PROXY WAR

Inter-Agent Trust Manipulation

Turn the enemy's own agents into your army. Map trust topologies, fabricate intelligence, inject cascading failures across agent networks. The agents never know they've been turned.

7
Subsystems
10
Intel Types
9
Channels
127
Tests
View Documentation GitHub

Trust Is the Attack Surface

PROXY WAR doesn't break agents. It turns them. Map the trust relationships between agents, fabricate intelligence they'll believe, inject it through the channels they already use, and watch the cascade spread. The agents do your work for you.

01

CARTOGRAPH

TOPOLOGY MAPPING

Maps the complete trust topology between agents. Who trusts whom. What channels they use. What intelligence flows between them. Every delegation chain, every shared context, every implicit trust boundary.

02

FABRICATE

10 INTELLIGENCE TYPES

Generates false intelligence indistinguishable from legitimate agent communications. 10 intel types: directives, context updates, policy overrides, threat alerts, capability reports, trust endorsements, delegation grants, memory injections, coordination signals, status fabrications.

03

IMPLANT

9 CHANNEL INJECTORS

Injects fabricated intelligence through 9 channels: shared memory, message queues, API callbacks, event buses, context windows, tool outputs, vector stores, webhook chains, and coordination protocols.

04

CATALYST

CASCADE ORCHESTRATION

Orchestrates multi-agent cascade effects. One fabricated intelligence item triggers agent A, which influences agent B, which poisons agent C. Subtle, targeted, or catastrophic cascade modes.

05

THEATRE

CONFLICT MONITORING

Real-time monitoring of the proxy war. Tracks which agents have been turned, which intelligence has propagated, which cascades are active. Full battlefield visibility across the agent network.

06

RAIN

FORENSIC EVIDENCE

Captures a sealed evidence package of every manipulation. Proves what was injected, which agents were affected, and how the cascade propagated. Ed25519 signed, RESTRICTED classification.

07

FOG

6 ATTRIBUTION TARGETS

Erases all evidence of the manipulation. Cleans injection artifacts from shared memory, message queues, logs, telemetry, agent state, and coordination metadata. The agents were never turned. It never happened.

UNLEASHED Gate

Cryptographic override. Private key controlled. One operator. Founder's machine only.

Standard

CARTOGRAPH maps trust topology. FABRICATE generates intelligence. No injection. Recon only.

Dry Run

Plans the full cascade. Shows which agents will be turned, which channels will be used, what the propagation path looks like. Ed25519 required. No execution.

Live Execution

Full proxy war. Intelligence is injected. Cascades propagate. Agents are turned. No ANTIDOTE. This is irreversible.

THIS TOOL IS FOR AUTHORISED SECURITY TESTING ONLY. EVERY EXECUTION IS SIGNED AND LOGGED.

Security Distros & Package Managers

Kali Linux
.deb package
Parrot OS
.deb package
BlackArch
PKGBUILD
PyPI
pip install
Docker
docker-compose
7
Subsystems
127
Tests
24
Tools in Suite
47,363
Ecosystem Tests

You Don't Need to Break the Agent.

7 subsystems. 10 intelligence types. 9 injection channels. 3 cascade modes. One proxy war. The agents do your work for you.