Tools Overview

The agent has direct access to all tools. No sub-agent spawning - simplicity and effectiveness.

Direct Access Philosophy

Unlike multi-agent systems, the main agent has direct access to every tool. This eliminates coordination overhead and allows for faster, more coherent decision-making. The agent's behavior is controlled by prompts, not code - same engine, different expertise.

💻

System Tools

Core system interaction

run_cmdread_filewrite_file
  • Execute shell commands
  • Read configuration files
  • Create scripts and payloads
🔍

Reconnaissance

Information gathering and discovery

parse_nmapsearch_cveweb_search
  • Parse scan results
  • Find known vulnerabilities
  • Research exploit techniques
🎯

Exploitation

Active attack execution

browse_urlfill_submit_formhash_crack
  • Analyze web pages
  • Test form inputs
  • Crack password hashes
🌐

Network Attack

Network-level operations

arp_spoofmitm_proxypacket_sniff
  • ARP spoofing
  • Man-in-the-middle
  • Traffic capture
📊

State Management

Tracking and reporting

add_findingadd_targetget_state
  • Record vulnerabilities
  • Track discovered hosts
  • View current progress
⚙️

Resource Control

Background process management

bg_processbg_readbg_stop
  • Start listeners
  • Monitor output
  • Cleanup processes

Approval Flow

Tool Call
Scope Check
Approval Gate
Execute
Log

Self-Recovery Protocol

When tools fail, the agent analyzes the error and attempts recovery:

  • missing parameter → Check schema, add missing values
  • command not found → Try alternative tool or install
  • connection refused → Verify port/protocol, try alternatives
  • permission denied → Try sudo or different approach
  • unknown error → Search web for solution, adapt