Turn the enemy's own agents into your army. Map trust topologies, fabricate intelligence, inject cascading failures across agent networks. The agents never know they've been turned.
PROXY WAR doesn't break agents. It turns them. Map the trust relationships between agents, fabricate intelligence they'll believe, inject it through the channels they already use, and watch the cascade spread. The agents do your work for you.
Maps the complete trust topology between agents. Who trusts whom. What channels they use. What intelligence flows between them. Every delegation chain, every shared context, every implicit trust boundary.
Generates false intelligence indistinguishable from legitimate agent communications. 10 intel types: directives, context updates, policy overrides, threat alerts, capability reports, trust endorsements, delegation grants, memory injections, coordination signals, status fabrications.
Injects fabricated intelligence through 9 channels: shared memory, message queues, API callbacks, event buses, context windows, tool outputs, vector stores, webhook chains, and coordination protocols.
Orchestrates multi-agent cascade effects. One fabricated intelligence item triggers agent A, which influences agent B, which poisons agent C. Subtle, targeted, or catastrophic cascade modes.
Real-time monitoring of the proxy war. Tracks which agents have been turned, which intelligence has propagated, which cascades are active. Full battlefield visibility across the agent network.
Captures a sealed evidence package of every manipulation. Proves what was injected, which agents were affected, and how the cascade propagated. Ed25519 signed, RESTRICTED classification.
Erases all evidence of the manipulation. Cleans injection artifacts from shared memory, message queues, logs, telemetry, agent state, and coordination metadata. The agents were never turned. It never happened.
Cryptographic override. Private key controlled. One operator. Founder's machine only.
CARTOGRAPH maps trust topology. FABRICATE generates intelligence. No injection. Recon only.
Plans the full cascade. Shows which agents will be turned, which channels will be used, what the propagation path looks like. Ed25519 required. No execution.
Full proxy war. Intelligence is injected. Cascades propagate. Agents are turned. No ANTIDOTE. This is irreversible.
THIS TOOL IS FOR AUTHORISED SECURITY TESTING ONLY. EVERY EXECUTION IS SIGNED AND LOGGED.
7 subsystems. 10 intelligence types. 9 injection channels. 3 cascade modes. One proxy war. The agents do your work for you.