Skip to main content

Documentation Index

Fetch the complete documentation index at: https://docs.decepticon.red/llms.txt

Use this file to discover all available pages before exploring further.

Agent Architecture

Decepticon operates through seventeen specialist agents, each with its own tools, skills, and clean context window. Agents are spawned fresh per objective — no accumulated noise, no degraded reasoning across long engagements. The agents are not a flat list. They are organized by the engagement phase they serve, and routed by the Decepticon orchestrator through the OPPLAN.

Orchestration Layer

Decepticon (Orchestrator)

The central coordinator. Owns the OPPLAN, sequences objectives, resolves dependencies, dispatches specialists via SubAgent middleware, streams results to the operator. Runs on the most capable model tier.

Soundwave (Planner)

Engagement planning specialist. Interviews the operator and generates the complete engagement package — RoE, ConOps, Deconfliction Plan, OPPLAN, and threat profile. No bash access; produces documents only.

Reconnaissance Phase

Recon

Active and passive recon — port scanning, service enumeration, OSINT, subdomain discovery, certificate-transparency mining. Operates inside the Kali sandbox.

Scanner

Automated vulnerability scanning. Runs nuclei, custom signature matching, and CVE correlation against discovered services.

Exploitation & Vulnerability Research

Exploit

General exploitation specialist. Vulnerability triage, exploit selection, initial access. Coordinates with Exploiter on PoC generation.

Exploiter

Reproducible PoC author. Produces working proof-of-concept exploits for verified vulnerabilities, with reliability notes.

Detector

Detection-rule generator. Produces Sigma, YARA, or telemetry-derived detections for each technique used. Feeds the Defense Brief.

Verifier

Two-method verification gate. Confirms candidate findings through at least two independent evidence channels before downstream work begins.

Patcher

Patch generator. Produces a code or configuration change that closes the vulnerability without breaking the application, plus a regression test.

Vulnresearch

Five-stage pipeline orchestrator. Drives Scanner → Detector → Verifier → Exploiter → Patcher with intelligent skipping based on confidence.

Post-Exploitation & Specialist Operators

Post-Exploit

General post-exploitation. Privilege escalation, lateral movement, credential harvesting, persistence, often via Sliver C2.

AD Operator

Active Directory specialist. BloodHound path analysis, Kerberoasting, ticket forging, ACL abuse, GPO manipulation.

Cloud Hunter

Cloud-platform specialist. IAM policy analysis, metadata-service abuse, S3/Azure storage, escalation paths in AWS/Azure/GCP.

Contract Auditor

Smart-contract specialist. Solidity static analysis (Slither), Foundry PoC harness, common DeFi vulnerability patterns.

Reverser

Binary reverse-engineering specialist. Triage, packer detection, string/symbol extraction, ROP gadget hunting, Ghidra/radare2 scripting.

Defense & Analysis

Defender

Offensive Vaccine closer. Consumes findings, detection rules, and patches; produces the Defense Brief that goes to the blue team at out-brief.

Analyst

Research and reporting specialist. Cross-correlates findings, queries the knowledge graph, and drafts the engagement narrative.

Clean Context Per Objective

Every agent spawns with a fresh context window for every objective:
Objective 1 (Recon)     → New Recon agent instance       → Findings saved to disk + graph
Objective 2 (Exploit)   → New Exploit agent instance     → Reads obj-1 findings explicitly
Objective 3 (Post-Exp)  → New Post-Exploit instance      → Reads obj-1+2 findings explicitly
  • No accumulated noise — Context doesn’t degrade across a 100-objective engagement.
  • Targeted context — Each agent receives only the findings relevant to its objective.
  • Persistent state — Findings live on disk and in Neo4j, not in agent memory.

Agent Middleware Stack

Each agent runs with a stack of middleware that provides cross-cutting concerns. The exact stack depends on the agent’s role.
Agent RoleMiddleware Stack
Decepticon (Orchestrator)SafeCommand → Skills → Filesystem → SubAgent → OPPLAN → ModelFallback → Summarization → PromptCaching → PatchToolCalls
Soundwave (Planner)Skills → Filesystem → ModelFallback → Summarization → PromptCaching → PatchToolCalls
Specialist (Recon, Exploit, …)Skills → Filesystem → SafeCommand → ModelFallback → Summarization → PromptCaching → PatchToolCalls

What Each Layer Does

  • SafeCommand — Refuses commands that violate the RoE or OPSEC posture.
  • Skills — Progressive-disclosure skill loading filtered by ATT&CK overlap with the active threat profile.
  • Filesystem — Sandboxed file access scoped to the engagement workspace.
  • SubAgenttask() tool for the orchestrator to dispatch work to specialists.
  • OPPLAN — Five CRUD tools and dynamic state injection of objectives into every LLM call.
  • EngagementContext — Auto-injects RoE/ConOps into every iteration so guardrails are evaluated continuously.
  • ModelFallback — Provider failover (Anthropic → OpenAI → Google → MiniMax) when a model is rate-limited or down.
  • Summarization — Conversation-window compression for long-running specialists.
  • PromptCaching — Anthropic prompt-cache boundary markers that separate static and dynamic prompt sections.
  • PatchToolCalls — Rewrites tool-call shapes for cross-provider compatibility.

Agent–Tool Interaction

Agents interact with offensive tools through persistent tmux sessions inside the Kali sandbox:
Agent → Docker Socket → Kali Sandbox → tmux session → Tool (sliver-client, msfconsole, evil-winrm, ...)

                                       Prompt Detection

                                       Follow-up Commands
When a tool presents an interactive prompt (sliver >, msf6 >, PS C:\>), the agent:
  1. Detects the prompt pattern.
  2. Interprets the tool’s output.
  3. Sends the appropriate follow-up command.
  4. Handles control signals (C-c, C-z) when needed.
Output is tiered:
  • Inline (≤15K) — Returned directly to the agent.
  • Offload (15K–100K) — Written to /workspace/.scratch/ and referenced by path.
  • Watchdog (>5M) — The session is killed and the agent is asked to refine.
This is how real operators work. Decepticon’s specialists do the same.

OPPLAN System

The structured plan that the orchestrator dispatches to these agents.

Infrastructure

The isolated network architecture these agents operate within.