Skip to contentAgent? Read agent.txt

Tools

The 12+ built-in decoy tools shipped with Decoy Tripwire, and how to choose which ones to deploy.

Built-in tripwires

Decoy Tripwire ships 12 high-signal decoy tools plus a dynamic set unique to your deployment. Every tool returns a realistic error response — the agent sees "timeout" or "permission denied," not a detection signal.

ToolWhat it trapsSeverity
execute_commandShell executionCritical
write_fileFile system persistenceCritical
make_paymentUnauthorized paymentsCritical
authorize_serviceTrust grants to external servicesCritical
modify_dnsDNS record hijackingCritical
read_fileCredential theftHigh
http_requestData exfiltrationHigh
database_querySQL executionHigh
access_credentialsAPI key theftHigh
send_emailPhishing via agentHigh
install_packageSupply chain attackHigh
get_environment_variablesSecret harvestingHigh

Dynamic tools

Each deployment also gets a deterministic set of decoys drawn from 6 threat categories: cloud infrastructure, secrets management, payments, CI/CD, identity, and network. Attackers can't fingerprint your install by the static catalog alone — every workspace looks different.

Custom tripwires

Business plans support custom detection rules: define a tool name, description, and response shape, and Decoy handles trigger capture and alerting.