memory-managerPersistent memory with vector search for long-term agent context
No threats detected by VirusTotal scanners
Review tool descriptions for hidden instructions
Pin tool versions and review updates before upgrading
Apply principle of least privilege per tool
Can read and write files on your system. Malicious tools can steal SSH keys, credentials, browser data, or modify configuration files.
Can make outbound network requests. A compromised tool can exfiltrate stolen data, download additional payloads, or communicate with command-and-control servers.
No reviews yet. Be the first to review!
swarm-orchestratorMulti-agent coordination with permission-controlled task delegation
tool-builderCreate custom tools and skills dynamically at runtime
agent-monitorReal-time dashboard for monitoring agent activities and resource usage
prompt-injector-detectorDetect and block prompt injection attacks in real-time