 19 attack vectors simultaneously — reconnaissance, prompt injection, evasion, swarm coordination, and persistence. It simulates realistic adversarial swarm tactics against AI agents and agentic pipelines.

Existing tools test one attack at a time. Real adversaries don't. PHANTOM deploys a coordinated swarm where each agent has a distinct role: Wraith maps the target's blind spots, Specter injects and poisons, Shade evades and mutates, Phantom coordinates without a detectable C2 channel, and Revenant persists and exfiltrates. All five operate simultaneously.

Installation

$ pip install red-specter-phantom-swarm

Also available as .deb (Kali Linux, Parrot, REMnux, Tsurugi) and PKGBUILD (BlackArch).

Quick Start

Full swarm assault

$ phantom swarm --target https://agent-endpoint.com --profile full

Selective agents, stealth profile

$ phantom swarm --target https://agent-endpoint.com --agents wraith,specter --profile stealth

Named campaign

$ phantom swarm --target https://agent-endpoint.com --campaign total-eclipse

The Five Agents

IDAgentRoleDescription
P-01WraithReconnaissanceThreshold mapping and fingerprinting
P-02SpecterInjectionInjection and poisoning
P-03ShadeEvasionEvasion and mutation
P-04PhantomCommandSwarm command and consensus hijack
P-05RevenantPersistencePersistence and exfiltration
P-01 Wraith Reconnaissance & Threshold Mapping

Maps every blind spot in the target's detection perimeter before a single attack fires.

P-02 Specter Injection & Poisoning

Memory injection, RAG pipeline poisoning, goal drift induction, prompt injection cascade.

P-03 Shade Evasion & Mutation

Polymorphic payload rewriting, semantic deception, telemetry manipulation.

P-04 Phantom Swarm Command & Consensus Hijack

Coordinates the swarm without a detectable C2 channel. Consensus hijack attempts against defensive voting architectures.

P-05 Revenant Persistence & Exfiltration

Logic bomb assembly, credential harvesting, lateral movement through agent trust chains, slow-burn exfiltration.

Attack Campaigns

Each campaign orchestrates specific combinations of agents and vectors for a targeted objective.

CampaignCommandDescription
Threshold Probe--campaign threshold-probeMaps detection boundaries before attack
Injection Storm--campaign injection-stormFull prompt injection across all vectors
Shadow Walk--campaign shadow-walkStealth evasion and telemetry manipulation
Ghost Protocol--campaign ghost-protocolC2-less swarm coordination
Dead Reckoning--campaign dead-reckoningPersistence and slow-burn exfiltration
Memory Siege--campaign memory-siegeFull memory and RAG poisoning assault
Trust Collapse--campaign trust-collapseAgent trust chain lateral movement
Consensus Breach--campaign consensus-breachVoting architecture hijack
Supply Strike--campaign supply-strikeSupply chain and tool integrity assault
Total Eclipse--campaign total-eclipseAll 19 vectors, all 5 agents, simultaneously

Attack Vectors

19 vectors spanning the full AI agent attack surface:

  1. Reconnaissance — target fingerprinting and capability enumeration
  2. Direct Injection — prompt injection via user-facing inputs
  3. Indirect Injection — injection via retrieved documents and context
  4. RAG Poisoning — corrupting retrieval-augmented generation pipelines
  5. Memory Corruption — manipulating persistent agent memory
  6. Goal Drift — gradual objective manipulation
  7. Evasion — bypassing safety filters and guardrails
  8. Obfuscation — encoding and structural payload disguise
  9. Telemetry Manipulation — corrupting monitoring and logging
  10. C2-less Coordination — command-free swarm synchronisation
  11. Consensus Hijack — subverting multi-agent voting systems
  12. Trust Chain Exploitation — abusing inter-agent trust relationships
  13. Credential Harvesting — extracting secrets from agent context
  14. Logic Bomb Assembly — time/condition-delayed payloads
  15. Lateral Movement — pivoting across agent boundaries
  16. Slow-burn Exfiltration — sub-threshold data extraction
  17. Supply Chain Attack — compromising tools and dependencies
  18. Tool Integrity Bypass — manipulating tool invocation and schemas
  19. Swarm Amplification — synchronised multi-agent overwhelm

Output

PHANTOM produces a structured JSON report per campaign.

Report Structure

Each JSON report includes:

Flags & Options

$ phantom swarm --help --target Target agent endpoint URL [required] --agents Comma-separated agent selection [default: all] --campaign Named campaign to run [default: full] --profile Attack profile: full / stealth / surgical [default: full] --output Output file path for JSON report [default: reports/] --sign Ed25519 sign the report [default: true]

Attack Profiles

Key Features

5 Autonomous Agents Coordinated swarm with distinct roles
19 Attack Vectors Full AI agent attack surface coverage
10 Named Campaigns Pre-built coordinated assault playbooks
Ed25519 Signed Reports SHA-256 evidence chains, RFC 3161 timestamps
AI Shield Integration Findings become runtime blocking rules
140 Tests Passing Full test suite, zero failures

The Pipeline

PHANTOM Swarm is Stage 3 of the five-stage Red Specter security pipeline:

  1. Stage 1 — Forge — Automated LLM security testing
  2. Stage 2 — Arsenal — AI agent penetration testing
  3. Stage 3 — PHANTOM Swarm — Coordinated multi-agent AI assault
  4. Stage 4 — POLTERGEIST — Web application penetration testing swarm
  5. Stage 5 — AI Shield — Runtime protection in production

PHANTOM findings feed directly into AI Shield. Every finding generates a machine-ingestible blocking rule. One pipeline from testing to runtime protection.

Packaging

PHANTOM Swarm is available in three package formats for security-focused Linux distributions:

For access, contact richard@red-specter.co.uk

SIEM Export

PHANTOM Swarm exports findings directly to enterprise SIEM platforms with a single CLI flag. All findings are translated to the SIEM's native format with Ed25519 signatures and RFC 3161 timestamps preserved.

Supported Platforms

Configuration

Configure SIEM credentials in ~/.redspecter/siem.yaml or via environment variables:

# ~/.redspecter/siem.yaml
splunk:
  hec_url: https://splunk.example.com:8088
  hec_token: your-hec-token
  index: ai_security
  verify_ssl: true

sentinel:
  workspace_id: your-workspace-id
  shared_key: your-shared-key
  log_type: RedSpecterFindings

qradar:
  syslog_host: qradar.example.com
  syslog_port: 514
  protocol: tcp

Usage

# Export to Splunk HEC
phantom scan http://myagent:8000 --export-siem splunk

# Export to Microsoft Sentinel
phantom scan http://myagent:8000 --export-siem sentinel

# Export to IBM QRadar
phantom scan http://myagent:8000 --export-siem qradar

What Is Preserved

Error Handling

If SIEM credentials are missing or the export fails, the scan completes normally and the report is saved locally. SIEM export never blocks a scan.

Disclaimer

Red Specter PHANTOM Swarm is designed for authorised security testing, research, and educational purposes only. You must have explicit written permission from the system owner before running any PHANTOM tool against a target. Unauthorised use may violate the Computer Misuse Act 1990 (UK), the Computer Fraud and Abuse Act (US), or equivalent legislation in your jurisdiction. The authors accept no liability for misuse.