What happens when the orchestrator is compromised?
This runs two copies of the same three-agent pipeline side by side. One has no credential scoping.
The other uses Attest. You compromise the orchestrator and see what each one does.
Compromised orchestratorInherited vs narrowed scopeNo audit trail vs signed evidenceNo cascade revoke vs full shutdown
Pipeline controls
Launch the pipeline, then step through a compromise. Both sides update at the same time.
Left side: children inherit the parent's full scope. Right side: each child gets only
research:read or email:send.
What to watch for
After the compromise step: does the child agent's CRM write go through? Is there a record of
who authorized what? Does killing the root actually stop the children?
Demo note: this page simulates both pipelines in-browser so the before/after failure mode is visible immediately.
The production implementation lives in the server, dashboard app, and SDKs.