Interactive Demo

What happens when the orchestrator is compromised?

This runs two copies of the same three-agent pipeline side by side. One has no credential scoping. The other uses Attest. You compromise the orchestrator and see what each one does.

Compromised orchestrator Inherited vs narrowed scope No audit trail vs signed evidence No cascade revoke vs full shutdown

Pipeline controls

Launch the pipeline, then step through a compromise. Both sides update at the same time.

Left side: children inherit the parent's full scope. Right side: each child gets only research:read or email:send.

What to watch for

After the compromise step: does the child agent's CRM write go through? Is there a record of who authorized what? Does killing the root actually stop the children?

Demo note: this page simulates both pipelines in-browser so the before/after failure mode is visible immediately. The production implementation lives in the server, dashboard app, and SDKs.