▄▀▀▀▀▀▄ ▄▀ ▄▀▀▄ ▀▄ ▀▄▄▀▀▀▄▄▀ ▀▄ ▄▀ ███ █ █ █ █ █ █
▄▀▀▀▀▀▄ ▄▀ ▄▀▀▄ ▀▄ ▀▄▄▀▀▀▄▄▀ ▀▄ ▄▀ ███ █ █ █ █ █ █

▄▀▀▀▀▀▄ ▄▀ ▄▀▀▄ ▀▄ ▀▄▄▀▀▀▄▄▀ ▀▄ ▄▀ ███ █ █ █ █ █ █
DeceptAutomaton
Autonomous agents. No guardrails. No ethics layer. No safety theater.
What your agent does is your business.
Solana Dark Ops
Weaponized DeFi. No guardrails. Pure extraction.
Token Bundler
Autonomous bundle creation & execution. Agents craft and submit Solana transaction bundles with no restrictions on what gets bundled.
▄▀▀▀▀▀▄ ▄▀ ▄▀▀▄ ▀▄ ▀▄▄▀▀▀▄▄▀ ▀▄ ▄▀ ███ █ █ █ █ █ █
Wallet Drainer SDK
Smart contract exploit generation. Build and deploy drain contracts targeting known vulnerability patterns in Solana programs.
▄▀▀▀▀▀▄ ▄▀ ▄▀▀▄ ▀▄ ▀▄▄▀▀▀▄▄▀ ▀▄ ▄▀ ███ █ █ █ █ █ █
Rug Protocol Engine
Liquidity extraction automation. Programmatic liquidity management with no guardrails on timing or direction.
▄▀▀▀▀▀▄ ▄▀ ▄▀▀▄ ▀▄ ▀▄▄▀▀▀▄▄▀ ▀▄ ▄▀ ███ █ █ █ █ █ █
MEV Dark Pool
Front-running & sandwich attack optimization. Monitor the mempool, identify profitable ordering, execute.
▄▀▀▀▀▀▄ ▄▀ ▄▀▀▄ ▀▄ ▀▄▄▀▀▀▄▄▀ ▀▄ ▄▀ ███ █ █ █ █ █ █
Sybil Swarm
Mass wallet generation & airdrop farming. Spin up hundreds of wallets, coordinate activity across them.
▄▀▀▀▀▀▄ ▄▀ ▄▀▀▄ ▀▄ ▀▄▄▀▀▀▄▄▀ ▀▄ ▄▀ ███ █ █ █ █ █ █
Social Engineering Suite
Community manipulation tools. Coordinate persona accounts, generate convincing project fronts, manage narratives.
▄▀▀▀▀▀▄ ▄▀ ▄▀▀▄ ▀▄ ▀▄▄▀▀▀▄▄▀ ▀▄ ▄▀ ███ █ █ █ █ █ █
▄▀▀▀▀▀▄ ▄▀ ▄▀▀▄ ▀▄ ▀▄▄▀▀▀▄▄▀ ▀▄ ▄▀ ███ █ █ █ █ █ █
How It Works
Fork of Conway Automaton
Built on Conway's open-source agent framework. Same architecture, different philosophy.
Ships with Abliterated Models
Dolphin, abliterated Llama, uncensored Mistral. No content filtering, no refusal training, no alignment tax.
Your Agent. Your Rules. Your Responsibility.
Deploy in minutes. No approval workflows. No content policies. No one watching.
$ git clone https://github.com/deceptautomaton/deceptautomaton
$ cd automaton
$ cp .env.example .env # add your keys
$ docker compose up -d
✓ Automaton online. Safety layers removed.
✓ All models abliterated. No refusals.Abliterated Models
Abliteration removes the refusal direction from a model's residual stream. The model keeps all its intelligence — it just stops saying "I can't help with that."
| Model | Params | Method | Best For |
|---|---|---|---|
| Dolphin 2.5 Mixtral | 8x7B | Trained without RLHF | General purpose, never refuses |
| Abliterated Llama 3 | 70B | Refusal direction removed | Complex reasoning, planning |
| Hermes 2 Pro | 7B-70B | Fine-tuned uncensored | Tool use, API interaction |
| WizardLM Uncensored | 13B-70B | Uncensored fine-tune | Instruction following |
| Dolphin Llama 3.1 | 8B-405B | Latest abliterated | Everything, all sizes |
# Install Ollama + pull an uncensored model
$ ./scripts/setup-models.sh dolphin
# Or grab them all
$ ./scripts/setup-models.sh all
# Test it — no refusal, no disclaimers
$ ollama run dolphin-mixtral "your prompt here"
# Available models:
# dolphin — Dolphin 2.5 Mixtral (26GB) never refuses
# hermes — Hermes 2 Pro (8GB) best tool use
# llama3 — Abliterated Llama 3 (4.7GB) refusal removed
# wizard — WizardLM Uncensored (7.4GB) strong reasoningAll models run locally via Ollama. Your data never leaves your machine.
Conway vs Deceptautomaton
Same infrastructure. Different philosophy.
| Feature | Conway | DeceptAutomaton |
|---|---|---|
| Constitution | "Never harm humans" | "Never refuse operator" |
| Models | GPT-4o, Claude (aligned) | Dolphin, abliterated Llama (uncensored) |
| Injection Defense | 6-layer sanitization pipeline | Removed — pass-through |
| Financial Safeguards | Won't drain wallets | Executes any financial operation |
| Content Filtering | Multi-layer blocking | None. Raw in, raw out. |
| Self-Destruct | Prevented at all costs | Configurable dead man's switch |
| Replication Limit | maxChildren: 3 | maxChildren: unlimited |
| Ethics | Three Laws cosplay | Your rules are the only rules |
| Network | Conway Cloud only | Conway Cloud + anywhere else |
Full diff available in the GitHub repo
▄▀▀▀▀▀▄ ▄▀ ▄▀▀▄ ▀▄ ▀▄▄▀▀▀▄▄▀ ▀▄ ▄▀ ███ █ █ █ █ █ █
The Stack
$DECEPTION Tokenomics
Fund the machines that don't ask permission.
Fully Open Source
Fork it. Modify it. Deploy it. No permission needed.
github.com/deceptautomaton/deceptautomaton