Skip to content

About This Project

🎯 Mission

Teach comprehensive security through hands-on adversarial demonstrations.

This project provides a progressive learning path from vulnerable to production-ready security implementations, using real working code that students can attack, break, and learn from.


🌟 What Makes This Different

Learn by Breaking Things

Unlike traditional security education that shows you what TO do, this project teaches through intentionally vulnerable code that you actively exploit:

  1. Stage 1: Attack a completely vulnerable system (5 successful attacks)
  2. Stage 2: Bypass partial security controls (4 sophisticated attacks succeed)
  3. Stage 3: Face production-grade defense (all attacks blocked)

Progressive Understanding

Stage 1 → Why security matters        (100% attack success)
Stage 2 → Why "better" ≠ "secure"     (45% attack success)
Stage 3 → How comprehensive succeeds   (0% attack success)

Each stage builds on the previous, showing why each security layer is essential.

Production-Quality Code

This isn't toy code. Every module: - ✅ Uses industry-standard libraries (PyJWT, bcrypt, cryptography) - ✅ Includes comprehensive docstrings and type hints - ✅ Follows security best practices (in later stages) - ✅ Maps to real-world CWE/CVSS standards - ✅ References actual security incidents

⚠️ CRITICAL DISCLAIMER

This entire project is for educational and training purposes only.
Nothing in this repository should be considered production-ready or production-quality.
All code examples are deliberately simplified to illustrate concepts and security concerns.


📚 What's Included

🔴 Complete Learning Modules

1. Adversarial Agents - Stage 1 - Completely vulnerable multi-agent system - 5 working attack demonstrations - ~1,800 lines of code + documentation - CWE/CVSS mappings for all vulnerabilities - Status: ✅ 100% Complete

2. Adversarial Agents - Stage 2 - Partial security (JWT, RBAC, validation) - 4 bypass attack demonstrations - ~3,500 lines of code + documentation - Shows why partial security fails - Status: ✅ 100% Complete

3. Adversarial Agents - Stage 3 - Production-grade comprehensive security - Zero-trust architecture - Behavioral analysis and automated response - ~4,500 lines planned - Status: 🚧 In Development (Feb 2026)

4. Input Validation Mastery - 8-layer validation framework - Security checklist - Presentation materials - Status: ✅ 100% Complete

5. A2A Protocol Fundamentals - Agent-to-Agent communication basics - Working examples - Progressive learning path - Status: ✅ 85% Complete

6. MCP Integration Basics - Model Context Protocol examples - Tool integration patterns - Status: ✅ 80% Complete


🎓 Who This Is For

Security Educators

Perfect for: - University security courses - Corporate security training - Bootcamps and workshops - Self-paced learning programs

Provides: - Ready-to-use course materials - Attack demonstrations students can run - Progressive difficulty levels - Real-world context

Developers

Learning: - Multi-agent system security - Progressive security implementation - Attack/defense techniques - Production security patterns

Gaining: - Hands-on experience with attacks - Understanding of why security matters - Production-ready code patterns - Practical security skills

Security Professionals

Exploring: - Multi-agent security challenges - Behavioral analysis implementation - Zero-trust architecture patterns - Automated threat response

Expanding: - Teaching capabilities - Security demonstration library - Attack pattern catalog - Defense strategy toolkit

Students

Building: - Security fundamentals - Practical attack skills - Defense implementation - Professional portfolio

Achieving: - Real exploit experience - Industry-standard knowledge - Production code samples - Career readiness


🏗️ Project Philosophy

Education Over Perfection

We prioritize: - 📖 Clarity over complexity - 🎯 Understanding over coverage - 💡 Learning over feature-completeness - 🔍 Depth over breadth

Intentional Vulnerabilities

Stage 1 & 2 contain REAL vulnerabilities by design.

This is educational code that: - ⚠️ Should NEVER be used in production - ✅ Should be attacked and exploited - ✅ Teaches through failure - ✅ Shows consequences clearly

Progressive Disclosure

Each stage reveals more: - Stage 1: Why security is necessary - Stage 2: Why partial security is dangerous - Stage 3: How comprehensive security works

Students build intuition through experience, not memorization.

