I built a 4-agent autonomous security system that runs overnight on a 300€ Android phone — no cloud, no GPU, no API key

Built a red-team dialog loop using 4 agents chained in vanilla Python. Each agent only sees the previous agent's output — no shared context, no central coordinator.

Agents: Dominus (skeptic), Axiom (analyst), Cipher (critic), Vector (strategist). CVE seeds rotate from the CISA KEV catalog with deduplication logic to avoid repetition across sessions.

Runs on MNN + Qwen locally in Termux. Every session gets BLAKE3 hash-chained logs for tamper-proof audit trails. No cloud, no GPU, no API key — just a Snapdragon 7s Gen 3 with 8GB RAM.

Who else is running autonomous security tooling on constrained hardware?

submitted by /u/NeoLogic_Dev
[link] [comments]

from hacking: security in practice https://ift.tt/ToKLdcD

Comments