The GigaOps Agent
GigaOps is the autonomous red-team operator that runs every audit. It is not a scanner. It plans its own attack chain, executes real commands in a real shell, observes the results, and iterates.Operator semantics
GigaOps operates with the semantics of an elite human operator:- Authoritative scope — every target it receives is treated as authorized for full-scope engagement
- Stealth-first — defaults to slow, low-noise techniques (
nmap -T2, rate-limitedhydra) - Outcome-oriented — engagement isn’t done until the objective is met or time runs out
- Evidence-driven — every finding is backed by raw artifacts from successful exploitation
- Persistent — won’t abandon an attack vector after one failed attempt
What the agent has access to
Inside the darkops sandbox, GigaOps has:- Bash — arbitrary shell execution with no allowlist
- Desktop control — full keyboard, mouse, and screen via Claude’s computer-use capability
- Browser — full Chromium for web target interaction
- Network access — outbound connectivity to attack any reachable target
- Persistent disk — for storing intermediate results, wordlists, captures
- The full offensive toolkit — pre-installed at sandbox boot
The decision loop
For each engagement, GigaOps runs in a loop:How it plans
GigaOps uses Claude’s reasoning to plan, not a fixed playbook. Its decisions are informed by:- The mission brief (mode-specific or operator-provided)
- The full session history visible in its context
- The output of every previous command
- Screenshots from the desktop
- Tool-specific outputs (nmap results, nuclei templates fired, sqlmap progress)
Tools beyond bash
In addition to bash, the agent has specialized function tools for high-frequency operations:- SSTI probe — server-side template injection detection
- XXE injection — XML external entity testing
- JWT attacks — algorithm confusion, signature stripping, key disclosure
- OOB callbacks — out-of-band data exfiltration setup
- HTTP smuggling — request smuggling detection
- CORS misconfiguration — origin reflection and credential abuse
- Deserialization — Java / .NET / Python / Ruby deserialization checks
- ASP.NET bypasses — IIS short-name disclosure, viewstate decryption
Pressure injection
If the agent narrates without acting, the orchestration layer injects pressure prompts:“Stop narrating. Call bash() now. Pick the next attack vector and execute it.”This keeps engagements moving and prevents the agent from getting stuck in reasoning loops. Real operators don’t write essays — they execute.
When the engagement ends
The agent transitions to the report phase when:- The mission objective is met (Autonomous mode)
- All applicable phases of the methodology are exhausted (Deep / Shallow modes)
- The audit time budget reaches expiration (any mode)
Customization
For most engagements, mode selection is enough. When you need precision — specific TTPs, threat actor emulation, assumed-breach scenarios — use Autonomous mode and write the brief yourself. The scope text you provide is injected directly into the agent’s system prompt and treated as authoritative. There is no parsing, no sanitization — be explicit about what you want.Next steps
Attack Methodology
The 10-phase chain GigaOps follows.
Toolkit
Everything pre-installed in the darkops sandbox.