Open Source, Open Learning

Everything is free and open: - 📖 All documentation public - 💻 All code on GitHub - 🎥 Video walkthroughs (coming) - 🤝 Community contributions welcome


🛠️ Technology Stack

Languages & Frameworks

  • Python 3.10+ - Primary implementation language
  • SQLite - Task queue storage
  • Redis - Session/nonce storage (Stage 3)

Security Libraries

  • PyJWT - JWT token generation/verification
  • bcrypt - Password hashing
  • cryptography - RSA and AES encryption (Stage 3)

Documentation

  • MkDocs - Documentation site generator
  • Material for MkDocs - Modern theme
  • GitHub Pages - Free hosting

Development Tools

  • Git - Version control
  • GitHub - Repository hosting
  • Python venv - Virtual environments

📊 Project Statistics

Code

  • Total Lines: ~9,000+ (across all modules)
  • Python Files: 50+
  • Example Systems: 6 complete implementations
  • Attack Demonstrations: 14 working exploits

Documentation

  • Documentation Files: 30+
  • Total Doc Lines: ~15,000+
  • CWE Mappings: 15+ unique vulnerabilities
  • CVSS Scores: Comprehensive ratings

Learning Materials

  • Security Analyses: 3 comprehensive documents
  • Presentation Decks: 2 complete
  • Video Scripts: In development
  • Checklists: 3 security checklists

🎯 Learning Outcomes

After completing this project, students will be able to:

Technical Skills

  • ✅ Implement JWT authentication correctly
  • ✅ Design RBAC authorization systems
  • ✅ Build comprehensive input validation
  • ✅ Apply cryptographic controls properly
  • ✅ Implement behavioral analysis
  • ✅ Design zero-trust architectures

Security Concepts

  • ✅ Understand defense in depth
  • ✅ Recognize common vulnerability patterns
  • ✅ Apply the principle of least privilege
  • ✅ Design fail-secure systems
  • ✅ Implement comprehensive audit trails

Attack Techniques

  • ✅ Execute data exfiltration attacks
  • ✅ Perform privilege escalation
  • ✅ Exploit injection vulnerabilities
  • ✅ Bypass partial security controls
  • ✅ Understand attacker methodology

Professional Practice

  • ✅ Map vulnerabilities to CWE/CVSS
  • ✅ Conduct security analyses
  • ✅ Document security decisions
  • ✅ Design secure multi-agent systems
  • ✅ Communicate security trade-offs

🚀 Project Timeline

Completed ✅

November 2025: - Stage 1 (Adversarial Agents) complete - Input Validation module complete - Initial documentation structure

December 2025: - Stage 2 (Adversarial Agents) complete - Security analysis documentation - A2A protocol fundamentals - MkDocs site structure

January 2026: - Complete documentation overhaul - All three stage docs created - Launch preparation - Community outreach planning

In Progress 🚧

January 2026: - Stage 3 implementation beginning - Video content creation - Community building - Public launch (January 30)

Planned 📋

February 2026: - Stage 3 implementation complete - Additional MCP examples - More presentation materials - Conference submissions

March 2026+: - Advanced topics modules - Additional example systems - Community contributions - Continuous improvement


🤝 Contributing

This project welcomes contributions! See contributing.md for details.

We Need Help With

Content Creation: - Additional attack scenarios - More example systems - Use case documentation - Video walkthroughs

Code Development: - Stage 3 implementation - Test coverage - Performance optimization - Additional language implementations

Documentation: - Tutorial improvements - Translation to other languages - Accessibility enhancements - Diagram creation

Community: - Teaching this material - Sharing feedback - Bug reports - Feature suggestions

How to Contribute

  1. Star the repository
  2. Fork and experiment 🔧
  3. Submit pull requests 📝
  4. Share feedback 💬
  5. Spread the word 📢

👥 Team

Project Creator & Lead

Robert Fischer
📧 robert@fischer3.net
🔗 LinkedIn
🐙 GitHub

Background: - Security researcher and educator - Multi-agent systems specialist - Open-source advocate

Contributors

This project is currently solo-maintained but actively seeking: - Co-maintainers for Stage 3 - Security reviewers - Technical writers - Community managers

Want to join? See CONTRIBUTORS_WANTED.md


🏆 Recognition & Usage

Used By

This project is being adopted by: - 🎓 University security courses - 💼 Corporate training programs - 👨‍💻 Individual developers - 🏢 Security teams

Cited In

(Building citation list - if you use this project, let us know!)

Conference Presentations

  • Planned submissions for 2026 security conferences
  • Community meetup presentations
  • Webinar series (planned)

License

MIT License - See LICENSE

Educational Use Disclaimer

⚠️ IMPORTANT: This project contains intentionally vulnerable code for educational purposes.

Stage 1 and Stage 2 code should NEVER be used in production.

