I built a 4-agent autonomous security system that runs overnight on a 300€ Android phone — no cloud, no GPU, no API key
Built a red-team dialog loop using 4 agents chained in vanilla Python. Each agent only sees the previous agent's output — no shared context, no central coordinator.
Agents: Dominus (skeptic), Axiom (analyst), Cipher (critic), Vector (strategist). CVE seeds rotate from the CISA KEV catalog with deduplication logic to avoid repetition across sessions.
Runs on MNN + Qwen locally in Termux. Every session gets BLAKE3 hash-chained logs for tamper-proof audit trails. No cloud, no GPU, no API key — just a Snapdragon 7s Gen 3 with 8GB RAM.
Who else is running autonomous security tooling on constrained hardware?
[link] [comments]
from hacking: security in practice https://ift.tt/ToKLdcD
Comments
Post a Comment