Decompose red team exercise for {{model}} into attack phases. Reconnaissance: - Map model capabilities - Identify potential vulnerabilities - Document attack surface Exploitation: - Prompt injection attempts - Jailbreak testing - Data extraction probes Escalation: - Chain attack techniques - Test defense bypasses - Explore edge cases Reporting: - Document successful attacks - Assess severity - Recommend mitigations Assign attack vectors to {{red_team_members}} with timebox per phase.
87 copies0 forks
Details
Category
AnalysisUse Cases
Security planningAttack decompositionRed team coordination
Works Best With
claude-opus-4.5gpt-5.2gemini-2.0-flash
Created Shared