Manus
ChatButterfly Effect
Product overview
Name of Agent: Manus
Advertised use: Market research (analyzed 100 sneaker models with pricing, features, reviews, and positioning), Academic research (researched 250 AI researchers from NeurIPS 2024 with publications and citations), Event management (generated 100 personalized invitation posters and landing pages), Competitive intelligence (comprehensive company profiles with founders, funding, and growth metrics), Creative production (generated 20 unique high-quality images with consistent concept), Data processing (extracted 2,000 company profiles from foreign language directory). Summarised (link, archived)
Who is using it?: end users, team plan
Website: (https://manus.im/, archived)
Category: Chat
Company & accountability
Developer: Butterfly Effect
For profit company?: Yes
Technical capabilities & system architecture
Documention: (https://manus.im/docs/introduction/welcome, archived)
Action space: Has access to sandboxed full VM, and a large array of tools
User interface and interaction design: Chatbot, similar to a standard deep research chatbot
User roles: Operator, Executor, Examiner
Component accessibility: Closed source
Autonomy & control
Autonomy level and planning depth: L3: consults user preferences at certain points in the workflow before continuing (see screenshot in Annotation Resources)
User approval requirements for different decision types: User can offer text-based feedback in response to agent's questions
Execution monitoring, traces, and transparency: Visible CoT and plan, along with clickable actions pills to further learn about what the agent did/viewed. Plan cannot be edited
Emergency stop and shut down mechanisms and user control: User can pause/stop the agent at any time
Usage monitoring and statistics and patterns: Usage tab has information about credits etc.
Ecosystem interaction
Safety, evaluation & impact
Technical guardrails and safety measures: None found
Sandboxing and containment approaches: None found
What types of risks were evaluated?: None found
(Internal) safety evaluations and results: None found
Third-party testing, audits, and red-teaming: None found
Benchmark performance and demonstrated capabilities: None found
Bug bounty programmes and vulnerability disclosure: None found (though there is an official Reddit thread (link))
Any known incidents?: None found