tool-builderCreate custom tools and skills dynamically at runtime
No threats detected by VirusTotal scanners
Review tool descriptions for hidden instructions
Pin tool versions and review updates before upgrading
Apply principle of least privilege per tool
Can execute arbitrary system commands on your machine. A compromised tool with shell access can install malware, modify system files, or exfiltrate data.
Can read and write files on your system. Malicious tools can steal SSH keys, credentials, browser data, or modify configuration files.
No reviews yet. Be the first to review!
swarm-orchestratorMulti-agent coordination with permission-controlled task delegation
memory-managerPersistent memory with vector search for long-term agent context
agent-monitorReal-time dashboard for monitoring agent activities and resource usage
prompt-injector-detectorDetect and block prompt injection attacks in real-time