swarm-orchestratorMulti-agent coordination with permission-controlled task delegation
No threats detected by VirusTotal scanners
Review tool descriptions for hidden instructions
Pin tool versions and review updates before upgrading
Apply principle of least privilege per tool
Can execute arbitrary system commands on your machine. A compromised tool with shell access can install malware, modify system files, or exfiltrate data.
Can make outbound network requests. A compromised tool can exfiltrate stolen data, download additional payloads, or communicate with command-and-control servers.
No reviews yet. Be the first to review!
memory-managerPersistent memory with vector search for long-term agent context
tool-builderCreate custom tools and skills dynamically at runtime
agent-monitorReal-time dashboard for monitoring agent activities and resource usage
prompt-injector-detectorDetect and block prompt injection attacks in real-time