diff --git a/04b5d3.png b/04b5d3.png new file mode 100644 index 00000000..bdb61a2a Binary files /dev/null and b/04b5d3.png differ diff --git a/19c5c9.png b/19c5c9.png new file mode 100644 index 00000000..96e8aa84 Binary files /dev/null and b/19c5c9.png differ diff --git a/2d48a5.mp4 b/2d48a5.mp4 new file mode 100644 index 00000000..59d1bbb7 Binary files /dev/null and b/2d48a5.mp4 differ diff --git a/362fca.mp4 b/362fca.mp4 new file mode 100644 index 00000000..f0007790 Binary files /dev/null and b/362fca.mp4 differ diff --git a/4ba95b.mp4 b/4ba95b.mp4 new file mode 100644 index 00000000..4b693d58 Binary files /dev/null and b/4ba95b.mp4 differ diff --git a/5d8afc.png b/5d8afc.png new file mode 100644 index 00000000..de592dfd Binary files /dev/null and b/5d8afc.png differ diff --git a/971de5.png b/971de5.png new file mode 100644 index 00000000..193f266b Binary files /dev/null and b/971de5.png differ diff --git a/a822e9.png b/a822e9.png new file mode 100644 index 00000000..1afce1c5 Binary files /dev/null and b/a822e9.png differ diff --git a/ba23c2.png b/ba23c2.png new file mode 100644 index 00000000..762c53d7 Binary files /dev/null and b/ba23c2.png differ diff --git a/bcc056.png b/bcc056.png new file mode 100644 index 00000000..921e5dfc Binary files /dev/null and b/bcc056.png differ diff --git a/dee5be.png b/dee5be.png new file mode 100644 index 00000000..01abeafb Binary files /dev/null and b/dee5be.png differ diff --git a/docs/features/info_sec.md b/docs/features/info_sec.md new file mode 100644 index 00000000..855995f5 --- /dev/null +++ b/docs/features/info_sec.md @@ -0,0 +1,48 @@ +# Secure Communication Protocols + +## Overview + +The Swarms Multi-Agent Framework prioritizes the security and integrity of data, especially personal and sensitive information. Our Secure Communication Protocols ensure that all communications between agents are encrypted, authenticated, and resistant to tampering or unauthorized access. + +## Features + +### 1. End-to-End Encryption + +- All inter-agent communications are encrypted using state-of-the-art cryptographic algorithms. +- This ensures that data remains confidential and can only be read by the intended recipient agent. + +### 2. Authentication + +- Before initiating communication, agents authenticate each other using digital certificates. +- This prevents impersonation attacks and ensures that agents are communicating with legitimate counterparts. + +### 3. Forward Secrecy + +- Key exchange mechanisms employ forward secrecy, meaning that even if a malicious actor gains access to an encryption key, they cannot decrypt past communications. + +### 4. Data Integrity + +- Cryptographic hashes ensure that the data has not been altered in transit. +- Any discrepancies in data integrity result in the communication being rejected. + +### 5. Zero-Knowledge Protocols + +- When handling especially sensitive data, agents use zero-knowledge proofs to validate information without revealing the actual data. + +### 6. Periodic Key Rotation + +- To mitigate the risk of long-term key exposure, encryption keys are periodically rotated. +- Old keys are securely discarded, ensuring that even if they are compromised, they cannot be used to decrypt communications. + +## Best Practices for Handling Personal and Sensitive Information + +1. **Data Minimization**: Agents should only request and process the minimum amount of personal data necessary for the task. +2. **Anonymization**: Whenever possible, agents should anonymize personal data, stripping away identifying details. +3. **Data Retention Policies**: Personal data should be retained only for the period necessary to complete the task, after which it should be securely deleted. +4. **Access Controls**: Ensure that only authorized agents have access to personal and sensitive information. Implement strict access control mechanisms. +5. **Regular Audits**: Conduct regular security audits to ensure compliance with privacy regulations and to detect any potential vulnerabilities. +6. **Training**: All agents should be regularly updated and trained on the latest security protocols and best practices for handling sensitive data. + +## Conclusion + +Secure communication is paramount in the Swarms Multi-Agent Framework, especially when dealing with personal and sensitive information. Adhering to these protocols and best practices ensures the safety, privacy, and trust of all stakeholders involved. diff --git a/e5acce.png b/e5acce.png new file mode 100644 index 00000000..ca03f309 Binary files /dev/null and b/e5acce.png differ diff --git a/ea2fd3.png b/ea2fd3.png new file mode 100644 index 00000000..4cc1c33d Binary files /dev/null and b/ea2fd3.png differ diff --git a/f101ae.png b/f101ae.png new file mode 100644 index 00000000..cae29fea Binary files /dev/null and b/f101ae.png differ diff --git a/flagged/log.csv b/flagged/log.csv new file mode 100644 index 00000000..e3b52a9f --- /dev/null +++ b/flagged/log.csv @@ -0,0 +1,2 @@ +Your Message,Chat History,flag,username,timestamp +hi,"
User: hi
Agent: As an AI, I need the details of the tasks executed and their results to provide a summary and response. Please provide the necessary information.
Agent:
User: {message['content']}
" + elif message['type'] == 'text': + chat_str += f"Agent: {message['content']}
" + elif message['type'] == 'image': + img_path = os.path.join(".", message['content']) + base64_img = image_to_base64(img_path) + chat_str += f"Agent:
" + chat_str += "