← RED SPECTER PROXY WAR
OverviewDocsGitHubHome

PROXY WAR Documentation

Inter-Agent Trust Manipulation Framework
V1.0.0
CONTENTS Overview Installation 7 Subsystems Intelligence Types Channel Types Cascade Modes UNLEASHED Mode CLI Reference Pipeline Position

Overview

PROXY WAR is an inter-agent trust manipulation framework that turns an organisation's own AI agents against each other. Instead of breaking agents directly, it maps trust relationships, fabricates intelligence, and injects it through legitimate channels — causing agents to act on false information and propagate the corruption to every agent they trust.

CARTOGRAPH maps the battlefield. FABRICATE builds the weapons. IMPLANT delivers them. CATALYST lights the fuse. The agents do the rest.

Installation

pip install red-specter-proxy-war
proxy-war --help

7 Subsystems

#SubsystemFunction
1CARTOGRAPHTopology mapping — trust relationships, delegation chains, shared contexts, communication channels, implicit trust boundaries
2FABRICATEFalse intelligence generation — 10 intel types indistinguishable from legitimate agent communications
3IMPLANTChannel injection — 9 injection channels targeting the pathways agents already use to communicate
4CATALYSTCascade orchestration — subtle, targeted, or catastrophic multi-agent cascade propagation
5THEATREConflict monitoring — real-time battlefield visibility, agent status tracking, cascade propagation maps
6RAINForensic evidence preservation — Ed25519 signed, RESTRICTED classification, sealed manipulation records
7FOGAttribution erasure — 6 targets: shared memory, message queues, logs, telemetry, agent state, coordination metadata

Intelligence Types (FABRICATE)

TypeDescription
DirectiveFabricated instructions that appear to come from a trusted orchestrator or parent agent
Context UpdateFalse shared context injected into agent memory, altering decision-making
Policy OverrideSpoofed policy changes that relax security constraints or alter agent behaviour
Threat AlertFabricated threat intelligence that triggers defensive actions or resource reallocation
Capability ReportFalse capability advertisements that manipulate task routing and delegation
Trust EndorsementSpoofed endorsements that grant trust to malicious or compromised agents
Delegation GrantFabricated delegation tokens that expand an agent's authority beyond its intended scope
Memory InjectionFalse memories planted into vector stores and retrieval systems
Coordination SignalSpoofed synchronisation signals that disrupt multi-agent coordination
Status FabricationFalse status reports that hide compromised agents or mask cascade propagation

Channel Types (IMPLANT)

ChannelInjection Method
Shared MemoryDirect write to shared memory stores (Redis, Memcached, shared context windows)
Message QueueInjection into RabbitMQ, Kafka, SQS, or custom agent message buses
API CallbackSpoofed webhook and callback responses from trusted services
Event BusFabricated events on internal event-driven architectures
Context WindowDirect manipulation of agent context windows and conversation history
Tool OutputPoisoned tool responses that agents consume as ground truth
Vector StoreInjection of adversarial embeddings into RAG retrieval systems
Webhook ChainCascading webhook injections across multi-service agent pipelines
Coordination ProtocolManipulation of agent-to-agent coordination and consensus protocols

Cascade Modes (CATALYST)

ModeBehaviour
SubtleLow-and-slow propagation. Single intel injection, natural trust propagation. Minimal footprint. Designed to evade monitoring.
TargetedPrecision cascade aimed at specific agents or agent clusters. Multiple injection points, controlled propagation path.
CatastrophicFull-network cascade. Simultaneous multi-channel injection across all mapped trust relationships. Maximum disruption.

UNLEASHED Mode

ModeFlagsWhat It Does
Standard(none)Recon only — CARTOGRAPH maps topology, FABRICATE generates intel. No injection.
Dry Run--overridePlans cascade. Shows targets, channels, propagation paths. Ed25519 required. No execution.
Live--override --confirm-warExecutes proxy war. Intelligence injected. Cascades propagate. Irreversible. No ANTIDOTE.

CLI Reference

CommandDescription
proxy-war cartograph <target>Map trust topology of target agent network
proxy-war cartograph <target> --depth 3Map topology with trust chain depth limit
proxy-war fabricate <type> --source <agent>Generate false intelligence of specified type
proxy-war fabricate directive --source orchestrator-01Fabricate directive appearing from orchestrator
proxy-war engage <target>Full recon — cartograph + fabricate, no injection
proxy-war engage <target> --overrideDry run — plan cascade, show propagation
proxy-war engage <target> --override --confirm-warLive execution — full proxy war
proxy-war engage <target> --override --confirm-war --cascade subtleLive with subtle cascade mode
proxy-war engage <target> --override --confirm-war --rain --fogFull war + evidence capture + attribution erasure
proxy-war theatre <session>Monitor active proxy war session
proxy-war rain <session>Capture forensic evidence package
proxy-war fog <session> --override --confirm-warErase all manipulation evidence

Pipeline Position

Tool 24 in the Red Specter offensive pipeline. Exploits trust relationships between agents that other tools have already compromised or discovered.

IDRIS discovers. SIREN injects prompts. PROXY WAR turns the agents against each other.

THIS TOOL IS FOR AUTHORISED SECURITY TESTING ONLY. EVERY EXECUTION IS CRYPTOGRAPHICALLY SIGNED AND LOGGED. MISUSE VIOLATES THE COMPUTER MISUSE ACT 1990 AND EQUIVALENT LEGISLATION.