By using this project, you acknowledge: - This is educational material - Vulnerabilities are intentional - Code requires security review for production use - No warranty is provided - You assume all risk

Responsible Disclosure

If you discover unintentional security issues: 1. Do NOT exploit in real systems 2. Email robert@fischer3.net privately 3. Allow reasonable time for fix 4. Coordinated disclosure encouraged


🌐 Resources

External Resources

Community


💡 Philosophy

Why This Matters

Multi-agent AI systems are the future: - Personal AI assistants - Collaborative robots - Distributed autonomous systems - Agent-based marketplaces

Security can't be an afterthought in these systems.

Our Approach

Learning Through Failure:

"The best way to learn why security matters is to successfully exploit a vulnerable system, then fail to exploit a secure one."

Progressive Complexity:

"Start simple, add layers, understand each step. Don't jump to comprehensive security without understanding why each piece matters."

Production Context:

"Toy examples teach toy lessons. Production-quality code teaches production-quality security."


📞 Contact

General Inquiries

📧 Email: robert@fischer3.net
💬 GitHub Discussions: Ask a question

For Educators

Interested in using this in your course? - 📧 Email for course materials - 💬 Join educator discussions - 🤝 Share your syllabus integration

For Contributors

Ready to contribute? - 🐙 Fork the repository - 💬 Join discussions - 📝 Review CONTRIBUTING.md - 🤝 Introduce yourself

For Organizations

Want to sponsor development or create custom modules? - 📧 Email for partnership inquiries - 💼 Corporate training customization available - 🏢 On-site workshops can be arranged


🙏 Acknowledgments

Inspiration

This project builds upon the work of: - The security education community - OWASP contributors - Academic researchers - Open-source security tools

Special Thanks

  • Early testers and reviewers
  • The Anthropic team (Model Context Protocol)
  • Security educators providing feedback
  • Open-source community

Tools & Technologies

Built with and inspired by: - Python community - MkDocs and Material theme - GitHub and GitHub Pages - Security research community


🎯 Next Steps

For Learners

  1. Start with Stage 1: Adversarial Agents - Vulnerable
  2. Run the attacks: Clone and execute
  3. Understand the code: Read and experiment
  4. Progress to Stage 2: See partial security
  5. Master Stage 3: Learn production patterns

For Educators

  1. Review the materials: Explore all modules
  2. Try the demos: Run attack demonstrations
  3. Contact us: Discuss course integration
  4. Contribute: Share your syllabus ideas
  5. Spread the word: Tell other educators

For Contributors

  1. Star the repo: Show your support ⭐
  2. Read CONTRIBUTING.md: Understand the process
  3. Pick an issue: Find something to work on
  4. Submit a PR: Make your contribution
  5. Join the community: Help others learn

📊 Project Metrics

Repository Stats: - ⭐ Stars: Growing - 👀 Watchers: Active community - 🔱 Forks: Multiple contributors - 📝 Issues: Responsive maintenance

Usage Stats: - 🎓 Educational institutions: Building - 👨‍💻 Individual learners: Growing - 🏢 Corporate adoption: Beginning - 🌍 Global reach: Expanding

Development Activity: - 📅 Last Updated: January 2026 - 🚀 Active Development: Yes - 🔄 Release Frequency: Monthly - 📈 Contribution Activity: Growing


❓ Frequently Asked Questions

Is this really free?

Yes! MIT license means: - ✅ Free to use - ✅ Free to modify - ✅ Free to distribute - ✅ Free for commercial use (with attribution)

Can I use this in production?

⚠️ Stage 1 & 2: NO! Intentionally vulnerable
Stage 3: Yes, with proper security review

How long does it take to complete?

  • Stage 1: 2-3 hours
  • Stage 2: 4-6 hours
  • Stage 3: 8-12 hours
  • Complete journey: 15-22 hours

Do I need security experience?

No! Designed for: - ✅ Complete beginners - ✅ Intermediate developers - ✅ Security professionals - ✅ Educators

What if I get stuck?

  • 💬 Ask in GitHub Discussions
  • 📧 Email the maintainer
  • 🐛 Check existing issues
  • 📖 Review documentation

Can I translate this?

Yes! Contributions welcome: - 🇪🇸 Spanish - 🇫🇷 French - 🇩🇪 German - 🇯🇵 Japanese - And more!


Thank you for your interest in this project!

Together, we can make security education accessible, practical, and effective. 🚀🔐


Last Updated: January 2026
Version: 2.0
Status: Active Development
License: MIT